@article{FiedlerOrzadaFloeseretal.2021, author = {Fiedler, Thomas M. and Orzada, Stephan and Fl{\"o}ser, Martina and Rietsch, Stefan H. G. and Quick, Harald H. and Ladd, Mark E. and Bitz, Andreas}, title = {Performance analysis of integrated RF microstrip transmit antenna arrays with high channel count for body imaging at 7 T}, series = {NMR in Biomedicine}, volume = {34}, journal = {NMR in Biomedicine}, number = {7}, publisher = {Wiley}, address = {Weinheim}, issn = {0952-3480 (ISSN)}, doi = {10.1002/nbm.4515}, pages = {18 SeitenWiley}, year = {2021}, abstract = {The aim of the current study was to investigate the performance of integrated RF transmit arrays with high channel count consisting of meander microstrip antennas for body imaging at 7 T and to optimize the position and number of transmit ele- ments. RF simulations using multiring antenna arrays placed behind the bore liner were performed for realistic exposure conditions for body imaging. Simulations were performed for arrays with as few as eight elements and for arrays with high channel counts of up to 48 elements. The B1+ field was evaluated regarding the degrees of freedom for RF shimming in the abdomen. Worst-case specific absorption rate (SARwc ), SAR overestimation in the matrix compression, the number of virtual obser- vation points (VOPs) and SAR efficiency were evaluated. Constrained RF shimming was performed in differently oriented regions of interest in the body, and the devia- tion from a target B1+ field was evaluated. Results show that integrated multiring arrays are able to generate homogeneous B1+ field distributions for large FOVs, espe- cially for coronal/sagittal slices, and thus enable body imaging at 7 T with a clinical workflow; however, a low duty cycle or a high SAR is required to achieve homoge- neous B1+ distributions and to exploit the full potential. In conclusion, integrated arrays allow for high element counts that have high degrees of freedom for the pulse optimization but also produce high SARwc , which reduces the SAR accuracy in the VOP compression for low-SAR protocols, leading to a potential reduction in array performance. Smaller SAR overestimations can increase SAR accuracy, but lead to a high number of VOPs, which increases the computational cost for VOP evaluation and makes online SAR monitoring or pulse optimization challenging. Arrays with interleaved rings showed the best results in the study.}, language = {en} } @article{KowalewskiBragardHueningetal.2023, author = {Kowalewski, Paul and Bragard, Michael and H{\"u}ning, Felix and De Doncker, Rik W.}, title = {An inexpensive Wiegand-sensor-based rotary encoder without rotating magnets for use in electrical drives}, series = {IEEE Transactions on Instrumentation and Measurement}, volume = {72}, journal = {IEEE Transactions on Instrumentation and Measurement}, publisher = {IEEE}, address = {New York}, issn = {0018-9456 (Print)}, doi = {10.1109/TIM.2023.3326166}, pages = {10 Seiten}, year = {2023}, abstract = {This paper introduces an inexpensive Wiegand-sensor-based rotary encoder that avoids rotating magnets and is suitable for electrical-drive applications. So far, Wiegand-sensor-based encoders usually include a magnetic pole wheel with rotating permanent magnets. These encoders combine the disadvantages of an increased magnet demand and a limited maximal speed due to the centripetal force acting on the rotating magnets. The proposed approach reduces the total demand of permanent magnets drastically. Moreover, the rotating part is manufacturable from a single piece of steel, which makes it very robust and cheap. This work presents the theoretical operating principle of the proposed approach and validates its benefits on a hardware prototype. The presented proof-of-concept prototype achieves a mechanical resolution of 4.5 ° by using only 4 permanent magnets, 2Wiegand sensors and a rotating steel gear wheel with 20 teeth.