@article{FiedlerLaddClemensetal.2020, author = {Fiedler, Thomas M. and Ladd, Mark E. and Clemens, Markus and Bitz, Andreas}, title = {Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging}, series = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, volume = {2}, journal = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, number = {3}, publisher = {IEEE}, address = {New York, NY}, isbn = {2637-6423}, doi = {10.1109/LEMCPA.2020.3029747}, pages = {1 -- 8}, year = {2020}, abstract = {Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.}, language = {en} } @article{HueningBackes2020, author = {H{\"u}ning, Felix and Backes, Andreas}, title = {Direct observation of large Barkhausen jump in thin Vicalloy wires}, series = {IEEE Magnetics Letters}, volume = {11}, journal = {IEEE Magnetics Letters}, number = {Art. 2506504}, publisher = {IEEE}, address = {New York, NY}, isbn = {1949-307X}, doi = {10.1109/LMAG.2020.3046411}, pages = {1 -- 4}, year = {2020}, language = {en} } @article{AltherrEdererLorenzetal.2014, author = {Altherr, Lena and Ederer, Thorsten and Lorenz, Ulf and Pelz, Peter F. and P{\"o}ttgen, Philipp}, title = {Experimental validation of an enhanced system synthesis approach}, series = {Operations Research Proceedings 2014}, journal = {Operations Research Proceedings 2014}, editor = {L{\"u}bbecke, Marco and Koster, Arie and Letmathe, Peter and Madlener, Reihard and Peis, Britta and Walther, Grit}, publisher = {Springer}, address = {Basel}, isbn = {978-3-319-28695-2}, doi = {10.1007/978-3-319-28697-6_1}, pages = {6}, year = {2014}, abstract = {Planning the layout and operation of a technical system is a common task for an engineer. Typically, the workflow is divided into consecutive stages: First, the engineer designs the layout of the system, with the help of his experience or of heuristic methods. Secondly, he finds a control strategy which is often optimized by simulation. This usually results in a good operating of an unquestioned sys- tem topology. In contrast, we apply Operations Research (OR) methods to find a cost-optimal solution for both stages simultaneously via mixed integer program- ming (MILP). Technical Operations Research (TOR) allows one to find a provable global optimal solution within the model formulation. However, the modeling error due to the abstraction of physical reality remains unknown. We address this ubiq- uitous problem of OR methods by comparing our computational results with mea- surements in a test rig. For a practical test case we compute a topology and control strategy via MILP and verify that the objectives are met up to a deviation of 8.7\%.}, language = {en} } @article{PoettgenEdererAltherretal.2015, author = {P{\"o}ttgen, Philipp and Ederer, Thorsten and Altherr, Lena and Lorenz, Ulf and Pelz, Peter F.}, title = {Examination and optimization of a heating circuit for energy-efficient buildings}, series = {Energy Technology}, volume = {4}, journal = {Energy Technology}, number = {1}, publisher = {WILEY-VCH Verlag}, address = {Weinheim}, isbn = {2194-4296}, doi = {10.1002/ente.201500252}, pages = {136 -- 144}, year = {2015}, abstract = {The conference center darmstadtium in Darmstadt is a prominent example of energy efficient buildings. Its heating system consists of different source and consumer circuits connected by a Zortstr{\"o}m reservoir. Our goal was to reduce the energy costs of the system as much as possible. Therefore, we analyzed its supply circuits. The first step towards optimization is a complete examination of the system: 1) Compilation of an object list for the system, 2) collection of the characteristic curves of the components, and 3) measurement of the load profiles of the heat and volume-flow demand. Instead of modifying the system manually and testing the solution by simulation, the second step was the creation of a global optimization program. The objective was to minimize the total energy costs for one year. We compare two different topologies and show opportunities for significant savings.}, language = {en} } @article{AltherrEdererPoettgenetal.2015, author = {Altherr, Lena and Ederer, Thorsten and P{\"o}ttgen, Philipp and Lorenz, Ulf and Pelz, Peter F.