@article{LepersRakePuetter1976, author = {Lepers, Heinrich and Rake, H. and P{\"u}tter, L.}, title = {Prozeßrechnerautomatisierung von W{\"a}rmeprozessen}, series = {Elektro-Anzeiger}, volume = {29}, journal = {Elektro-Anzeiger}, number = {5}, publisher = {Konradin}, address = {Leinfelden-Echterdingen}, issn = {0013-5518}, pages = {98 -- 101}, year = {1976}, language = {de} } @article{LepersJaegerPuetter1977, author = {Lepers, Heinrich and J{\"a}ger, G. and P{\"u}tter, L.}, title = {Anwendung eines Prozessmodells zur Regelung der Produktqualit{\"a}t bei der Zementklinker-Herstellung / Jaeger, G. ; Lepers, H. Puetter, L. [u.a.]}, series = {VDI-Berichte (1977)}, journal = {VDI-Berichte (1977)}, pages = {87 -- 93}, year = {1977}, language = {de} } @article{Lepers1973, author = {Lepers, Heinrich}, title = {Fehler bei der Systemanalyse aus stochastisch gest{\"o}rten Sprungantworten}, series = {Regelungstechnik und Prozeß-Datenverarbeitung}, volume = {21}, journal = {Regelungstechnik und Prozeß-Datenverarbeitung}, number = {7}, publisher = {De Gruyter}, address = {Berlin}, issn = {0034-3226}, doi = {10.1524/auto.1973.21.112.229}, pages = {229 -- 233}, year = {1973}, abstract = {Es wird von Gleichungen ausgegangen, mit denen die Modellkoeffizienten von Regelstrecken mit Ausgleich aus der gemessenen Sprungantwort ermittelt werden k{\"o}nnen. Die {\"U}bertragungsfunktion der Regelstrecke hat einen konstanten Z{\"a}hler und ein Nennerpolynom. Unter der Annahme, daß die ideale und exakte Sprungantwort des Systems durch ein stochastisches Signal gest{\"o}rt wird, wird untersucht, wie die Fehler der ermittelten Modellkoeffizienten von Kennwerten des St{\"o}rsignals und von der Meßzeit f{\"u}r die Sprungantwort abh{\"a}ngen. Durch eine Simulation auf dem Digitalrechner wurden die Ergebnisse kontrolliert. Es zeigt sich, daß durch eine Filterung der gest{\"o}rten Sprungantwort {\"u}ber einen Tiefpaß keine Verbesserung der Analyseergebnisse erreicht werden kann, da das Identifizierungsverfahren eine gl{\"a}ttende Eigenschaft hat.}, language = {de} } @article{Lepers1972, author = {Lepers, Heinrich}, title = {Empfindlichkeitsuntersuchungen zur Beurteilung von Optimierungen mit fehlerhaften Modellen}, series = {Messen, Steuern, Regeln}, volume = {15}, journal = {Messen, Steuern, Regeln}, number = {11}, publisher = {Oldenbourg}, address = {M{\"u}nchen}, issn = {0026-0347}, pages = {407 -- 410}, year = {1972}, language = {de} } @article{Lepers1972, author = {Lepers, Heinrich}, title = {Integrationsverfahren zur Systemidentifizierung aus gemessenen Systemantworten}, series = {Regelungstechnik}, volume = {20}, journal = {Regelungstechnik}, number = {10}, publisher = {Oldenbourg}, address = {M{\"u}nchen}, doi = {10.1524/auto.1972.20.112.417}, pages = {417 -- 422}, year = {1972}, abstract = {F{\"u}r viele Zwecke ist es n{\"u}tzlich, von einem technischen System ein mathematisches Modell zu haben. F{\"u}r Systeme, die sich durch eine Verz{\"o}gerung h{\"o}herer Ordnung mit oder ohne Ausgleich beschreiben lassen, wird ein Identifizierungsverfahren vorgestellt, das aus gemessenen Zeitfunktionen die Bestimmung einer {\"U}bertragungsfunktion erm{\"o}glicht. Die Systeme werden dabei durch Testsignale erregt. Die Modellkoeffizienten werden dann mit Hilfe eines Integrationsverfahrens aus dem Testsignal und der Antwort des Systems auf dieses Testsignal bestimmt. Ein praktisches Beispiel zeigt die Leistungsf{\"a}higkeit des Verfahrens.}, language = {de} } @article{LeiseEsserEichenlaubetal.2021, author = {Leise, Philipp and Eßer, Arved and Eichenlaub, Tobias and Schleiffer, Jean-Eric and Altherr, Lena and Rinderknecht, Stephan and Pelz, Peter F.