@article{FiedlerLaddBitz2017, author = {Fiedler, Thomas M. and Ladd, Mark E. and Bitz, Andreas}, title = {SAR Simulations \& Safety}, series = {NeuroImage}, journal = {NeuroImage}, number = {Epub ahead of print}, publisher = {Elsevier}, address = {Amsterdam}, issn = {1053-8119}, doi = {10.1016/j.neuroimage.2017.03.035}, year = {2017}, language = {en} } @article{NoureddineKraffLaddetal.2017, author = {Noureddine, Yacine and Kraff, Oliver and Ladd, Mark E. and Wrede, Karsten H. and Chen, Bixia and Quick, Harald H. and Schaefers, Gregor and Bitz, Andreas}, title = {In vitro and in silico assessment of RF-induced heating around intracranial aneurysm clips at 7 Tesla}, series = {Magnetic Resonance in Medicine}, journal = {Magnetic Resonance in Medicine}, number = {Early view}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.26650}, pages = {14 Seiten}, year = {2017}, language = {en} } @article{FiedlerLaddBitz2017, author = {Fiedler, Thomas M. and Ladd, Mark E. and Bitz, Andreas}, title = {RF safety assessment of a bilateral four-channel transmit/receive 7 Tesla breast coil: SAR versus temperature limits}, series = {Medical Physics}, volume = {44}, journal = {Medical Physics}, number = {1}, doi = {10.1002/mp.12034}, pages = {143 -- 157}, year = {2017}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @article{RietschPfaffenrotBitzetal.2017, author = {Rietsch, Stefan H. G. and Pfaffenrot, Viktor and Bitz, Andreas and Orzada, Stephan and Brunheim, Sascha and Lazik-Palm, Andrea and Theysohn, Jens M. and Ladd, Mark E. and Quick, Harald H. and Kraff, Oliver}, title = {An 8-channel transceiver 7-channel receive RF coil setup for high SNR ultrahigh-field MRI of the shoulder at 7T}, series = {Medical Physics}, journal = {Medical Physics}, number = {Article in press}, publisher = {Wiley}, address = {Hoboken}, issn = {0094-2405}, doi = {10.1002/mp.12612}, year = {2017}, language = {en} } @inproceedings{EndressBragard2017, author = {Endress, Tim and Bragard, Michael}, title = {Recording of efficiency-maps of low-power electric drive systems using a flexible matlab-based test bench}, series = {2017 IEEE 58th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON)}, booktitle = {2017 IEEE 58th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON)}, publisher = {IEEE}, address = {New York}, isbn = {978-1-5386-3846-0}, doi = {10.1109/RTUCON.2017.8124775}, pages = {5 Seiten}, year = {2017}, abstract = {This paper introduces a hardware setup to measure efficiency maps of low-power electric motors and their associated inverters. Here, the power of the device under test (DUT) ranges from some Watts to a few hundred Watts. The torque and speed of the DUT are measured independent of voltage and current in multiple load points. A Matlab-based software approach in combination with an open Texas-Instruments (TI) hardware setup ensures flexibility. Exemplarily, the efficiency field of a Permanent Magnet Synchronous Machine (PMSM) is measured to proof the concept. Brushless-DC (BLDC) motors can be tested as well. The nomenclature in this paper is based on the new European standard DIN EN 50598. Special attention is paid to the calculation of the measurement error.}, language = {en} } @inproceedings{NiemuellerNeumannHenkeetal.2017, author = {Niemueller, Tim and Neumann, Tobias and Henke, Christoph and Sch{\"o}nitz, Sebastian and Reuter, Sebastian and Ferrein, Alexander and Jeschke, Sabina and Lakemeyer, Gerhard}, title = {Improvements for a robust production in the RoboCup logistics league 2016}, series = {RoboCup 2016: Robot World Cup XX. RoboCup 2016.}, booktitle = {RoboCup 2016: Robot World Cup XX. RoboCup 2016.}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-68792-6}, doi = {10.1007/978-3-319-68792-6_49}, pages = {589 -- 600}, year = {2017}, language = {en} } @article{OrzadaBitzJohstetal.2017, author = {Orzada, Stephan and Bitz, Andreas and Johst, S{\"o}ren and Gratz, Marcel and V{\"o}lker, Maximilian N. and Kraff, Oliver and Abuelhaija, Ashraf and Fiedler, Thomas M. and Solbach, Klaus and Quick, Harald H. and Ladd, Mark E.}, title = {Analysis of an integrated 8-Channel Tx/Rx body array for use as a body coil in 7-Tesla MRI}, series = {Frontiers in Physics}, volume = {5}, journal = {Frontiers in Physics}, number = {Jun}, issn = {2296-424X}, doi = {10.3389/fphy.2017.00017}, year = {2017}, language = {en} } @incollection{NiemuellerZwillingLakemeyeretal.2017, author = {Niemueller, Tim and Zwilling, Frederik and Lakemeyer, Gerhard and L{\"o}bach, Matthias and Reuter, Sebastian and Jeschke, Sabina and Ferrein, Alexander}, title = {Cyber-Physical System Intelligence}, series = {Industrial Internet of Things}, booktitle = {Industrial Internet of Things}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42559-7}, doi = {10.1007/978-3-319-42559-7_17}, pages = {447 -- 472}, year = {2017}, abstract = {Cyber-physical systems are ever more common in manufacturing industries. Increasing their autonomy has been declared an explicit goal, for example, as part of the Industry 4.0 vision. To achieve this system intelligence, principled and software-driven methods are required to analyze sensing data, make goal-directed decisions, and eventually execute and monitor chosen tasks. In this chapter, we present a number of knowledge-based approaches to these problems and case studies with in-depth evaluation results of several different implementations for groups of autonomous mobile robots performing in-house logistics in a smart factory. We focus on knowledge-based systems because besides providing expressive languages and capable reasoning techniques, they also allow for explaining how a particular sequence of actions came about, for example, in the case of a failure.}, language = {en} }