Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (413) (remove)
Has Fulltext
- no (413) (remove)
Language
- English (413) (remove)
Document Type
- Article (413) (remove)
Keywords
- Hot S-parameter (2)
- MINLP (2)
- 197m/gHg (1)
- 3-D printing (1)
- Automated driving (1)
- Automotive application (1)
- Benchmark (1)
- Bloom’s Taxonomy (1)
- Booster Stations (1)
- Buffering Capacity (1)
Planning the layout and operation of a technical system is a common task
for an engineer. Typically, the workflow is divided into consecutive stages: First,
the engineer designs the layout of the system, with the help of his experience or of
heuristic methods. Secondly, he finds a control strategy which is often optimized
by simulation. This usually results in a good operating of an unquestioned sys-
tem topology. In contrast, we apply Operations Research (OR) methods to find a
cost-optimal solution for both stages simultaneously via mixed integer program-
ming (MILP). Technical Operations Research (TOR) allows one to find a provable
global optimal solution within the model formulation. However, the modeling error
due to the abstraction of physical reality remains unknown. We address this ubiq-
uitous problem of OR methods by comparing our computational results with mea-
surements in a test rig. For a practical test case we compute a topology and control
strategy via MILP and verify that the objectives are met up to a deviation of 8.7%.
Given industrial applications, the costs for the operation and maintenance of a pump system typically far exceed its purchase price. For finding an optimal pump configuration which minimizes not only investment, but life-cycle costs, methods like Technical Operations Research which is based on Mixed-Integer Programming can be applied. However, during the planning phase, the designer is often faced with uncertain input data, e.g. future load demands can only be estimated. In this work, we deal with this uncertainty by developing a chance-constrained two-stage (CCTS) stochastic program. The design and operation of a booster station working under uncertain load demand are optimized to minimize total cost including purchase price, operation cost incurred by energy consumption and penalty cost resulting from water shortage. We find optimized system layouts using a sample average approximation (SAA) algorithm, and analyze the results for different risk levels of water shortage. By adjusting the risk level, the costs and performance range of the system can be balanced, and thus the
system’s resilience can be engineered
On obligations in the development process of resilient systems with algorithmic design methods
(2018)
Advanced computational methods are needed both for the design of large systems and to compute high accuracy solutions. Such methods are efficient in computation, but the validation of results is very complex, and highly skilled auditors are needed to verify them. We investigate legal questions concerning obligations in the development phase, especially for technical systems developed using advanced methods. In particular, we consider methods of resilient and robust optimization. With these techniques, high performance solutions can be found, despite a high variety of input parameters. However, given the novelty of these methods, it is uncertain whether legal obligations are being met. The aim of this paper is to discuss if and how the choice of a specific computational method affects the developer’s product liability. The review of legal obligations in this paper is based on German law and focuses on the requirements that must be met during the design and development process.
Ensuring access to water and sanitation for all is Goal No. 6 of the 17 UN Sustainability Development Goals to transform our world. As one step towards this goal, we present an approach that leverages remote sensing data to plan optimal water supply networks for informal urban settlements. The concept focuses on slums within large urban areas, which are often characterized by a lack of an appropriate water supply. We apply methods of mathematical optimization aiming to find a network describing the optimal supply infrastructure. Hereby, we choose between different decentral and central approaches combining supply by motorized vehicles with supply by pipe systems. For the purposes of illustration, we apply the approach to two small slum clusters in Dhaka and Dar es Salaam. We show our optimization results, which represent the lowest cost water supply systems possible. Additionally, we compare the optimal solutions of the two clusters (also for varying input parameters, such as population densities and slum size development over time) and describe how the result of the optimization depends on the entered remote sensing data.
