Conference Proceeding
Refine
Year of publication
- 2024 (12)
- 2023 (35)
- 2022 (46)
- 2021 (48)
- 2020 (46)
- 2019 (75)
- 2018 (62)
- 2017 (66)
- 2016 (62)
- 2015 (57)
- 2014 (44)
- 2013 (55)
- 2012 (57)
- 2011 (41)
- 2010 (63)
- 2009 (44)
- 2008 (31)
- 2007 (35)
- 2006 (33)
- 2005 (18)
- 2004 (14)
- 2003 (14)
- 2002 (18)
- 2001 (11)
- 2000 (8)
- 1999 (7)
- 1998 (7)
- 1997 (7)
- 1996 (4)
- 1995 (4)
- 1993 (6)
- 1992 (3)
- 1991 (2)
- 1990 (1)
- 1989 (2)
- 1988 (3)
- 1986 (1)
- 1985 (1)
- 1984 (3)
- 1983 (2)
- 1981 (2)
- 1980 (1)
- 1979 (1)
- 1978 (3)
- 1975 (2)
- 1973 (2)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (235)
- Fachbereich Luft- und Raumfahrttechnik (182)
- Fachbereich Energietechnik (162)
- Fachbereich Medizintechnik und Technomathematik (140)
- IfB - Institut für Bioengineering (113)
- Solar-Institut Jülich (108)
- Fachbereich Maschinenbau und Mechatronik (98)
- Fachbereich Bauingenieurwesen (72)
- ECSM European Center for Sustainable Mobility (53)
- Fachbereich Wirtschaftswissenschaften (43)
Has Fulltext
- no (1059) (remove)
Language
- English (1059) (remove)
Document Type
- Conference Proceeding (1059) (remove)
Keywords
- Enterprise Architecture (5)
- Energy storage (4)
- Gamification (4)
- Natural language processing (4)
- Power plants (4)
- hydrogen (4)
- solar sail (4)
- Associated liquids (3)
- Concentrated solar power (3)
- Hybrid energy system (3)
The idea of component-based software engineering was proposed more that 40 years ago, yet only few robotics software frameworks follow these ideas. The main problem with robotics software usually is that it runs on a particular platform and transferring source code to another platform is crucial. In this paper, we present our software framework Fawkes which follows the component-based software design paradigm by featuring a clear component concept with well-defined communication interfaces. We deployed Fawkes on several different robot platforms ranging from service robots to biped soccer robots. Following the component concept with clearly defined communication interfaces shows great benefit when porting robot software from one robot to the other. Fawkes comes with a number of useful plugins for tasks like timing, logging, data visualization, software configuration, and even high-level decision making. These make it particularly easy to create and to debug productive code, shortening the typical development cycle for robot software.
The high-level decision making process of an autonomous robot can be seen as an hierarchically organised entity, where strategical decisions are made on the topmost layer, while the bottom layer serves as driver for the hardware. In between is a layer with monitoring and reporting functionality. In this paper we propose a behaviour engine for this middle layer which, based on formalism of hybrid state machines (HSMs), bridges the gap between high-level strategic decision making and low-level actuator control. The behaviour engine has to execute and monitor behaviours and reports status information back to the higher level. To be able to call the behaviours or skills hierarchically, we extend the model of HSMs with dependencies and sub-skills. These Skill-HSMs are implemented in the lightweight but expressive Lua scripting language which is well-suited to implement the behaviour engine on our target platform, the humanoid robot Nao.
The Solar-Institute Jülich (SIJ) has initiated the construction of the first and only German solar tower power plant and is now involved in the accompanying research. The power plant for experimental and demonstration purposes in the town of Jülich started supplying electric energy in the beginning of 2008. The central receiver plant features as central innovation an open volumetric receiver, consisting of porous ceramic elements that simultaneously absorb the concentrated sunlight and transfer the heat to ambient air passing through the pores so that an average temperature of 680°C is reached. The subsequent steam cycle generates up to 1.5 MWe. A main field of research at the SIJ is the optimization of the absorber structures. To analyze the capability of new absorber specimens a special test facility was developed and set up in the laboratory. A high-performance near-infrared radiator offers for single test samples a variable and repeatable beam with a power of up to 320 kW/m² peak. The temperatures achieved on the absorber surface can reach more than 1000°C. To suck ambient air through the open absorber - like on the tower - it is mounted on a special blower system. An overview about the test facility and some recent results will be presented.
The importance of validating and reproducing the outcome of computational processes is fundamental to many application domains. Assuring the provenance of workflows will likely become even more important with respect to the incorporation of human tasks to standard workflows by emerging standards such as WS-HumanTask. This paper addresses this trend by an actor-based workflow approach that actively support provenance. It proposes a framework to track and store provenance information automatically that applies for various workflow management systems. In particular, the introduced provenance framework supports the documentation of workflows in a legally binding way. The authors therefore use the concept of layered XML documents, i.e. history-tracing XML. Furthermore, the proposed provenance framework enables the executors (actors) of a particular workflow task to attest their operations and the associated results by integrating digital XML signatures.
Lightning safety guidelines
(2010)
This paper introduces lightning to the layman, noting the right behaviour in front of thunderstorms as well as protective measures against lightning. It also contributes to the prevention of lightning injuries and damages. This report was prepared by the authors inside the AHG1 Group for IEC TC81 (Lightning Protection).
Large power plants can be endangered by lightning strikes with possible consequences regarding their safety and availability. A special scenario is a lightning strike to the HV overhead transmission line close to the power plant's connection to the power grid. If then additionally a so-called shielding failure of the overhead ground wire on top of the overhead transmission line is assumed, i.e. the lightning strikes directly into a phase conductor, this is an extreme electromagnetic disturbance. The paper deals with the numerical simulation of such a lightning strike and the consequences on the components of the power plant's auxiliary power network connected to different voltage levels.
Planning the air-terminations for a structure to be protected the use of the rolling-sphere method (electro-geometrical model) is the best way from the physics of lightning point-of-view. Therefore, international standards prefer this method. However, using the rolling-sphere method only results in possible point-of-strikes on a structure without giving information about the probability of strikes at the individual points compared to others.
Currently, most workflow management systems in Grid environments provide push-oriented job distribution strategies, where jobs are explicitly delegated to resources. In those scenarios the dedicated resources execute submitted jobs according to the request of a workflow engine or Grid wide scheduler. This approach has various limitations, particularly if human interactions should be integrated in workflow execution. To support human interactions with the benefit of enabling inter organizational computation and community approaches, this poster paper proposes the idea of a pull-based task distribution strategy. Here, heterogeneous resources, including human interaction, should actively select tasks for execution from a central repository. This leads to special demands regarding security issues like access control. In the established push-based job execution the resources are responsible for granting access to workflows and job initiators. In general this is done by access control lists, where users are explicitly mapped to local accounts according to their policies. In the pull-based approach the resources actively apply for job executions by sending requests to a central task repository. This means that every resource has to be able to authenticate against the repository to be authorized for task execution. In other words the authorization is relocated from the resources to the repository. The poster paper introduces current work regarding to the mentioned security aspects in the pull-based approach within the scope of the project “HiX4AGWS”.