}, title = {Multicriterial optimization of technical systems considering multiple load and availability scenarios}, series = {Applied Mechanics and Materials}, volume = {807}, journal = {Applied Mechanics and Materials}, editor = {Pelz, Peter F. and Groche, Peter}, isbn = {1660-9336}, doi = {10.4028/www.scientific.net/AMM.807.247}, pages = {247 -- 256}, year = {2015}, abstract = {Cheap does not imply cost-effective -- this is rule number one of zeitgeisty system design. The initial investment accounts only for a small portion of the lifecycle costs of a technical system. In fluid systems, about ninety percent of the total costs are caused by other factors like power consumption and maintenance. With modern optimization methods, it is already possible to plan an optimal technical system considering multiple objectives. In this paper, we focus on an often neglected contribution to the lifecycle costs: downtime costs due to spontaneous failures. Consequently, availability becomes an issue.}, language = {en} } @article{CzarneckiSpiliopoulou2012, author = {Czarnecki, Christian and Spiliopoulou, Myra}, title = {A holistic framework for the implementation of a next generation network}, series = {International Journal of Business Information Systems}, volume = {9}, journal = {International Journal of Business Information Systems}, number = {4}, publisher = {Inderscience Enterprises}, address = {Olney, Bucks}, issn = {1746-0972}, doi = {10.1504/IJBIS.2012.046291}, pages = {385 -- 401}, year = {2012}, abstract = {As the potential of a next generation network (NGN) is recognised, telecommunication companies consider switching to it. Although the implementation of an NGN seems to be merely a modification of the network infrastructure, it may trigger or require changes in the whole company, because it builds upon the separation between service and transport, a flexible bundling of services to products and the streamlining of the IT infrastructure. We propose a holistic framework, structured into the layers 'strategy', 'processes' and 'information systems' and incorporate into each layer all concepts necessary for the implementation of an NGN, as well as the alignment of these concepts. As a first proof-of-concept for our framework we have performed a case study on the introduction of NGN in a large telecommunication company; we show that our framework captures all topics that are affected by an NGN implementation.}, language = {en} } @article{CzarneckiWinkelmannSpiliopoulou2010, author = {Czarnecki, Christian and Winkelmann, Axel and Spiliopoulou, Myra}, title = {Services in electronic telecommunication markets: a framework for planning the virtualization of processes}, series = {Electronic Markets}, volume = {20}, journal = {Electronic Markets}, number = {3-4}, publisher = {Springer}, address = {Berlin}, issn = {1422-8890}, doi = {10.1007/s12525-010-0045-8}, pages = {197 -- 207}, year = {2010}, abstract = {The potential of electronic markets in enabling innovative product bundles through flexible and sustainable partnerships is not yet fully exploited in the telecommunication industry. One reason is that bundling requires seamless de-assembling and re-assembling of business processes, whilst processes in telecommunication companies are often product-dependent and hard to virtualize. We propose a framework for the planning of the virtualization of processes, intended to assist the decision maker in prioritizing the processes to be virtualized: (a) we transfer the virtualization pre-requisites stated by the Process Virtualization Theory in the context of customer-oriented processes in the telecommunication industry and assess their importance in this context, (b) we derive IT-oriented requirements for the removal of virtualization barriers and highlight their demand on changes at different levels of the organization. We present a first evaluation of our approach in a case study and report on lessons learned and further steps to be performed.