The transition within transportation towards battery electric vehicles can lead to a more sustainable future. To account for the development goal ‘climate action’ stated by the United Nations, it is mandatory, within the conceptual design phase, to derive energy-efficient system designs. One barrier is the uncertainty of the driving behaviour within the usage phase. This uncertainty is often addressed by using a stochastic synthesis process to derive representative driving cycles and by using cycle-based optimization. To deal with this uncertainty, a new approach based on a stochastic optimization program is presented. This leads to an optimization model that is solved with an exact solver. It is compared to a system design approach based on driving cycles and a genetic algorithm solver. Both approaches are applied to find efficient electric powertrains with fixed-speed and multi-speed transmissions. Hence, the similarities, differences and respective advantages of each optimization procedure are discussed.
Algorithmic design and resilience assessment of energy efficient high-rise water supply systems
(2018)
High-rise water supply systems provide water flow and suitable pressure in all levels of tall buildings. To design such state-of-the-art systems, the consideration of energy efficiency and the anticipation of component failures are mandatory. In this paper, we use Mixed-Integer Nonlinear Programming to compute an optimal placement of pipes and pumps, as well as an optimal control strategy.Moreover, we consider the resilience of the system to pump failures. A resilient system is able to fulfill a predefined minimum functionality even though components fail or are restricted in their normal usage. We present models to measure and optimize the resilience. To demonstrate our approach, we design and analyze an optimal resilient decentralized water supply system inspired by a real-life hotel building.
The application of mathematical optimization methods for water supply system design and operation provides the capacity to increase the energy efficiency and to lower the investment costs considerably. We present a system approach for the optimal design and operation of pumping systems in real-world high-rise buildings that is based on the usage of mixed-integer nonlinear and mixed-integer linear modeling approaches. In addition, we consider different booster station topologies, i.e. parallel and series-parallel central booster stations as well as decentral booster stations. To confirm the validity of the underlying optimization models with real-world system behavior, we additionally present validation results based on experiments conducted on a modularly constructed pumping test rig. Within the models we consider layout and control decisions for different load scenarios, leading to a Deterministic Equivalent of a two-stage stochastic optimization program. We use a piecewise linearization as well as a piecewise relaxation of the pumps’ characteristics to derive mixed-integer linear models. Besides the solution with off-the-shelf solvers, we present a problem specific exact solving algorithm to improve the computation time. Focusing on the efficient exploration of the solution space, we divide the problem into smaller subproblems, which partly can be cut off in the solution process. Furthermore, we discuss the performance and applicability of the solution approaches for real buildings and analyze the technical aspects of the solutions from an engineer’s point of view, keeping in mind the economically important trade-off between investment and operation costs.
This paper introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested while attached to life jackets and a small boat. In this demonstration test carried out on the Baltic Sea, the system was able to detect and range the active tags up to a distance of 5800 m using an illumination signal transmit-power of 100 W. Special attention is given to the development, performance, and conceptual differences between passive and active tags used in the system. Guidelines for achieving a high HR dynamic range, including a system components description, are given and a comparison with other HR systems is performed. System integration with a commercial maritime X-band navigation radar is shown to demonstrate a solution for rapid search and rescue response and quick localization.
Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom’s Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.
7T MR Safety
(2021)
Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging
(2020)
Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.
Objective
In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance.
Method
Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression.
Result
Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20% at the cost of a higher absolute overestimation at high actual local SAR values.
Conclusion
The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.
Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.
Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security
(2021)
Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.
The Carologistics team participates in the RoboCup Logistics League for the seventh year. The RCLL requires precise vision,
manipulation and path planning, as well as complex high-level decision
making and multi-robot coordination. We outline our approach with an
emphasis on recent modifications to those components.
The team members in 2018 are David Bosen, Christoph Gollok, Mostafa
Gomaa, Daniel Habering, Till Hofmann, Nicolas Limpert, Sebastian Schönitz,
Morian Sonnet, Carsten Stoffels, and Tarik Viehmann.
This paper is based on the last year’s team description.
To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.
