Conference Proceeding
Refine
Year of publication
- 2017 (87) (remove)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (23)
- Fachbereich Luft- und Raumfahrttechnik (21)
- Fachbereich Medizintechnik und Technomathematik (16)
- IfB - Institut für Bioengineering (14)
- Fachbereich Energietechnik (11)
- Fachbereich Maschinenbau und Mechatronik (11)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (9)
- ECSM European Center for Sustainable Mobility (3)
- Fachbereich Bauingenieurwesen (3)
- INB - Institut für Nano- und Biotechnologien (3)
Document Type
- Conference Proceeding (87) (remove)
Keywords
- Gamification (2)
- MASCOT (2)
- Ausfachungsmauerwerk (1)
- Automated Optimization (1)
- Bewertungsframework (1)
- Competence Developing Gam (1)
- Competence Developing Games (1)
- Digitale Transformation (1)
- Diversity (1)
- Diversity Management (1)
Is part of the Bibliography
- no (87)
This paper introduces a hardware setup to measure efficiency maps of low-power electric motors and their associated inverters. Here, the power of the device under test (DUT) ranges from some Watts to a few hundred Watts. The torque and speed of the DUT are measured independent of voltage and current in multiple load points. A Matlab-based software approach in combination with an open Texas-Instruments (TI) hardware setup ensures flexibility. Exemplarily, the efficiency field of a Permanent Magnet Synchronous Machine (PMSM) is measured to proof the concept. Brushless-DC (BLDC) motors can be tested as well. The nomenclature in this paper is based on the new European standard DIN EN 50598. Special attention is paid to the calculation of the measurement error.
The Dry-Low-NOx (DLN) Micromix combustion technology has been developed originally as a low emission alternative for industrial gas turbine combustors fueled with hydrogen. Currently the ongoing research process targets flexible fuel operation with hydrogen and syngas fuel.
The non-premixed combustion process features jet-in-crossflow-mixing of fuel and oxidizer and combustion through multiple miniaturized flames. The miniaturization of the flames leads to a significant reduction of NOx emissions due to the very short residence time of reactants in the flame.
The paper presents the results of a numerical and experimental combustor test campaign. It is conducted as part of an integration study for a dual-fuel (H2 and H2/CO 90/10 Vol.%) Micromix combustion chamber prototype for application under full scale, pressurized gas turbine conditions in the auxiliary power unit Honeywell Garrett GTCP 36-300.
In the presented experimental studies, the integration-optimized dual-fuel Micromix combustor geometry is tested at atmospheric pressure over a range of gas turbine operating conditions with hydrogen and syngas fuel. The experimental investigations are supported by numerical combustion and flow simulations. For validation, the results of experimental exhaust gas analyses are applied.
Despite the significantly differing fuel characteristics between pure hydrogen and hydrogen-rich syngas the evaluated dual-fuel Micromix prototype shows a significant low NOx performance and high combustion efficiency. The combustor features an increased energy density that benefits manufacturing complexity and costs.
Detection of Adrenaline Based on Bioelectrocatalytical System to Support Tumor Diagnostic Technology
(2017)
Biomechanical simulation of different prosthetic meshes for repairing uterine/vaginal vault prolapse
(2017)
Research collaborations provide opportunities for both practitioners and researchers: practitioners need solutions for difficult business challenges and researchers are looking for hard problems to solve and publish. Nevertheless, research collaborations carry the risk that practitioners focus on quick solutions too much and that researchers tackle theoretical problems, resulting in products which do not fulfill the project requirements.
In this paper we introduce an approach extending the ideas of agile and lean software development. It helps practitioners and researchers keep track of their common research collaboration goal: a scientifically enriched software product which fulfills the needs of the practitioner’s business model.
This approach gives first-class status to application-oriented metrics that measure progress and success of a research collaboration continuously. Those metrics are derived from the collaboration requirements and help to focus on a commonly defined goal.
An appropriate tool set evaluates and visualizes those metrics with minimal effort, and all participants will be pushed to focus on their tasks with appropriate effort. Thus project status, challenges and progress are transparent to all research collaboration members at any time.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.