}, title = {Sustainable system design of electric powertrains - comparison of optimization methods}, series = {Engineering Optimization}, journal = {Engineering Optimization}, publisher = {Taylor \& Francis}, address = {London}, issn = {0305-215X}, doi = {10.1080/0305215X.2021.1928660}, year = {2021}, abstract = {The transition within transportation towards battery electric vehicles can lead to a more sustainable future. To account for the development goal 'climate action' stated by the United Nations, it is mandatory, within the conceptual design phase, to derive energy-efficient system designs. One barrier is the uncertainty of the driving behaviour within the usage phase. This uncertainty is often addressed by using a stochastic synthesis process to derive representative driving cycles and by using cycle-based optimization. To deal with this uncertainty, a new approach based on a stochastic optimization program is presented. This leads to an optimization model that is solved with an exact solver. It is compared to a system design approach based on driving cycles and a genetic algorithm solver. Both approaches are applied to find efficient electric powertrains with fixed-speed and multi-speed transmissions. Hence, the similarities, differences and respective advantages of each optimization procedure are discussed.}, language = {en} } @article{LeingartnerMaurerFerreinetal.2016, author = {Leingartner, Max and Maurer, Johannes and Ferrein, Alexander and Steinbauer, Gerald}, title = {Evaluation of Sensors and Mapping Approaches for Disasters in Tunnels}, series = {Journal of Field Robotics}, volume = {33}, journal = {Journal of Field Robotics}, number = {8}, publisher = {Wiley-VCH}, address = {Weinheim}, issn = {1556-4967}, doi = {10.1002/rob.21611}, pages = {1037 -- 1057}, year = {2016}, abstract = {Ground or aerial robots equipped with advanced sensing technologies, such as three-dimensional laser scanners and advanced mapping algorithms, are deemed useful as a supporting technology for first responders. A great deal of excellent research in the field exists, but practical applications at real disaster sites are scarce. Many projects concentrate on equipping robots with advanced capabilities, such as autonomous exploration or object manipulation. In spite of this, realistic application areas for such robots are limited to teleoperated reconnaissance or search. In this paper, we investigate how well state-of-the-art and off-the-shelf components and algorithms are suited for reconnaissance in current disaster-relief scenarios. The basic idea is to make use of some of the most common sensors and deploy some widely used algorithms in a disaster situation, and to evaluate how well the components work for these scenarios. We acquired the sensor data from two field experiments, one from a disaster-relief operation in a motorway tunnel, and one from a mapping experiment in a partly closed down motorway tunnel. Based on these data, which we make publicly available, we evaluate state-of-the-art and off-the-shelf mapping approaches. In our analysis, we integrate opinions and replies from first responders as well as from some algorithm developers on the usefulness of the data and the limitations of the deployed approaches, respectively. We discuss the lessons we learned during the two missions. These lessons are interesting for the community working in similar areas of urban search and rescue, particularly reconnaissance and search.}, language = {en} } @article{LambersBragard2017, author = {Lambers, Andreas and Bragard, Michael}, title = {Kinetische Skulptur - Treffen sich ein E-Techniker und ein K{\"u}nstler ...}, series = {Elektor : learn, design, share}, volume = {48}, journal = {Elektor : learn, design, share}, number = {9}, publisher = {Elektor-Verlag}, address = {Aachen}, issn = {0932-5468}, pages = {78 -- 83}, year = {2017}, abstract = {Die Verbindung der Welten dressierter Elektronen und grenzenloser Kreativit{\"a}t bietet ein großes Potential; zum Beispiel bei modernen Skulpturen, deren Form sich durch Motoren ver{\"a}ndern kann. An der FH Aachen wurde ein solches Projekt verwirklicht: Eine Matrix aus Holzkugeln kann Piktogramme anzeigen, aber auch mathematische Funktionen visualisieren. In diesem Artikel beschreiben wir die clevere Ansteuerung der Motoren.