Thermal and Optical Study on the Frequency Dependence of an Atmospheric Microwave Argon Plasma Jet
(2019)
In this work, we report on our attempt to design and implement an early introduction to basic robotics principles for children at kindergarten age. One of the main challenges of this effort is to explain complex robotics contents in a way that pre-school children could follow the basic principles and ideas using examples from their world of experience. What sets apart our effort from other work is that part of the lecturing is actually done by a robot itself and that a quiz at the end of the lesson is done using robots as well. The humanoid robot Pepper from Softbank, which is a great platform for human–robot interaction experiments, was used to present a lecture on robotics by reading out the contents to the children making use of its speech synthesis capability. A quiz in a Runaround-game-show style after the lecture activated the children to recap the contents they acquired about how mobile robots work in principle. In this quiz, two LEGO Mindstorm EV3 robots were used to implement a strongly interactive scenario. Besides the thrill of being exposed to a mobile robot that would also react to the children, they were very excited and at the same time very concentrated. We got very positive feedback from the children as well as from their educators. To the best of our knowledge, this is one of only few attempts to use a robot like Pepper not as a tele-teaching tool, but as the teacher itself in order to engage pre-school children with complex robotics contents.
The integration of sensors is one of the major tasks in embedded, control and “internet of things” (IoT) applications. For the integration mainly digital interfaces are used, starting from rather simple pulse-width modulation (PWM) interface to more complex interfaces like CAN (Controller Area Network). Even though these interfaces are tethered by definition, a wireless realization is highly welcome in many applications to reduce cable and connector cost, increase the flexibility and realize new emerging applications like wireless control systems. Currently used wireless solutions like Bluetooth, WirelessHART or IO-Link Wireless use dedicated communication standards and corresponding higher protocol layers to realize the wireless communication. Due to the complexity of the communication and the protocol handling, additional latency and jitter are introduced to the data communication that can meet the requirements for many applications. Even though tunnelling of other bus data like CAN data is generally also possible the latency and jitter prevent the tunnelling from being transparent for the bus system. Therefore a new basic technology based on dual-mode radio is used to realize a wireless communication on the physical layer only, enabling a reliable and real-time data transfer. As this system operates on the physical layer it is independent of any higher layers of the OSI (open systems interconnection) model. Hence it can be used for several different communication systems to replace the tethered physical layer. A prototype is developed and tested for real-time wireless PWM, SENT (single-edge nibble transmission) and CAN data transfer with very low latency and jitter.
In this paper we present an extension of the action language Golog that allows for using fuzzy notions in non-deterministic argument choices and the reward function in decision-theoretic planning. Often, in decision-theoretic planning, it is cumbersome to specify the set of values to pick from in the non-deterministic-choice-of-argument statement. Also, even for domain experts, it is not always easy to specify a reward function. Instead of providing a finite domain for values in the non-deterministic-choice-of-argument statement in Golog, we now allow for stating the argument domain by simply providing a formula over linguistic terms and fuzzy uents. In Golog’s forward-search DT planning algorithm, these formulas are evaluated in order to find the agent’s optimal policy. We illustrate this in the Diner Domain where the agent needs to calculate the optimal serving order.
20 Years of RoboCup
(2016)
This paper describes the development of a capacitively coupled high-pressure lamp with input power between 20 and 43 W at 2.45 GHz, using a coaxial line network. Compared with other electrodeless lamp systems, no cavity has to be used and a reduction in the input power is achieved. Therefore, this lamp is an alternative to the halogen incandescent lamp for domestic lighting. To serve the demands of domestic lighting, the filling of the lamp is optimized over all other resulting requirements, such as high efficacy at low induced powers and fast startups. A workflow to develop RF-driven plasma applications is presented, which makes use of the hot S-parameter technique. Descriptions of the fitting process inside a circuit and FEM simulator are given. Results of the combined ignition and operation network from simulations and measurements are compared. An initial prototype is built and measurements of the lamp's lighting properties are presented along with an investigation of the efficacy optimizations using large signal amplitude modulation. With this lamp, an efficacy of 135 lmW -1 is achieved.