}, language = {en} } @article{HofmannLimpertMatareetal.2018, author = {Hofmann, Till and Limpert, Nicolas and Matar{\´e}, Victor and Sch{\"o}nitz, Sebastian and Niemueller, Tim and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {The Carologistics RoboCup Logistics Team 2018}, year = {2018}, abstract = {The Carologistics team participates in the RoboCup Logistics League for the seventh year. The RCLL requires precise vision, manipulation and path planning, as well as complex high-level decision making and multi-robot coordination. We outline our approach with an emphasis on recent modifications to those components. The team members in 2018 are David Bosen, Christoph Gollok, Mostafa Gomaa, Daniel Habering, Till Hofmann, Nicolas Limpert, Sebastian Sch{\"o}nitz, Morian Sonnet, Carsten Stoffels, and Tarik Viehmann. This paper is based on the last year's team description.}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{LimpertWiesenFerreinetal.2019, author = {Limpert, Nicolas and Wiesen, Patrick and Ferrein, Alexander and Kallweit, Stephan and Schiffer, Stefan}, title = {The ROSIN Project and its Outreach to South Africa}, series = {R\&D Journal}, volume = {35}, journal = {R\&D Journal}, pages = {1 -- 6}, year = {2019}, language = {en} } @article{HarzheimMuehmelHeuermann2021, author = {Harzheim, Thomas and M{\"u}hmel, Marc and Heuermann, Holger}, title = {A SFCW harmonic radar system for maritime search and rescue using passive and active tags}, series = {International Journal of Microwave and Wireless Technologies}, volume = {13}, journal = {International Journal of Microwave and Wireless Technologies}, number = {Special Issue 7}, publisher = {Cambridge University Press}, address = {Cambridge}, doi = {10.1017/S1759078721000520}, pages = {691 -- 707}, year = {2021}, abstract = {This paper introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested while attached to life jackets and a small boat. In this demonstration test carried out on the Baltic Sea, the system was able to detect and range the active tags up to a distance of 5800 m using an illumination signal transmit-power of 100 W. Special attention is given to the development, performance, and conceptual differences between passive and active tags used in the system. Guidelines for achieving a high HR dynamic range, including a system components description, are given and a comparison with other HR systems is performed. System integration with a commercial maritime X-band navigation radar is shown to demonstrate a solution for rapid search and rescue response and quick localization.}, language = {en} } @article{RoepkeKoehlerDruryetal.2020, author = {Roepke, Rene and K{\"o}hler, Klemens and Drury, Vincent and Schroeder, Ulrik and Wolf, Martin and Meyer, Ulrike}, title = {A pond full of phishing games - analysis of learning games for anti-phishing education}, series = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, journal = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-62433-0}, doi = {10.1007/978-3-030-62433-0_32020}, pages = {41 -- 60}, year = {2020}, abstract = {Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom's Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.}, language = {en} } @article{HoffmannRohrbachUhletal.2022, author = {Hoffmann, Andreas and Rohrbach, Felix and Uhl, Matthias and Ceblin, Maximilian and Bauer, Thomas and Mallah, Marcel and Jacob, Timo and Heuermann, Holger and Kuehne, Alexander J. C.}, title = {Atmospheric pressure plasma-jet treatment of polyacrylonitrile-nonwovens—Stabilization and roll-to-roll processing}, series = {Journal of Applied Polymer Science}, volume = {139}, journal = {Journal of Applied Polymer Science}, number = {37}, publisher = {Wiley}, issn = {0021-8995 (Print)}, doi = {10.1002/app.52887}, pages = {1 -- 9}, year = {2022}, abstract = {Carbon nanofiber nonwovens represent a powerful class of materials with prospective application in filtration technology or as electrodes with high surface area in batteries, fuel cells, and supercapacitors. While new precursor-to-carbon conversion processes have been explored to overcome productivity restrictions for carbon fiber tows, alternatives for the two-step thermal conversion of polyacrylonitrile precursors into carbon fiber nonwovens are absent. In this work, we develop a continuous roll-to-roll stabilization process using an atmospheric pressure microwave plasma jet. We explore the influence of various plasma-jet parameters on the morphology of the nonwoven and compare the stabilized nonwoven to thermally stabilized samples using scanning electron microscopy, differential scanning calorimetry, and infrared spectroscopy. We show that stabilization with a non-equilibrium plasma-jet can be twice as productive as the conventional thermal stabilization in a convection furnace, while producing electrodes of comparable electrochemical performance.