}, language = {de} } @article{LagemaatVosMaasetal.2014, author = {Lagemaat, Miriam W. and Vos, Eline K. and Maas, Marnix C. and Bitz, Andreas and Orzada, Stephan and Uden, Mark J. van and Kobus, Thiele and Heerschap, Arend and Scheenen, Tom W. J.}, title = {Phosphorus magnetic resonance spectroscopic imaging at 7 T in patients with prostate cancer}, series = {Investigative Radiology}, volume = {49}, journal = {Investigative Radiology}, number = {5}, publisher = {Lippincott Williams \& Wilkins}, address = {Philadelphia, Pa.}, issn = {1536-0210}, doi = {10.1097/RLI.0000000000000012}, pages = {363 -- 372}, year = {2014}, abstract = {Objectives The aim of this study was to identify characteristics of phosphorus (³¹P) spectra of the human prostate and to investigate changes of individual phospholipid metabolites in prostate cancer through in vivo ³¹P magnetic resonance spectroscopic imaging (MRSI) at 7 T. Materials and Methods In this institutional review board-approved study, 15 patients with biopsy-proven prostate cancer underwent T₂-weighted magnetic resonance imaging and 3-dimensional ³¹P MRSI at 7 T. Voxels were selected at the tumor location, in normal-appearing peripheral zone tissue, normal-appearing transition zone tissue, and in the base of the prostate close to the seminal vesicles. Phosphorus metabolite ratios were determined and compared between tissue types. Results Signals of phosphoethanolamine (PE) and phosphocholine (PC) were present and well resolved in most ³¹P spectra in the prostate. Glycerophosphocholine signals were observable in 43\% of the voxels in malignant tissue, but in only 10\% of the voxels in normal-appearing tissue away from the seminal vesicles. In many spectra, independent of tissue type, 2 peaks resonated in the chemical shift range of inorganic phosphate, possibly representing 2 separate pH compartments. The PC/PE ratio in the seminal vesicles was highly elevated compared with the prostate in 5 patients. A considerable overlap of ³¹P metabolite ratios was found between prostate cancer and normal-appearing prostate tissue, preventing direct discrimination of these tissues. The only 2 patients with high Gleason scores tumors (≥4+5) presented with high PC and glycerophosphocholine levels in their cancer lesions. Conclusions Phosphorus MRSI at 7 T shows distinct features of phospholipid metabolites in the prostate gland and its surrounding structures. In this exploratory study, no differences in ³¹P metabolite ratios were observed between prostate cancer and normal-appearing prostate tissue possibly because of the partial volume effects of small tumor foci in large MRSI voxels.}, language = {en} } @article{LagemaatMaasVosetal.2015, author = {Lagemaat, Miriam W. and Maas, Marnix C. and Vos, Eline K. and Bitz, Andreas and Orzada, Stephan and Weiland, Elisabeth and Uden, Mark J. van and Kobus, Thiele and Heerschap, Arend and Scheenen, Tom W. J.}, title = {(31) P MR spectroscopic imaging of the human prostate at 7 T: T1 relaxation times, Nuclear Overhauser Effect, and spectral characterization}, series = {Magnetic Resonance in Medicine}, volume = {73}, journal = {Magnetic Resonance in Medicine}, number = {3}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2594}, doi = {10.1002/mrm.25209}, pages = {909 -- 920}, year = {2015}, language = {en} } @article{LagemaatBreukelsVosetal.2016, author = {Lagemaat, Miriam W. and Breukels, Vincent and Vos, Eline K. and B., Adam and Uden, Mark J. van and Orzada, Stephan and Bitz, Andreas and Maas, Marnix C. and Scheenen, Tom W. J.