}, language = {en} } @article{ElsenKraiss1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich}, title = {System concept and realization of a scalable neurocomputing architecture}, series = {Systems Analysis Modelling Simulation}, volume = {35}, journal = {Systems Analysis Modelling Simulation}, number = {4}, publisher = {Gordon and Breach Science Publishers}, address = {Amsterdam}, issn = {0232-9298}, pages = {399 -- 419}, year = {1999}, abstract = {This paper describes the realization of a novel neurocomputer which is based on the concepts of a coprocessor. In contrast to existing neurocomputers the main interest was the realization of a scalable, flexible system, which is capable of computing neural networks of arbitrary topology and scale, with full independence of special hardware from the software's point of view. On the other hand, computational power should be added, whenever needed and flexibly adapted to the requirements of the application. Hardware independence is achieved by a run time system which is capable of using all available computing power, including multiple host CPUs and an arbitrary number of neural coprocessors autonomously. The realization of arbitrary neural topologies is provided through the implementation of the elementary operations which can be found in most neural topologies.}, language = {en} } @article{ElsenKraissKrumbiegeletal.1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk and Walter, Peter and Wickel, Jochen}, title = {Visual information retrieval for 3D product identification: a midterm report}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {13}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {1}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, pages = {64 -- 67}, year = {1999}, language = {en} } @article{ElsenHartungHornetal.2001, author = {Elsen, Ingo and Hartung, Frank and Horn, Uwe and Kampmann, Markus and Peters, Liliane}, title = {Streaming technology in 3G mobile communication systems}, series = {Computer : innovative technology for computer professionals}, volume = {34}, journal = {Computer : innovative technology for computer professionals}, number = {9 Seiten}, editor = {Voas, Jeffrey}, publisher = {IEEE}, address = {New York}, issn = {0018-9162}, pages = {46 -- 52}, year = {2001}, abstract = {Third-generation mobile communication systems will combine standardized streaming with a range of unique services to provide high-quality Internet content that meets the specific needs of the rapidly growing mobile market.}, language = {en} } @article{Wolf2000, author = {Wolf, Martin R.}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, journal = {ACM SIGGROUP Bulletin. 21 (2000), H. 2}, publisher = {-}, pages = {5 -- 8}, year = {2000}, language = {en} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, pages = {20 -- 28}, year = {2010}, language = {en} } @article{Ferrein2010, author = {Ferrein, Alexander}, title = {golog.lua: Towards a Non-Prolog Implementation of Golog for Embedded Systems}, series = {Cognitive Robotics / Lakemeyer, Gerhard (ed.)}, journal = {Cognitive Robotics / Lakemeyer, Gerhard (ed.)}, pages = {1 -- 15}, year = {2010}, language = {en} } @article{Wolf2003, author = {Wolf, Martin R.}, title = {Risiko- und Maßnahmenmanagement bei der Computervalidierung}, series = {Pharma-Technologie-Journal (2003)}, journal = {Pharma-Technologie-Journal (2003)}, publisher = {-}, isbn = {0931-9700}, pages = {50 -- 62}, year = {2003}, language = {de} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{WolfFoltzSchlicketal.2000, author = {Wolf, Martin R. and Foltz, Christian and Schlick, Christopher and Luczak, Holger}, title = {Empirische Untersuchung eines Groupware-basierten Unterst{\"u}tzungs-Systems f{\"u}r verfahrenstechnische Entwickler / Wolf, M. ; Foltz, C. ; Schlick, C. ; Luczak, H.}, series = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, journal = {Zeitschrift f{\"u}r Arbeitswissenschaft. 54 (2000), H. 3-4}, publisher = {-}, isbn = {0340-2444}, pages = {258 -- 266}, year = {2000}, language = {de} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin R. and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @article{SchifferFerrein2016, author = {Schiffer, Stefan and Ferrein, Alexander}, title = {Decision-Theoretic Planning with Fuzzy Notions in GOLOG}, series = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, volume = {24}, journal = {International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems}, number = {Issue Suppl. 