TY - JOUR A1 - Fiedler, Thomas M. A1 - Ladd, Mark E. A1 - Clemens, Markus A1 - Bitz, Andreas T1 - Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging JF - IEEE Letters on Electromagnetic Compatibility Practice and Applications N2 - Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented. Y1 - 2020 SN - 2637-6423 U6 - http://dx.doi.org/10.1109/LEMCPA.2020.3029747 VL - 2 IS - 3 SP - 1 EP - 8 PB - IEEE CY - New York, NY ER - TY - JOUR A1 - Hüning, Felix A1 - Backes, Andreas T1 - Direct observation of large Barkhausen jump in thin Vicalloy wires JF - IEEE Magnetics Letters Y1 - 2020 SN - 1949-307X U6 - http://dx.doi.org/10.1109/LMAG.2020.3046411 VL - 11 IS - Art. 2506504 SP - 1 EP - 4 PB - IEEE CY - New York, NY ER - TY - JOUR A1 - Altherr, Lena A1 - Ederer, Thorsten A1 - Lorenz, Ulf A1 - Pelz, Peter F. A1 - Pöttgen, Philipp ED - Lübbecke, Marco ED - Koster, Arie ED - Letmathe, Peter ED - Madlener, Reihard ED - Peis, Britta ED - Walther, Grit T1 - Experimental validation of an enhanced system synthesis approach JF - Operations Research Proceedings 2014 N2 - Planning the layout and operation of a technical system is a common task for an engineer. Typically, the workflow is divided into consecutive stages: First, the engineer designs the layout of the system, with the help of his experience or of heuristic methods. Secondly, he finds a control strategy which is often optimized by simulation. This usually results in a good operating of an unquestioned sys- tem topology. In contrast, we apply Operations Research (OR) methods to find a cost-optimal solution for both stages simultaneously via mixed integer program- ming (MILP). Technical Operations Research (TOR) allows one to find a provable global optimal solution within the model formulation. However, the modeling error due to the abstraction of physical reality remains unknown. We address this ubiq- uitous problem of OR methods by comparing our computational results with mea- surements in a test rig. For a practical test case we compute a topology and control strategy via MILP and verify that the objectives are met up to a deviation of 8.7%. Y1 - 2014 SN - 978-3-319-28695-2 U6 - http://dx.doi.org/10.1007/978-3-319-28697-6_1 PB - Springer CY - Basel ER - TY - JOUR A1 - Pöttgen, Philipp A1 - Ederer, Thorsten A1 - Altherr, Lena A1 - Lorenz, Ulf A1 - Pelz, Peter F. T1 - Examination and optimization of a heating circuit for energy-efficient buildings JF - Energy Technology N2 - The conference center darmstadtium in Darmstadt is a prominent example of energy efficient buildings. Its heating system consists of different source and consumer circuits connected by a Zortström reservoir. Our goal was to reduce the energy costs of the system as much as possible. Therefore, we analyzed its supply circuits. The first step towards optimization is a complete examination of the system: 1) Compilation of an object list for the system, 2) collection of the characteristic curves of the components, and 3) measurement of the load profiles of the heat and volume-flow demand. Instead of modifying the system manually and testing the solution by simulation, the second step was the creation of a global optimization program. The objective was to minimize the total energy costs for one year. We compare two different topologies and show opportunities for significant savings. KW - energy transfer KW - heating system KW - programming KW - system optimization KW - technical operations research Y1 - 2015 SN - 2194-4296 U6 - http://dx.doi.org/10.1002/ente.201500252 VL - 4 IS - 1 SP - 136 EP - 144 PB - WILEY-VCH Verlag CY - Weinheim ER - TY - JOUR A1 - Altherr, Lena A1 - Ederer, Thorsten A1 - Pöttgen, Philipp A1 - Lorenz, Ulf A1 - Pelz, Peter F. ED - Pelz, Peter F. ED - Groche, Peter T1 - Multicriterial optimization of technical systems considering multiple load and availability scenarios JF - Applied Mechanics and Materials N2 - Cheap does not imply cost-effective -- this is rule number one of zeitgeisty system design. The initial investment accounts only for a small portion of the lifecycle costs of a technical system. In fluid systems, about ninety percent of the total costs are caused by other factors like power consumption and maintenance. With modern optimization methods, it is already possible to plan an optimal technical system considering multiple objectives. In this paper, we focus on an often neglected contribution to the lifecycle costs: downtime costs due to spontaneous failures. Consequently, availability becomes an issue. KW - sustainability KW - availability KW - energy efficiency KW - mixed-integer linear programming KW - system synthesis Y1 - 2015 SN - 1660-9336 U6 - http://dx.doi.org/10.4028/www.scientific.net/AMM.807.247 VL - 807 SP - 247 EP - 256 ER - TY - JOUR A1 - Czarnecki, Christian A1 - Spiliopoulou, Myra T1 - A holistic framework for the implementation of a next generation network JF - International Journal of Business Information Systems N2 - As the potential of a next generation network (NGN) is recognised, telecommunication companies consider switching to it. Although the implementation of an NGN seems to be merely a modification of the network infrastructure, it may trigger or require changes in the whole company, because it builds upon the separation between service and transport, a flexible bundling of services to products and the streamlining of the IT infrastructure. We propose a holistic framework, structured into the layers ‘strategy’, ‘processes’ and ‘information systems’ and incorporate into each layer all concepts necessary for the implementation of an NGN, as well as the alignment of these concepts. As a first proof-of-concept for our framework we have performed a case study on the introduction of NGN in a large telecommunication company; we show that our framework captures all topics that are affected by an NGN implementation. KW - next generation network KW - telecommunication KW - NGN KW - IP-based networks KW - product bundling Y1 - 2012 U6 - http://dx.doi.org/10.1504/IJBIS.2012.046291 SN - 1746-0972 VL - 9 IS - 4 SP - 385 EP - 401 PB - Inderscience Enterprises CY - Olney, Bucks ER - TY - JOUR A1 - Czarnecki, Christian A1 - Winkelmann, Axel A1 - Spiliopoulou, Myra T1 - Services in electronic telecommunication markets: a framework for planning the virtualization of processes JF - Electronic Markets N2 - The potential of electronic markets in enabling innovative product bundles through flexible and sustainable partnerships is not yet fully exploited in the telecommunication industry. One reason is that bundling requires seamless de-assembling and re-assembling of business processes, whilst processes in telecommunication companies are often product-dependent and hard to virtualize. We propose a framework for the planning of the virtualization of processes, intended to assist the decision maker in prioritizing the processes to be virtualized: (a) we transfer the virtualization pre-requisites stated by the Process Virtualization Theory in the context of customer-oriented processes in the telecommunication industry and assess their importance in this context, (b) we derive IT-oriented requirements for the removal of virtualization barriers and highlight their demand on changes at different levels of the organization. We present a first evaluation of our approach in a case study and report on lessons learned and further steps to be performed. KW - Telecommunication KW - Services KW - Process virtualization KW - Product bundling KW - Transformation Y1 - 2010 U6 - http://dx.doi.org/10.1007/s12525-010-0045-8 SN - 1422-8890 VL - 20 IS - 3-4 SP - 197 EP - 207 PB - Springer CY - Berlin ER - TY - JOUR A1 - Hofmann, Till A1 - Limpert, Nicolas A1 - Mataré, Victor A1 - Schönitz, Sebastian A1 - Niemueller, Tim A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard T1 - The Carologistics RoboCup Logistics Team 2018 N2 - The Carologistics team participates in the RoboCup Logistics League for the seventh year. The RCLL requires precise vision, manipulation and path planning, as well as complex high-level decision making and multi-robot coordination. We outline our approach with an emphasis on recent modifications to those components. The team members in 2018 are David Bosen, Christoph Gollok, Mostafa Gomaa, Daniel Habering, Till Hofmann, Nicolas Limpert, Sebastian Schönitz, Morian Sonnet, Carsten Stoffels, and Tarik Viehmann. This paper is based on the last year’s team description. Y1 - 2018 ER - TY - JOUR A1 - Köhler, Klemens A1 - Röpke, René A1 - Wolf, Martin T1 - Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security JF - ISAGA 2019: Simulation Gaming Through Times and Disciplines N2 - Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved. KW - IT security education KW - Competence Developing Games KW - Game-based learning KW - Keyword analysis KW - Bloom’s Taxonomy Y1 - 2021 U6 - http://dx.doi.org/10.1007/978-3-030-72132-9_6 N1 - ISAGA 2019 - International Simulation and Gaming Association Conference. 26-30 August 2019. Warsaw, Poland. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11988) SP - 61 EP - 73 PB - Springer CY - Cham ER - TY - JOUR A1 - Köhler, Klemens T1 - A conflict theory perspective of IT attacks – consequences for IT security education N2 - Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games. Y1 - 2020 IS - Preprint ER -