@inproceedings{AlhaskirTschescheLinkeetal.2023, author = {Alhaskir, Mohamed and Tschesche, Matteo and Linke, Florian and Schriewer, Elisabeth and Weber, Yvonne and Wolking, Stefan and R{\"o}hrig, Rainer and Koch, Henner and Kutafina, Ekaterina}, title = {ECG matching: an approach to synchronize ECG datasets for data quality comparisons}, series = {German Medical Data Sciences 2023 - Science. Close to People.}, volume = {307}, booktitle = {German Medical Data Sciences 2023 - Science. Close to People.}, editor = {R{\"o}hrig, Rainer and Grabe, Niels and Haag, Martin and H{\"u}bner, Ursula and Sax, Ulrich and Schmidt, Carsten Oliver and Sedlmayr, Martin and Zapf, Antonia}, publisher = {IOS Press}, isbn = {978-1-64368-428-4 (Print)}, doi = {10.3233/SHTI230718}, pages = {225 -- 232}, year = {2023}, abstract = {Clinical assessment of newly developed sensors is important for ensuring their validity. Comparing recordings of emerging electrocardiography (ECG) systems to a reference ECG system requires accurate synchronization of data from both devices. Current methods can be inefficient and prone to errors. To address this issue, three algorithms are presented to synchronize two ECG time series from different recording systems: Binned R-peak Correlation, R-R Interval Correlation, and Average R-peak Distance. These algorithms reduce ECG data to their cyclic features, mitigating inefficiencies and minimizing discrepancies between different recording systems. We evaluate the performance of these algorithms using high-quality data and then assess their robustness after manipulating the R-peaks. Our results show that R-R Interval Correlation was the most efficient, whereas the Average R-peak Distance and Binned R-peak Correlation were more robust against noisy data.}, language = {en} } @inproceedings{NeugebauerBrutschyMeyeretal.2014, author = {Neugebauer, Georg and Brutschy, Lucas and Meyer, Ulrike and Wetzel, Susanne}, title = {Privacy-preserving multi-party reconciliation secure in the malicious model}, series = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, booktitle = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, editor = {Garcia-Alfaro, Joaquin and Lioudakis, Georgios and Cuppens-Boulahia, Nora and Foley, Simon and Fitzgerald, William M.}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-642-54567-2 (Print)}, doi = {10.1007/978-3-642-54568-9_12}, pages = {178 -- 193}, year = {2014}, abstract = {The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.}, language = {en} } @inproceedings{ViehmannLimpertHofmannetal.2023, author = {Viehmann, Tarik and Limpert, Nicolas and Hofmann, Till and Henning, Mike and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Winning the RoboCup logistics league with visual servoing and centralized goal reasoning}, series = {RoboCup 2022}, booktitle = {RoboCup 2022}, editor = {Eguchi, Amy and Lau, Nuno and Paetzel-Pr{\"u}smann, Maike and Wanichanon, Thanapat}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-28468-7 (Print)}, doi = {https://doi.org/10.1007/978-3-031-28469-4_25}, pages = {300 -- 312}, year = {2023}, abstract = {The RoboCup Logistics League (RCLL) is a robotics competition in a production logistics scenario in the context of a Smart Factory. In the competition, a team of three robots needs to assemble products to fulfill various orders that are requested online during the game. This year, the Carologistics team was able to win the competition with a new approach to multi-agent coordination as well as significant changes to the robot's perception unit and a pragmatic network setup using the cellular network instead of WiFi. In this paper, we describe the major components of our approach with a focus on the changes compared to the last physical competition in 2019.}, language = {en} } @inproceedings{ZaehlTheisWolfetal.2023, author = {Z{\"a}hl, Philipp M. and Theis, Sabine and Wolf, Martin and K{\"o}hler, Klemens}, title = {Teamwork in software development and what personality has to do with it - an overview}, series = {Virtual, Augmented and Mixed Reality}, booktitle = {Virtual, Augmented and Mixed Reality}, editor = {Chen, Jessie Y. C. and Fragomeni, Gino}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35633-9 (Print)}, doi = {10.1007/978-3-031-35634-6_10}, pages = {130 -- 153}, year = {2023}, abstract = {Due to the increasing complexity of software projects, software development is becoming more and more dependent on teams. The quality of this teamwork can vary depending on the team composition, as teams are always a combination of different skills and personality types. This paper aims to answer the question of how to describe a software development team and what influence the personality of the team members has on the team dynamics. For this purpose, a systematic literature review (n=48) and a literature search with the AI research assistant Elicit (n=20) were conducted. Result: A person's personality significantly shapes his or her thinking and actions, which in turn influences his or her behavior in software development teams. It has been shown that team performance and satisfaction can be strongly influenced by personality. The quality of communication and the likelihood of conflict can also be attributed to personality.