}, title = {¹H MR spectroscopic imaging of the prostate at 7T using spectral-spatial pulses}, series = {Magnetic Resonance in Medicine}, volume = {75}, journal = {Magnetic Resonance in Medicine}, number = {3}, publisher = {International Society for Magnetic Resonance in Medicine}, issn = {1522-2594}, doi = {10.1002/mrm.25569}, pages = {933 -- 945}, year = {2016}, abstract = {Purpose To assess the feasibility of prostate ¹H MR spectroscopic imaging (MRSI) using low-power spectral-spatial (SPSP) pulses at 7T, exploiting accurate spectral selection and spatial selectivity simultaneously. Methods A double spin-echo sequence was equipped with SPSP refocusing pulses with a spectral selectivity of 1 ppm. Three-dimensional prostate ¹H-MRSI at 7T was performed with the SPSP-MRSI sequence using an 8-channel transmit array coil and an endorectal receive coil in three patients with prostate cancer and in one healthy subject. No additional water or lipid suppression pulses were used. Results Prostate ¹H-MRSI could be obtained well within specific absorption rate (SAR) limits in a clinically feasible time (10 min). Next to the common citrate signals, the prostate spectra exhibited high spermine signals concealing creatine and sometimes also choline. Residual lipid signals were observed at the edges of the prostate because of limitations in spectral and spatial selectivity. Conclusion It is possible to perform prostate ¹H-MRSI at 7T with a SPSP-MRSI sequence while using separate transmit and receive coils. This low-SAR MRSI concept provides the opportunity to increase spatial resolution of MRSI within reasonable scan times.}, language = {en} } @article{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin R.}, title = {GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training}, series = {International Journal on Advances in Security}, volume = {11}, journal = {International Journal on Advances in Security}, number = {3 \& 4}, publisher = {IARIA Journals}, issn = {1942-2636}, pages = {274 -- 287}, year = {2018}, abstract = {To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.}, language = {en} } @article{KoenigVoelkerWolfetal.2016, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin R. and Schuba, Marko}, title = {Gamified Hacking Offence Simulation-based Training (GHOST)}, series = {Crisis Prevention}, volume = {2016}, journal = {Crisis Prevention}, number = {3}, publisher = {Beta}, address = {Bonn}, pages = {44 -- 46}, year = {2016}, language = {de} } @article{KoellenspergerBragardPlumetal.2009, author = {K{\"o}llensperger, P. and Bragard, Michael and Plum, T. and De Doncker, R. W.}, title = {The dual GCT : new high-power device using optimized GCT technology}, series = {IEEE transactions on industry applications}, volume = {45}, journal = {IEEE transactions on industry applications}, number = {5}, issn = {0093-9994}, doi = {10.1109/TIA.2009.2027364}, pages = {1754 -- 1762}, year = {2009}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin R.}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KrauseSchaerli1993, author = {Krause, Gregor and Sch{\"a}rli, U.}, title = {Bedingungen f{\"u}r das Auftreten von Kippschwingungen bei Hochspannungswandlern im Netz}, year = {1993}, language = {de} } @article{KrauseSchuppeSaureetal.1988, author = {Krause, Gregor and Schuppe, W.D. and Saure, M. and Andress, H.}, title = {Sensitive Analytical and Physical Methods for Diagnosis of Variations in Polyolefin Plaques and Cable Insulations / W.D. Schuppe, M. Saure, H. Andress, K. M{\"o}ller, D. Meurer, G. Krause}, series = {Proceedings of the 32nd session : 28th August - 3rd September.}, journal = {Proceedings of the 32nd session : 28th August - 3rd September.}, year = {1988}, language = {en} } @article{KrauseSchuppeSaureetal.1989, author = {Krause, Gregor and Schuppe, W.D. and Saure, M. and Andress, H.}, title = {Sensitive Analytische und Physikalische Verfahren zum Nachweis von Ver{\"a}nderungen in Platten und Kabelisolierungen aus Polyolefinen / W.D. Schuppe, M. Saure, H. Andress, K. M{\"o}ller, D. Meurer, G. Krause}, series = {AEG Technische Mitteilungen (1989)}, journal = {AEG Technische Mitteilungen (1989)}, year = {1989}, language = {de} }