Refine
Year of publication
- 2024 (14)
- 2023 (29)
- 2022 (19)
- 2021 (27)
- 2020 (29)
- 2019 (44)
- 2018 (44)
- 2017 (37)
- 2016 (35)
- 2015 (36)
- 2014 (43)
- 2013 (43)
- 2012 (40)
- 2011 (40)
- 2010 (37)
- 2009 (38)
- 2008 (41)
- 2007 (39)
- 2006 (27)
- 2005 (25)
- 2004 (35)
- 2003 (33)
- 2002 (29)
- 2001 (33)
- 2000 (34)
- 1999 (31)
- 1998 (28)
- 1997 (34)
- 1996 (25)
- 1995 (22)
- 1994 (21)
- 1993 (18)
- 1992 (13)
- 1991 (14)
- 1990 (9)
- 1989 (17)
- 1988 (11)
- 1987 (8)
- 1986 (9)
- 1985 (9)
- 1984 (3)
- 1983 (7)
- 1982 (4)
- 1981 (3)
- 1980 (12)
- 1979 (6)
- 1978 (7)
- 1977 (1)
- 1976 (7)
- 1975 (3)
- 1974 (4)
- 1973 (1)
- 1972 (3)
- 1971 (2)
- 1970 (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1184) (remove)
Language
- English (718)
- German (465)
- Multiple languages (1)
Document Type
- Article (638)
- Conference Proceeding (302)
- Book (114)
- Part of a Book (64)
- Patent (17)
- Report (9)
- Other (8)
- Contribution to a Periodical (6)
- Course Material (6)
- Doctoral Thesis (6)
Keywords
- Multimediamarkt (7)
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Gamification (4)
- Serious Game (4)
- Auslenkung (3)
- Digitale Transformation (3)
- Digitalisierung (3)
- Education (3)
The chemical industry is one of the most important industrial sectors in Germany in terms of manufacturing revenue. While thermodynamic boundary conditions often restrict the scope for reducing the energy consumption of core processes, secondary processes such as cooling offer scope for energy optimisation. In this contribution, we therefore model and optimise an existing cooling system. The technical boundary conditions of the model are provided by the operators, the German chemical company BASF SE. In order to systematically evaluate different degrees of freedom in topology and operation, we formulate and solve a Mixed-Integer Nonlinear Program (MINLP), and compare our optimisation results with the existing system.
31P MR spectroscopic imaging of the human prostate provides information about phosphorylated metabolites that could be used for prostate cancer characterization. The sensitivity of a magnetic field strength of 7 T might enable 3D 31P MR spectroscopic imaging with relevant spatial resolution in a clinically acceptable measurement time. To this end, a 31P endorectal coil was developed and combined with an eight-channel 1H body-array coil to relate metabolic information to anatomical location. An extensive safety validation was performed to evaluate the specific absorption rate, the radiofrequency field distribution, and the temperature distribution of both coils. This validation consisted of detailed Finite Integration Technique simulations, confirmed by MR thermometry and Burn:x-wiley:07403194:media:MRM24175:tex2gif-stack-1 measurements in a phantom and in vivo temperature measurements. The safety studies demonstrated that the presence of the 31P endorectal coil had no influence on the specific absorption rate levels and temperature distribution of the external eight-channel 1H array coil. To stay within a 10 g averaged local specific absorption rate of 10 W/kg, a maximum time-averaged input power of 33 W for the 1H array coil was allowed. For transmitting with the 31P endorectal coil, our safety limit of less than 1°C temperature increase in vivo during a 15-min MR spectroscopic imaging experiment was reached at a time-averaged input power of 1.9 W. With this power setting, a second in vivo measurement was performed on a healthy volunteer. Using adiabatic excitation, 3D 31P MR spectroscopic imaging produced spectra from the entire prostate in 18 min with a spatial resolution of 4 cm3. The spectral resolution enabled the separate detection of phosphocholine, phosphoethanolamine, inorganic phosphate, and other metabolites that could play an important role in the characterization of prostate cancer.