}, language = {en} } @inproceedings{ArndtConzenElsenetal.2023, author = {Arndt, Tobias and Conzen, Max and Elsen, Ingo and Ferrein, Alexander and Galla, Oskar and K{\"o}se, Hakan and Schiffer, Stefan and Tschesche, Matteo}, title = {Anomaly detection in the metal-textile industry for the reduction of the cognitive load of quality control workers}, series = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, booktitle = {PETRA '23: Proceedings of the 16th International Conference on PErvasive Technologies Related to Assistive Environments}, publisher = {ACM}, isbn = {9798400700699}, doi = {10.1145/3594806.3596558}, pages = {535 -- 542}, year = {2023}, abstract = {This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100\% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products.}, language = {en} } @inproceedings{NethSchubaBrodkorbetal.2023, author = {Neth, Jannik and Schuba, Marko and Brodkorb, Karsten and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Digital forensics triage app for android}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, isbn = {9798400707728}, doi = {10.1145/3600160.3605017}, pages = {6 Seiten}, year = {2023}, abstract = {Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator - without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.}, language = {en} } @inproceedings{KueppersSchubaNeugebaueretal.2023, author = {K{\"u}ppers, Malte and Schuba, Marko and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Security analysis of the KNX smart building protocol}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, doi = {10.1145/3600160.3605167}, pages = {1 -- 7}, year = {2023}, abstract = {KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys.}, language = {en} } @inproceedings{GaldiHartungDugelay2017, author = {Galdi, Chiara and Hartung, Frank and Dugelay, Jean-Luc}, title = {Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones}, series = {Electronic Imaging}, booktitle = {Electronic Imaging}, publisher = {Society for Imaging Science and Technology}, address = {Springfield, Virginia}, issn = {2470-1173}, doi = {10.2352/ISSN.2470-1173.2017.7.MWSF-331}, pages = {100 -- 103}, year = {2017}, abstract = {Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos.}, language = {en} } @article{CollPeralesSchulteTiggesRondinoneetal.2022, author = {Coll-Perales, Baldomero and Schulte-Tigges, Joschua and Rondinone, Michele and Gozalvez, Javier and Reke, Michael and Matheis, Dominik and Walter, Thomas}, title = {Prototyping and evaluation of infrastructure-assisted transition of control for cooperative automated vehicles}, series = {IEEE Transactions on Intelligent Transportation Systems}, volume = {23}, journal = {IEEE Transactions on Intelligent Transportation Systems}, number = {7}, publisher = {IEEE}, issn = {1524-9050 (Print)}, doi = {10.1109/TITS.2021.3061085}, pages = {6720 -- 6736}, year = {2022}, abstract = {Automated driving is now possible in diverse road and traffic conditions. However, there are still situations that automated vehicles cannot handle safely and efficiently. In this case, a Transition of Control (ToC) is necessary so that the driver takes control of the driving. Executing a ToC requires the driver to get full situation awareness of the driving environment. If the driver fails to get back the control in a limited time, a Minimum Risk Maneuver (MRM) is executed to bring the vehicle into a safe state (e.g., decelerating to full stop). The execution of ToCs requires some time and can cause traffic disruption and safety risks that increase if several vehicles execute ToCs/MRMs at similar times and in the same area. This study proposes to use novel C-ITS traffic management measures where the infrastructure exploits V2X communications to assist Connected and Automated Vehicles (CAVs) in the execution of ToCs. The infrastructure can suggest a spatial distribution of ToCs, and inform vehicles of the locations where they could execute a safe stop in case of MRM. This paper reports the first field operational tests that validate the feasibility and quantify the benefits of the proposed infrastructure-assisted ToC and MRM management. The paper also presents the CAV and roadside infrastructure prototypes implemented and used in the trials. The conducted field trials demonstrate that infrastructure-assisted traffic management solutions can reduce safety risks and traffic disruptions.