Conference Proceeding
Refine
Year of publication
Document Type
- Conference Proceeding (1393) (remove)
Has Fulltext
- no (1393) (remove)
Keywords
- Enterprise Architecture (5)
- Gamification (5)
- Energy storage (4)
- Natural language processing (4)
- Power plants (4)
- hydrogen (4)
- solar sail (4)
- Associated liquids (3)
- Concentrated solar power (3)
- Hybrid energy system (3)
- MASCOT (3)
- Out-of-plane load (3)
- Serious Game (3)
- earthquakes (3)
- Additive manufacturing (2)
- Adjacent buildings (2)
- BIM (2)
- Case Study (2)
- Clustering (2)
- Deep learning (2)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (280)
- Fachbereich Energietechnik (226)
- Fachbereich Luft- und Raumfahrttechnik (192)
- Fachbereich Maschinenbau und Mechatronik (188)
- Solar-Institut Jülich (164)
- Fachbereich Medizintechnik und Technomathematik (148)
- IfB - Institut für Bioengineering (113)
- Fachbereich Bauingenieurwesen (101)
- ECSM European Center for Sustainable Mobility (57)
- Fachbereich Wirtschaftswissenschaften (53)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (44)
- INB - Institut für Nano- und Biotechnologien (41)
- Fachbereich Chemie und Biotechnologie (33)
- Nowum-Energy (22)
- Kommission für Forschung und Entwicklung (16)
- Fachbereich Architektur (13)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (8)
- Fachbereich Gestaltung (3)
- IaAM - Institut für angewandte Automation und Mechatronik (3)
- Institut fuer Angewandte Polymerchemie (2)
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
New materials often lead to innovations and advantages in technical applications. This also applies to the particle receiver proposed in this work that deploys high-temperature and scratch resistant transparent ceramics. With this receiver design, particles are heated through direct-contact concentrated solar irradiance while flowing downwards through tubular transparent ceramics from top to bottom. In this paper, the developed particle receiver as well as advantages and disadvantages are described. Investigations on the particle heat-up characteristics from solar irradiance were carried out with DEM simulations which indicate that particle temperatures can reach up to 1200 K. Additionally, a simulation model was set up for investigating the dynamic behavior. A test receiver at laboratory scale has been designed and is currently being built. In upcoming tests, the receiver test rig will be used to validate the simulation results. The design and the measurement equipment is described in this work.
Introduction of RePriCo’13
(2013)
The recently proposed NASA and ESA missions to Saturn and Jupiter pose difficult tasks to mission designers because chemical propulsion scenarios are not capable of transferring heavy spacecraft into the outer solar system without the use of gravity assists. Thus our developed mission scenario based on the joint NASA/ESA Titan Saturn System Mission baselines solar electric propulsion to improve mission flexibility and transfer time. For the calculation of near-globally optimal low-thrust trajectories, we have used a method called Evolutionary Neurocontrol, which is implemented in the low-thrust trajectory optimization software InTrance. The studied solar electric propulsion scenario covers trajectory optimization of the interplanetary transfer including variations of the spacecraft's thrust level, the thrust unit's specific impulse and the solar power generator power level. Additionally developed software extensions enabled trajectory optimization with launcher-provided hyperbolic excess energy, a complex solar power generator model and a variable specific impulse ion engine model. For the investigated mission scenario, Evolutionary Neurocontrol yields good optimization results, which also hold valid for the more elaborate spacecraft models. Compared to Cassini/Huygens, the best found solutions have faster transfer times and a higher mission flexibility in general.