TY - JOUR A1 - Hoeveler, B. A1 - Bauknecht, André A1 - Wolf, C. Christian A1 - Janser, Frank T1 - Wind-Tunnel Study of a Wing-Embedded Lifting Fan Remaining Open in Cruise Flight JF - Journal of Aircraft N2 - It is investigated whether a nonrotating lifting fan remaining uncovered during cruise flight, as opposed to being covered by a shutter system, can be realized with limited additional drag and loss of lift during cruise flight. A wind-tunnel study of a wing-embedded lifting fan has been conducted at the Side Wind Test Facility Göttingen of DLR, German Aerospace Center in Göttingen using force, pressure, and stereoscopic particle image velocimetry techniques. The study showed that a step on the lower side of the wing in front of the lifting fan duct increases the lift-to-drag ratio of the whole model by up to 25% for all positive angles of attack. Different sizes and inclinations of the step had limited influence on the surface pressure distribution. The data indicate that these parameters can be optimized to maximize the lift-to-drag ratio. A doubling of the curvature radius of the lifting fan duct inlet lip on the upper side of the wing affected the lift-to-drag ratio by less than 1%. The lifting fan duct inlet curvature can therefore be optimized to maximize the vertical fan thrust of the rotating lifting fan during hovering without affecting the cruise flight performance with a nonrotating fan. Y1 - 2020 U6 - https://doi.org/10.2514/1.C035422 SN - 1533-3868 VL - 57 IS - 4 PB - AIAA CY - Reston, Va. ER - TY - JOUR A1 - Khayyam, Hamid A1 - Jamali, Ali A1 - Bab-Hadiashar, Alireza A1 - Esch, Thomas A1 - Ramakrishna, Seeram A1 - Jalili, Mahdi A1 - Naebe, Minoo T1 - A Novel Hybrid Machine Learning Algorithm for Limited and Big Data Modeling with Application in Industry 4.0 JF - IEEE Access N2 - To meet the challenges of manufacturing smart products, the manufacturing plants have been radically changed to become smart factories underpinned by industry 4.0 technologies. The transformation is assisted by employment of machine learning techniques that can deal with modeling both big or limited data. This manuscript reviews these concepts and present a case study that demonstrates the use of a novel intelligent hybrid algorithms for Industry 4.0 applications with limited data. In particular, an intelligent algorithm is proposed for robust data modeling of nonlinear systems based on input-output data. In our approach, a novel hybrid data-driven combining the Group-Method of Data-Handling and Singular-Value Decomposition is adapted to find an offline deterministic model combined with Pareto multi-objective optimization to overcome the overfitting issue. An Unscented-Kalman-Filter is also incorporated to update the coefficient of the deterministic model and increase its robustness against data uncertainties. The effectiveness of the proposed method is examined on a set of real industrial measurements. Y1 - 2020 U6 - https://doi.org/10.1109/ACCESS.2020.2999898 SN - 2169-3536 VL - 8 IS - Art. 9108222 SP - 111381 EP - 111393 PB - IEEE CY - New York, NY ER - TY - JOUR A1 - Pfaff, Raphael A1 - Enning, Manfred A1 - Sutter, Stefan T1 - A risk‑based approach to automatic brake tests for rail freight service: incident analysis and realisation concept JF - SN Applied Sciences N2 - This study reviews the practice of brake tests in freight railways, which is time consuming and not suitable to detect certain failure types. Public incident reports are analysed to derive a reasonable brake test hardware and communication architecture, which aims to provide automatic brake tests at lower cost than current solutions. The proposed solutions relies exclusively on brake pipe and brake cylinder pressure sensors, a brake release position switch as well as radio communication via standard protocols. The approach is embedded in the Wagon 4.0 concept, which is a holistic approach to a smart freight wagon. The reduction of manual processes yields a strong incentive due to high savings in manual labour and increased productivity. KW - Freight rail KW - Brake test KW - Incident analysis KW - Train composition KW - Brake set-up Y1 - 2022 U6 - https://doi.org/10.1007/s42452-022-05007-x SN - 2523-3971 N1 - Corresponding author: Raphael Pfaff VL - 4 IS - 4 SP - 1 EP - 14 PB - Springer CY - Cham ER - TY - JOUR A1 - Neu, Eugen A1 - Janser, Frank A1 - Khatibi, Akbar A. A1 - Orifici, Adrian C. T1 - Fully Automated Operational Modal Analysis using multi-stage clustering JF - Mechanical Systems and Signal Processing Y1 - 2017 U6 - https://doi.org/10.1016/j.ymssp.2016.07.031 SN - 0888-3270 VL - Vol. 84, Part A SP - 308 EP - 323 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Neu, Eugen A1 - Janser, Frank A1 - Khatibi, Akbar A. A1 - Orifici, Adrian C. T1 - Automated modal parameter-based anomaly detection under varying wind excitation JF - Structural Health Monitoring N2 - Wind-induced operational variability is one of the major challenges for structural health monitoring of slender engineering structures like aircraft wings or wind turbine