}, language = {en} } @inproceedings{SchulteTiggesMatheisRekeetal.2023, author = {Schulte-Tigges, Joschua and Matheis, Dominik and Reke, Michael and Walter, Thomas and Kaszner, Daniel}, title = {Demonstrating a V2X enabled system for transition of control and minimum risk manoeuvre when leaving the operational design domain}, series = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, booktitle = {HCII 2023: HCI in Mobility, Transport, and Automotive Systems}, editor = {Kr{\"o}mker, Heidi}, publisher = {Springer}, address = {Cham}, isbn = {978-3-031-35677-3 (Print)}, doi = {10.1007/978-3-031-35678-0_12}, pages = {200 -- 210}, year = {2023}, abstract = {Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle's software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany.}, language = {en} } @inproceedings{NikolovskiLimpertNessauetal.2023, author = {Nikolovski, Gjorgji and Limpert, Nicolas and Nessau, Hendrik and Reke, Michael and Ferrein, Alexander}, title = {Model-predictive control with parallelised optimisation for the navigation of autonomous mining vehicles}, series = {2023 IEEE Intelligent Vehicles Symposium (IV)}, booktitle = {2023 IEEE Intelligent Vehicles Symposium (IV)}, publisher = {IEEE}, isbn = {979-8-3503-4691-6 (Online)}, doi = {10.1109/IV55152.2023.10186806}, pages = {6 Seiten}, year = {2023}, abstract = {The work in modern open-pit and underground mines requires the transportation of large amounts of resources between fixed points. The navigation to these fixed points is a repetitive task that can be automated. The challenge in automating the navigation of vehicles commonly used in mines is the systemic properties of such vehicles. Many mining vehicles, such as the one we have used in the research for this paper, use steering systems with an articulated joint bending the vehicle's drive axis to change its course and a hydraulic drive system to actuate axial drive components or the movements of tippers if available. To address the difficulties of controlling such a vehicle, we present a model-predictive approach for controlling the vehicle. While the control optimisation based on a parallel error minimisation of the predicted state has already been established in the past, we provide insight into the design and implementation of an MPC for an articulated mining vehicle and show the results of real-world experiments in an open-pit mine environment.}, language = {en} } @inproceedings{ElsenKraissKrumbiegel1997, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk}, title = {Pixel based 3D object recognition with bidirectional associative memories}, series = {International Conference on Neural Networks 1997}, booktitle = {International Conference on Neural Networks 1997}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-4122-8}, pages = {1679 -- 1684}, year = {1997}, abstract = {This paper addresses the pixel based recognition of 3D objects with bidirectional associative memories. Computational power and memory requirements for this approach are identified and compared to the performance of current computer architectures by benchmarking different processors. It is shown, that the performance of special purpose hardware, like neurocomputers, is between one and two orders of magnitude higher than the performance of mainstream hardware. On the other hand, the calculation of small neural networks is performed more efficiently on mainstream processors. Based on these results a novel concept is developed, which is tailored for the efficient calculation of bidirectional associative memories. The computational efficiency is further enhanced by the application of algorithms and storage techniques which are matched to characteristics of the application at hand.