}, language = {en} } @article{FiedlerOrzadaFloeseretal.2022, author = {Fiedler, Thomas M. and Orzada, Stephan and Fl{\"o}ser, Martina and Rietsch, Stefan H. G. and Schmidt, Simon and Stelter, Jonathan K. and Wittrich, Marco and Quick, Harald H. and Bitz, Andreas and Ladd, Mark E.}, title = {Performance and safety assessment of an integrated transmitarray for body imaging at 7 T under consideration of specificabsorption rate, tissue temperature, and thermal dose}, series = {NMR in Biomedicine}, volume = {35}, journal = {NMR in Biomedicine}, number = {5}, publisher = {Wiley}, issn = {0952-3480 (Print)}, doi = {10.1002/nbm.4656}, pages = {1 -- 17}, year = {2022}, abstract = {In this study, the performance of an integrated body-imaging array for 7 T with 32 radiofrequency (RF) channels under consideration of local specific absorption rate (SAR), tissue temperature, and thermal dose limits was evaluated and the imaging performance was compared with a clinical 3 T body coil. Thirty-two transmit elements were placed in three rings between the bore liner and RF shield of the gradient coil. Slice-selective RF pulse optimizations for B1 shimming and spokes were performed for differently oriented slices in the body under consideration of realistic constraints for power and local SAR. To improve the B1+ homogeneity, safety assessments based on temperature and thermal dose were performed to possibly allow for higher input power for the pulse optimization than permissible with SAR limits. The results showed that using two spokes, the 7 T array outperformed the 3 T birdcage in all the considered regions of interest. However, a significantly higher SAR or lower duty cycle at 7 T is necessary in some cases to achieve similar B1+ homogeneity as at 3 T. The homogeneity in up to 50 cm-long coronal slices can particularly benefit from the high RF shim performance provided by the 32 RF channels. The thermal dose approach increases the allowable input power and the corresponding local SAR, in one example up to 100 W/kg, without limiting the exposure time necessary for an MR examination. In conclusion, the integrated antenna array at 7 T enables a clinical workflow for body imaging and comparable imaging performance to a conventional 3 T clinical body coil.}, language = {en} } @article{SchulteTiggesFoersterNikolovskietal.2022, author = {Schulte-Tigges, Joschua and F{\"o}rster, Marco and Nikolovski, Gjorgji and Reke, Michael and Ferrein, Alexander and Kaszner, Daniel and Matheis, Dominik and Walter, Thomas}, title = {Benchmarking of various LiDAR sensors for use in self-driving vehicles in real-world environments}, series = {Sensors}, volume = {22}, journal = {Sensors}, number = {19}, publisher = {MDPI}, address = {Basel}, issn = {1424-8220}, doi = {10.3390/s22197146}, pages = {20 Seiten}, year = {2022}, abstract = {Abstract In this paper, we report on our benchmark results of the LiDAR sensors Livox Horizon, Robosense M1, Blickfeld Cube, Blickfeld Cube Range, Velodyne Velarray H800, and Innoviz Pro. The idea was to test the sensors in different typical scenarios that were defined with real-world use cases in mind, in order to find a sensor that meet the requirements of self-driving vehicles. For this, we defined static and dynamic benchmark scenarios. In the static scenarios, both LiDAR and the detection target do not move during the measurement. In dynamic scenarios, the LiDAR sensor was mounted on the vehicle which was driving toward the detection target. We tested all mentioned LiDAR sensors in both scenarios, show the results regarding the detection accuracy of the targets, and discuss their usefulness for deployment in self-driving cars.