Short term effects of magnetic resonance imaging on excitability of the motor cortex at 1.5T and 7T
(2010)
Rationale and Objectives
The increasing spread of high-field and ultra-high-field magnetic resonance imaging (MRI) scanners has encouraged new discussion of the safety aspects of MRI. Few studies have been published on possible cognitive effects of MRI examinations. The aim of this study was to examine whether changes are measurable after MRI examinations at 1.5 and 7 T by means of transcranial magnetic stimulation (TMS).
Materials and Methods
TMS was performed in 12 healthy, right-handed male volunteers. First the individual motor threshold was specified, and then the cortical silent period (SP) was measured. Subsequently, the volunteers were exposed to the 1.5-T MRI scanner for 63 minutes using standard sequences. The MRI examination was immediately followed by another TMS session. Fifteen minutes later, TMS was repeated. Four weeks later, the complete setting was repeated using a 7-T scanner. Control conditions included lying in the 1.5-T scanner for 63 minutes without scanning and lying in a separate room for 63 minutes. TMS was performed in the same way in each case. For statistical analysis, Wilcoxon's rank test was performed.
Results
Immediately after MRI exposure, the SP was highly significantly prolonged in all 12 subjects at 1.5 and 7 T. The motor threshold was significantly increased. Fifteen minutes after the examination, the measured value tended toward normal again. Control conditions revealed no significant differences.
Conclusion
MRI examinations lead to a transient and highly significant alteration in cortical excitability. This effect does not seem to depend on the strength of the static magnetic field.
Purpose
To assess potential cognitive deficits under the influence of static magnetic fields at various field strengths some studies already exist. These studies were not focused on attention as the most vulnerable cognitive function. Additionally, mostly no magnetic resonance imaging (MRI) sequences were performed.
Materials and Methods
In all, 25 right-handed men were enrolled in this study. All subjects underwent one MRI examination of 63 minutes at 1.5 T and one at 7 T within an interval of 10 to 30 days. The order of the examinations was randomized. Subjects were referred to six standardized neuropsychological tests strictly focused on attention immediately before and after each MRI examination. Differences in neuropsychological variables between the timepoints before and after each MRI examination were assessed and P-values were calculated
Results
Only six subtests revealed significant differences between pre- and post-MRI. In these tests the subjects achieved better results in post-MRI testing than in pre-MRI testing (P = 0.013–0.032). The other tests revealed no significant results.
Conclusion
The improvement in post-MRI testing is only explicable as a result of learning effects. MRI examinations, even in ultrahigh-field scanners, do not seem to have any persisting influence on the attention networks of human cognition immediately after exposure.
The development and analysis of three waveguides for the exposure of small biological in vitro samples to mobile communication signals at 900 MHz (GSM, Global System for Mobile Communications), 1.8 GHz (GSM), and 2 GHz (UMTS, Universal Mobile Telecommunications System) is presented. The waveguides were based on a fin-line concept and the chamber containing the samples bathed in extracellular solution was placed onto two fins with a slot in between, where the exposure field concentrates. Measures were taken to allow for patch clamp recordings during radiofrequency (RF) exposure. The necessary power for the achievement of the maximum desired specific absorption rate (SAR) of 20 W/kg (average over the mass of the solution) was approximately Pin = 50 mW, Pin = 19 mW, and Pin = 18 mW for the 900 MHz, 1800 MHz, and 2 GHz devices, respectively. At 20 W/kg, a slight RF-induced temperature elevation in the solution of no more than 0.3 °C was detected, while no thermal offsets due to the electromagnetic exposure could be detected at the lower SAR settings (2, 0.2, and 0.02 W/kg). A deviation of 10% from the intended solution volume yielded a calculated SAR deviation of 8% from the desired value. A maximum ±10% variation in the local SAR could occur when the position of the patch clamp electrode was altered within the area where the cells to be investigated were located.