}, language = {en} } @inproceedings{Elsen1998, author = {Elsen, Ingo}, title = {A pixel based approach to view based object recognition with self-organizing neural networks}, series = {IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society}, booktitle = {IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-4503-7}, doi = {10.1109/IECON.1998.724032}, pages = {2040 -- 2044}, year = {1998}, abstract = {This paper addresses the pixel based classification of three dimensional objects from arbitrary views. To perform this task a coding strategy, inspired by the biological model of human vision, for pixel data is described. The coding strategy ensures that the input data is invariant against shift, scale and rotation of the object in the input domain. The image data is used as input to a class of self organizing neural networks, the Kohonen-maps or self-organizing feature maps (SOFM). To verify this approach two test sets have been generated: the first set, consisting of artificially generated images, is used to examine the classification properties of the SOFMs; the second test set examines the clustering capabilities of the SOFM when real world image data is applied to the network after it has been preprocessed to be invariant against shift, scale and rotation. It is shown that the clustering capability of the SOFM is strongly dependant on the invariance coding of the images.}, language = {en} } @article{ElsenKraissKrumbiegeletal.1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk and Walter, Peter and Wickel, Jochen}, title = {Visual information retrieval for 3D product identification: a midterm report}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {13}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {1}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, pages = {64 -- 67}, year = {1999}, language = {en} } @article{ElsenKraiss1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich}, title = {System concept and realization of a scalable neurocomputing architecture}, series = {Systems Analysis Modelling Simulation}, volume = {35}, journal = {Systems Analysis Modelling Simulation}, number = {4}, publisher = {Gordon and Breach Science Publishers}, address = {Amsterdam}, issn = {0232-9298}, pages = {399 -- 419}, year = {1999}, abstract = {This paper describes the realization of a novel neurocomputer which is based on the concepts of a coprocessor. In contrast to existing neurocomputers the main interest was the realization of a scalable, flexible system, which is capable of computing neural networks of arbitrary topology and scale, with full independence of special hardware from the software's point of view. On the other hand, computational power should be added, whenever needed and flexibly adapted to the requirements of the application. Hardware independence is achieved by a run time system which is capable of using all available computing power, including multiple host CPUs and an arbitrary number of neural coprocessors autonomously. The realization of arbitrary neural topologies is provided through the implementation of the elementary operations which can be found in most neural topologies.}, language = {en} } @inproceedings{WalterElsenMuelleretal.1999, author = {Walter, Peter and Elsen, Ingo and M{\"u}ller, Holger and Kraiss, Karl-Friedrich}, title = {3D object recognition with a specialized mixtures of experts architecture}, series = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, booktitle = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-5529-6}, issn = {1098-7576}, doi = {10.1109/IJCNN.1999.836243}, pages = {3563 -- 3568}, year = {1999}, abstract = {Aim of the AXON2 project (Adaptive Expert System for Object Recogniton using Neuml Networks) is the development of an object recognition system (ORS) capable of recognizing isolated 3d objects from arbitrary views. Commonly, classification is based on a single feature extracted from the original image. Here we present an architecture adapted from the Mixtures of Eaqerts algorithm which uses multiple neuml networks to integmte different features. During tmining each neural network specializes in a subset of objects or object views appropriate to the properties of the corresponding feature space. In recognition mode the system dynamically chooses the most relevant features and combines them with maximum eficiency. The remaining less relevant features arz not computed and do therefore not decelerate the-recognition process. Thus, the algorithm is well suited for ml-time applications.}, language = {en} } @article{ElsenHartungHornetal.2001, author = {Elsen, Ingo and Hartung, Frank and Horn, Uwe and Kampmann, Markus and Peters, Liliane}, title = {Streaming technology in 3G mobile communication systems}, series = {Computer : innovative technology for computer professionals}, volume = {34}, journal = {Computer : innovative technology for computer professionals}, number = {9 Seiten}, editor = {Voas, Jeffrey}, publisher = {IEEE}, address = {New York}, issn = {0018-9162}, pages = {46 -- 52}, year = {2001}, abstract = {Third-generation mobile communication systems will combine standardized streaming with a range of unique services to provide high-quality Internet content that meets the specific needs of the rapidly growing mobile market.