blades. Damage sensitive features often show an even bigger sensitivity to operational variability. In this study a composite cantilever was subjected to multiple mass configurations, velocities and angles of attack in a controlled wind tunnel environment. A small-scale impact damage was introduced to the specimen and the structural response measurements were repeated. The proposed damage detection methodology is based on automated operational modal analysis. A novel baseline preparation procedure is described that reduces the amount of user interaction to the provision of a single consistency threshold. The procedure starts with an indeterminate number of operational modal analysis identifications from a large number of datasets and returns a complete baseline matrix of natural frequencies and damping ratios that is suitable for subsequent anomaly detection. Mahalanobis distance-based anomaly detection is then applied to successfully detect the damage under varying severities of operational variability and with various degrees of knowledge about the present operational conditions. The damage detection capabilities of the proposed methodology were found to be excellent under varying velocities and angles of attack. Damage detection was less successful under joint mass and wind variability but could be significantly improved through the provision of the currently encountered operational conditions. Y1 - 2016 U6 - https://doi.org/10.1177/1475921716665803 SN - 1475-9217 VL - 15 IS - 6 SP - 1 EP - 20 PB - Sage CY - London ER - TY - JOUR A1 - Rupp, Matthias A1 - Schulze, Sven A1 - Kuperjans, Isabel T1 - Comparative life cycle analysis of conventional and hybrid heavy-duty trucks JF - World electric vehicle journal N2 - Heavy-duty trucks are one of the main contributors to greenhouse gas emissions in German traffic. Drivetrain electrification is an option to reduce tailpipe emissions by increasing energy conversion efficiency. To evaluate the vehicle’s environmental impacts, it is necessary to consider the entire life cycle. In addition to the daily use, it is also necessary to include the impact of production and disposal. This study presents the comparative life cycle analysis of a parallel hybrid and a conventional heavy-duty truck in long-haul operation. Assuming a uniform vehicle glider, only the differing parts of both drivetrains are taken into account to calculate the environmental burdens of the production. The use phase is modeled by a backward simulation in MATLAB/Simulink considering a characteristic driving cycle. A break-even analysis is conducted to show at what mileage the larger CO2eq emissions due to the production of the electric drivetrain are compensated. The effect of parameter variation on the break-even mileage is investigated by a sensitivity analysis. The results of this analysis show the difference in CO2eq/t km is negative, indicating that the hybrid vehicle releases 4.34 g CO2eq/t km over a lifetime fewer emissions compared to the diesel truck. The break-even analysis also emphasizes the advantages of the electrified drivetrain, compensating the larger emissions generated during production after already a distance of 15,800 km (approx. 1.5 months of operation time). The intersection coordinates, distance, and CO2eq, strongly depend on fuel, emissions for battery production and the driving profile, which lead to nearly all parameter variations showing an increase in break-even distance. Y1 - 2018 U6 - https://doi.org/10.3390/wevj9020033 SN - 2032-6653 VL - 9 IS - 2 SP - Article No. 33 PB - MDPI CY - Basel ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm T1 - Cybersicherheit in Produktion, Automotive und intelligenten Gebäuden T2 - IT-Sicherheit - Technologien und Best Practices für die Umsetzung im Unternehmen Y1 - 2022 SN - 978-3-446-47223-5 SN - 978-3-446-47347-8 U6 - https://doi.org/10.3139/9783446473478.012 SP - 193 EP - 218 PB - Carl Hanser Verlag CY - München ER - TY - CHAP A1 - Engländer, Jacques A1 - Kaminski, Lars A1 - Schuba, Marko T1 - Informationssicherheitsmanagement T2 - Digitalisierungs- und Informationsmanagement N2 - Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen. In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können. KW - Informationssicherheitsmanagement KW - Cybersicherheit KW - Cybersecurity KW - Informationssicherheit KW - IT-Sicherheit Y1 - 2022 SN - 978-3-662-63757-9 SN - 978-3-662-63758-6 U6 - https://doi.org/10.1007/978-3-662-63758-6_15 SP - 373 EP - 398 PB - Springer Vieweg CY - Berlin ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - https://doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - CHAP A1 - Christian, Esser A1 - Montag, Tim A1 - Schuba, Marko A1 - Allhof, Manuel T1 - Future critical infrastructure and security - cyberattacks on charging stations T2 - 31st International Electric Vehicle Symposium & Exhibition and International Electric Vehicle Technology Conference (EVS31 & EVTeC 2018) Y1 - 2018 SN - 978-1-5108-9157-9 SP - 665 EP - 671 PB - Society of Automotive Engineers of Japan (JSAE) CY - Tokyo ER -