For a wide acceptance of E-Mobility, a well-developed charging infrastructure is needed. Conductive charging stations, which are today’s state of the art, are of limited suitability for urbanised areas, since they cause a significant diversification in townscape. Furthermore, they might be destroyed by vandalism. Besides for those urbanistic reasons, inductive charging stations are a much more comfortable alternative, especially in urbanised areas. The usage of conductive charging stations requires more or less bulky charging cables. The handling of those standardised charging cables, especially during poor weather conditions, might cause inconvenience, such as dirty clothing etc. Wireless charging does not require visible and vandalism vulnerable charge sticks. No wired connection between charging station and vehicle is needed, which enable the placement below the surface of parking spaces or other points of interest. Inductive charging seems to be the optimal alternative for E-Mobility, as a high power transfer can be realised with a manageable technical and financial effort. For a well-accepted and working public charging infrastructure in urbanised areas it is essential that the infrastructure fits the vehicles’ needs. Hence, a well-adjusted standardisation of the charging infrastructure is essential. This is carried out by several IEC (International Electrotechnical Commission) and national standardisation committees. To ensure an optimised technical solution for future’s inductive charging infrastructures, several field tests had been carried out and are planned in near future.
Recently, novel AI-based services have emerged in the consumer market. AI-based services can affect the way consumers take commercial decisions. Research on the influence of AI on commercial interactions is in its infancy. In this chapter, a framework creating a first overview of the influence of AI on commercial interactions is introduced. This framework summarizes the findings of comparing numerous customer journeys of novel AI-based services with corresponding non-AI equivalents.
Information and communication technology for integrated mobility concepts such as E-carsharing
(2015)
During the past decade attitude towards sharing things has changed extremely. Not just personal data is shared (e.g. in social networks) but also mobility. Together with the increased ecological awareness of the recent years, new mobility concepts have evolved. E-carsharing has become a symbol for these changes of attitude. The management of a shared car fleet, the energy management of electric mobility and the management of various carsharing users with individual likes and dislikes are just some of the major challenges of e-carsharing. Weaving it into integrated mobility concepts, this raises complexity even further. These challenges can only be overcome by an appropriate amount of well-shaped information available at the right place and time. In order to gather, process and share the required information, fleet cars have to be equipped with modern information and communication technology (ICT) and become so-called fully connected cars. Ensuring the usability of these ICT systems is another challenge that is often neglected, even though it is usability that makes carsharing comfortable, attractive and supports users’ new attitudes. By means of an integrated and consistent concept for human-machine interaction (HMI), the usability of such systems can be raised tremendously.
Information Channels
(2000)
Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen.
In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können.
Innovation und Kommunikation
(2013)
The field of Cognitive Robotics aims at intelligent decision making of autonomous robots. It has matured over the last 25 or so years quite a bit. That is, a number of high-level control languages and architectures have emerged from the field. One concern in this regard is the action language GOLOG. GOLOG has been used in a rather large number of applications as a high-level control language ranging from intelligent service robots to soccer robots. For the lower level robot software, the Robot Operating System (ROS) has been around for more than a decade now and it has developed into the standard middleware for robot applications. ROS provides a large number of packages for standard tasks in robotics like localisation, navigation, and object recognition. Interestingly enough, only little work within ROS has gone into the high-level control of robots. In this paper, we describe our approach to marry the GOLOG action language with ROS. In particular, we present our architecture on inte grating golog++, which is based on the GOLOG dialect Readylog, with the Robot Operating System. With an example application on the Pepper service robot, we show how primitive actions can be easily mapped to the ROS ActionLib framework and present our control architecture in detail.
