Article
Refine
Year of publication
- 2024 (5)
- 2023 (3)
- 2022 (5)
- 2021 (6)
- 2020 (10)
- 2019 (9)
- 2018 (13)
- 2017 (8)
- 2016 (14)
- 2015 (8)
- 2014 (13)
- 2013 (13)
- 2012 (16)
- 2011 (25)
- 2010 (14)
- 2009 (23)
- 2008 (29)
- 2007 (22)
- 2006 (22)
- 2005 (20)
- 2004 (27)
- 2003 (14)
- 2002 (16)
- 2001 (13)
- 2000 (25)
- 1999 (20)
- 1998 (18)
- 1997 (29)
- 1996 (16)
- 1995 (19)
- 1994 (19)
- 1993 (16)
- 1992 (12)
- 1991 (11)
- 1990 (8)
- 1989 (13)
- 1988 (10)
- 1987 (5)
- 1986 (6)
- 1985 (9)
- 1984 (2)
- 1983 (3)
- 1982 (2)
- 1981 (3)
- 1980 (8)
- 1979 (4)
- 1978 (7)
- 1977 (1)
- 1976 (6)
- 1975 (2)
- 1974 (4)
- 1973 (1)
- 1972 (3)
- 1970 (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (631) (remove)
Document Type
- Article (631) (remove)
Keywords
- Multimediamarkt (6)
- Hot S-parameter (2)
- Literaturanalyse (2)
- MINLP (2)
- Referenzmodellierung (2)
- 197m/gHg (1)
- 3-D printing (1)
- Anwendungsorientierter Forschungsansatz (1)
- Arbeit 4.0 (1)
- Automated driving (1)
This paper introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested while attached to life jackets and a small boat. In this demonstration test carried out on the Baltic Sea, the system was able to detect and range the active tags up to a distance of 5800 m using an illumination signal transmit-power of 100 W. Special attention is given to the development, performance, and conceptual differences between passive and active tags used in the system. Guidelines for achieving a high HR dynamic range, including a system components description, are given and a comparison with other HR systems is performed. System integration with a commercial maritime X-band navigation radar is shown to demonstrate a solution for rapid search and rescue response and quick localization.
Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom’s Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.
7T MR Safety
(2021)
Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging
(2020)
Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.
Objective
In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance.
Method
Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression.
Result
Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20% at the cost of a higher absolute overestimation at high actual local SAR values.
Conclusion
The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.
Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden.
Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.