2}, publisher = {World Scientific}, address = {Singapur}, issn = {1793-6411}, doi = {10.1142/S0218488516400134}, pages = {123 -- 143}, year = {2016}, abstract = {In this paper we present an extension of the action language Golog that allows for using fuzzy notions in non-deterministic argument choices and the reward function in decision-theoretic planning. Often, in decision-theoretic planning, it is cumbersome to specify the set of values to pick from in the non-deterministic-choice-of-argument statement. Also, even for domain experts, it is not always easy to specify a reward function. Instead of providing a finite domain for values in the non-deterministic-choice-of-argument statement in Golog, we now allow for stating the argument domain by simply providing a formula over linguistic terms and fuzzy uents. In Golog's forward-search DT planning algorithm, these formulas are evaluated in order to find the agent's optimal policy. We illustrate this in the Diner Domain where the agent needs to calculate the optimal serving order.}, language = {en} } @article{FerreinSteinbauer2016, author = {Ferrein, Alexander and Steinbauer, Gerald}, title = {The Interplay of Aldebaran and RoboCup}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {30}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {3-4}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, doi = {10.1007/s13218-016-0440-1}, pages = {325 -- 326}, year = {2016}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin R.}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{WolfLuczak1999, author = {Wolf, Martin R. and Luczak, Holger}, title = {Computer Supported Communication and Cooperation - Making Information Aware / Luczak, H. ; Wolf, M.}, series = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, journal = {Human-computer interaction : proceedings of HCI International '99 (the 8th International Conference on Human-Computer Interaction), Munich, Germany, August 22 - 26, 1999}, publisher = {Erlbaum}, address = {Mahwah, NJ}, pages = {298 -- 302}, year = {1999}, language = {en} } @article{FerreinDyllaLakemeyeretal.2008, author = {Ferrein, Alexander and Dylla, Frank and Lakemeyer, Gerhard and Murray, Jan}, title = {Approaching a formal soccer theory from behaviour specifications in robotic soccer / Dylla, Frank ; Ferrein, Alexander ; Lakemeyer, Gerhard ; Murray, Jan ; Obst, Oliver ; R{\"o}fer, Thomas ; Schiffer, Stefan ; Stolzenburg, Frieder ; Visser, Ubbo ; Wagner, Tho}, series = {Computers in sport / editors: P Dabnichki}, journal = {Computers in sport / editors: P Dabnichki}, publisher = {WIT Press}, address = {Southampton}, isbn = {978-1-8456-4064-4}, pages = {161 -- 185}, year = {2008}, language = {en} } @article{BooysenRiegerFerrein2011, author = {Booysen, Tracy and Rieger, Michael and Ferrein, Alexander}, title = {Towards inexpensive robots for science \& technology teaching and education in Africa}, publisher = {IEEE}, address = {New York}, isbn = {978-1-61284-992-8}, pages = {1 -- 6}, year = {2011}, language = {en} } @article{GspandlPillReipetal.2011, author = {Gspandl, Stephan and Pill, Ingo and Reip, Michael and Steinbauer, Gerald and Ferrein, Alexander}, title = {Belief Management for High-Level Robot Programs}, series = {Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence [electronic resource] : Barcelona, Catalonia, Spain, 16 - 22 July 2011 / sponsored by International Joint Conferences on Artificial Intelligence (IJCAI) and the Association for the Advancement of Artificial Intelligence (AAAI). Ed. by Toby Walsh}, journal = {Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence [electronic resource] : Barcelona, Catalonia, Spain, 16 - 22 July 2011 / sponsored by International Joint Conferences on Artificial Intelligence (IJCAI) and the Association for the Advancement of Artificial Intelligence (AAAI). Ed. by Toby Walsh}, pages = {900 -- 905}, year = {2011}, language = {en} } @article{Ferrein2008, author = {Ferrein, Alexander}, title = {Towards applying soccer moves in the RoboCup Standard Platform League}, series = {{\"O}GAI-Journal}, volume = {Bd. 27}, journal = {{\"O}GAI-Journal}, number = {H. 3}, organization = {{\"O}sterreichische Gesellschaft f{\"u}r Artificial Intelligence}, issn = {0254-4326}, pages = {4 -- 9}, year = {2008}, language = {en} }