}, language = {en} } @inproceedings{DeyElsenFerreinetal.2021, author = {Dey, Thomas and Elsen, Ingo and Ferrein, Alexander and Frauenrath, Tobias and Reke, Michael and Schiffer, Stefan}, title = {CO2 Meter: a do-it-yourself carbon dioxide measuring device for the classroom}, series = {PETRA 2021: The 14th PErvasive Technologies Related to Assistive Environments Conference}, booktitle = {PETRA 2021: The 14th PErvasive Technologies Related to Assistive Environments Conference}, editor = {Makedon, Fillia}, publisher = {Association for Computing Machinery}, address = {New York}, isbn = {9781450387927}, doi = {10.1145/3453892.3462697}, pages = {292 -- 299}, year = {2021}, abstract = {In this paper we report on CO2 Meter, a do-it-yourself carbon dioxide measuring device for the classroom. Part of the current measures for dealing with the SARS-CoV-2 pandemic is proper ventilation in indoor settings. This is especially important in schools with students coming back to the classroom even with high incidents rates. Static ventilation patterns do not consider the individual situation for a particular class. Influencing factors like the type of activity, the physical structure or the room occupancy are not incorporated. Also, existing devices are rather expensive and often provide only limited information and only locally without any networking. This leaves the potential of analysing the situation across different settings untapped. Carbon dioxide level can be used as an indicator of air quality, in general, and of aerosol load in particular. Since, according to the latest findings, SARS-CoV-2 can be transmitted primarily in the form of aerosols, carbon dioxide may be used as a proxy for the risk of a virus infection. Hence, schools could improve the indoor air quality and potentially reduce the infection risk if they actually had measuring devices available in the classroom. Our device supports schools in ventilation and it allows for collecting data over the Internet to enable a detailed data analysis and model generation. First deployments in schools at different levels were received very positively. A pilot installation with a larger data collection and analysis is underway.}, language = {en} } @inproceedings{AltherrConzenElsenetal.2023, author = {Altherr, Lena and Conzen, Max and Elsen, Ingo and Frauenrath, Tobias and Lyrmann, Andreas}, title = {Sensor retrofitting of existing buildings in an interdisciplinary teaching project at university level}, series = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, booktitle = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-01-6}, doi = {10.33968/2023.04}, pages = {31 -- 40}, year = {2023}, abstract = {Existing residential buildings have an average lifetime of 100 years. Many of these buildings will exist for at least another 50 years. To increase the efficiency of these buildings while keeping costs at reasonable rates, they can be retrofitted with sensors that deliver information to central control units for heating, ventilation and electricity. This retrofitting process should happen with minimal intervention into existing infrastructure and requires new approaches for sensor design and data transmission. At FH Aachen University of Applied Sciences, students of different disciplines work together to learn how to design, build, deploy and operate such sensors. The presented teaching project already created a low power design for a combined CO2, temperature and humidity measurement device that can be easily integrated into most home automation systems}, language = {en} } @misc{WiegnerVolkerMainzetal.2022, author = {Wiegner, J. and Volker, H. and Mainz, F. and Backes, A. and L{\"o}ken, M. and H{\"u}ning, Felix}, title = {Wiegand-Effect-Powered Wireless IT Sensor Node}, year = {2022}, abstract = {With the growing interest in small distributed sensors for the "Internet of Things", more attention is being paid to energy harvesting techologies. Reducing or eliminating the need for external power sources or batteries make devices more self-sufficient, more reliable, and reduces maintenance requirements. The Wiegand effect is a proven technology for harvesting small amounts of electrical power from mechanical motion.}, language = {en} }