}, language = {en} } @article{CollPeralesSchulteTiggesRondinoneetal.2022, author = {Coll-Perales, Baldomero and Schulte-Tigges, Joschua and Rondinone, Michele and Gozalvez, Javier and Reke, Michael and Matheis, Dominik and Walter, Thomas}, title = {Prototyping and evaluation of infrastructure-assisted transition of control for cooperative automated vehicles}, series = {IEEE Transactions on Intelligent Transportation Systems}, volume = {23}, journal = {IEEE Transactions on Intelligent Transportation Systems}, number = {7}, publisher = {IEEE}, issn = {1524-9050 (Print)}, doi = {10.1109/TITS.2021.3061085}, pages = {6720 -- 6736}, year = {2022}, abstract = {Automated driving is now possible in diverse road and traffic conditions. However, there are still situations that automated vehicles cannot handle safely and efficiently. In this case, a Transition of Control (ToC) is necessary so that the driver takes control of the driving. Executing a ToC requires the driver to get full situation awareness of the driving environment. If the driver fails to get back the control in a limited time, a Minimum Risk Maneuver (MRM) is executed to bring the vehicle into a safe state (e.g., decelerating to full stop). The execution of ToCs requires some time and can cause traffic disruption and safety risks that increase if several vehicles execute ToCs/MRMs at similar times and in the same area. This study proposes to use novel C-ITS traffic management measures where the infrastructure exploits V2X communications to assist Connected and Automated Vehicles (CAVs) in the execution of ToCs. The infrastructure can suggest a spatial distribution of ToCs, and inform vehicles of the locations where they could execute a safe stop in case of MRM. This paper reports the first field operational tests that validate the feasibility and quantify the benefits of the proposed infrastructure-assisted ToC and MRM management. The paper also presents the CAV and roadside infrastructure prototypes implemented and used in the trials. The conducted field trials demonstrate that infrastructure-assisted traffic management solutions can reduce safety risks and traffic disruptions.}, language = {en} } @article{ElsenKraiss1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich}, title = {System concept and realization of a scalable neurocomputing architecture}, series = {Systems Analysis Modelling Simulation}, volume = {35}, journal = {Systems Analysis Modelling Simulation}, number = {4}, publisher = {Gordon and Breach Science Publishers}, address = {Amsterdam}, issn = {0232-9298}, pages = {399 -- 419}, year = {1999}, abstract = {This paper describes the realization of a novel neurocomputer which is based on the concepts of a coprocessor. In contrast to existing neurocomputers the main interest was the realization of a scalable, flexible system, which is capable of computing neural networks of arbitrary topology and scale, with full independence of special hardware from the software's point of view. On the other hand, computational power should be added, whenever needed and flexibly adapted to the requirements of the application. Hardware independence is achieved by a run time system which is capable of using all available computing power, including multiple host CPUs and an arbitrary number of neural coprocessors autonomously. The realization of arbitrary neural topologies is provided through the implementation of the elementary operations which can be found in most neural topologies.}, language = {en} } @article{ElsenKraissKrumbiegeletal.1999, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk and Walter, Peter and Wickel, Jochen}, title = {Visual information retrieval for 3D product identification: a midterm report}, series = {KI - K{\"u}nstliche Intelligenz}, volume = {13}, journal = {KI - K{\"u}nstliche Intelligenz}, number = {1}, publisher = {Springer}, address = {Berlin}, issn = {1610-1987}, pages = {64 -- 67}, year = {1999}, language = {en} } @article{ElsenHartungHornetal.2001, author = {Elsen, Ingo and Hartung, Frank and Horn, Uwe and Kampmann, Markus and Peters, Liliane}, title = {Streaming technology in 3G mobile communication systems}, series = {Computer : innovative technology for computer professionals}, volume = {34}, journal = {Computer : innovative technology for computer professionals}, number = {9 Seiten}, editor = {Voas, Jeffrey}, publisher = {IEEE}, address = {New York}, issn = {0018-9162}, pages = {46 -- 52}, year = {2001}, abstract = {Third-generation mobile communication systems will combine standardized streaming with a range of unique services to provide high-quality Internet content that meets the specific needs of the rapidly growing mobile market.}, language = {en} }