In addition to the technical content, modern courses at university should also teach professional skills to enhance the competencies of students towards their future work. The competency driven approach including technical as well as professional skills makes it necessary to find a suitable way for the integration into the corresponding module in a scalable and flexible manner. Agile development, for example, is essential for the development of modern systems and applications and makes use of dedicated professional skills of the team members, like structured group dynamics and communication, to enable the fast and reliable development. This paper presents an easy to integrate and flexible approach to integrate Scrum, an agile development method, into the lab of an existing module. Due to the different role models of Scrum the students have an individual learning success, gain valuable insight into modern system development and strengthen their communication and organization skills. The approach is implemented and evaluated in the module Vehicle Systems, but it can be transferred easily to other technical courses as well. The evaluation of the implementation considers feedback of all stakeholders, students, supervisor and lecturers, and monitors the observations during project lifetime.
Für viele Zwecke ist es nützlich, von einem technischen System ein mathematisches Modell zu haben. Für Systeme, die sich durch eine Verzögerung höherer Ordnung mit oder ohne Ausgleich beschreiben lassen, wird ein Identifizierungsverfahren vorgestellt, das aus gemessenen Zeitfunktionen die Bestimmung einer Übertragungsfunktion ermöglicht. Die Systeme werden dabei durch Testsignale erregt. Die Modellkoeffizienten werden dann mit Hilfe eines Integrationsverfahrens aus dem Testsignal und der Antwort des Systems auf dieses Testsignal bestimmt. Ein praktisches Beispiel zeigt die Leistungsfähigkeit des Verfahrens.
The adoption of the Digital Health Transformation is a tremendous paradigm change in health organizations, which is not a trivial process in reality. For that reason, in this chapter, it is proposed a methodology with the objective to generate a changing culture in healthcare organisations. Such a change culture is essential for the successful implementation of any supporting methods like Interactive Process Mining. It needs to incorporate (mostly) new ways of team-based and evidence-based approaches for solving structural problems in a digital healthcare environment.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
RGB-D sensors such as the Microsoft Kinect or the Asus Xtion are inexpensive 3D sensors. A depth image is computed by calculating the distortion of a known infrared light (IR) pattern which is projected into the scene. While these sensors are great devices they have some limitations. The distance they can measure is limited and they suffer from reflection problems on transparent, shiny, or very matte and absorbing objects. If more than one RGB-D camera is used the IR patterns interfere with each other. This results in a massive loss of depth information. In this paper, we present a simple and powerful method to overcome these problems. We propose a stereo RGB-D camera system which uses the pros of RGB-D cameras and combine them with the pros of stereo camera systems. The idea is to utilize the IR images of each two sensors as a stereo pair to generate a depth map. The IR patterns emitted by IR projectors are exploited here to enhance the dense stereo matching even if the observed objects or surfaces are texture-less or transparent. The resulting disparity map is then fused with the depth map offered by the RGB-D sensor to fill the regions and the holes that appear because of interference, or due to transparent or reflective objects. Our results show that the density of depth information is increased especially for transparent, shiny or matte objects.
Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbehörden immer häufiger gegenüberstehen.
Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden
geführt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei müssen die Ermittler möglichst
schnell und gezielt erkennen können, ob eine App tatsächlich schadhaft manipuliert wurde, was
manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen
zwar bei der generellen Erkennung schadhafter Software, sind aber für die polizeiliche Praxis nicht
geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen berücksichtigt
und so für den Einsatz in der Strafverfolgung in Frage kommt.
IT-Sicherheit im Automobil
(2014)
K3 User Guide
(2000)
Die Verbindung der Welten dressierter Elektronen und grenzenloser Kreativität bietet ein großes Potential; zum Beispiel bei modernen Skulpturen, deren Form sich durch Motoren verändern kann. An der FH Aachen wurde ein solches Projekt verwirklicht: Eine Matrix aus Holzkugeln kann Piktogramme anzeigen, aber auch mathematische Funktionen visualisieren. In diesem Artikel beschreiben wir die clevere Ansteuerung der Motoren.
Die Informationsbroschüre "Konzept für einen spielerischen Ansatz zur multimodalen Mobilitätsplanung“ richtet sich an Spiele- und System-Designer sowie Entwickler. In dieser Broschüre werden mögliche Potenziale im Bereich des allgemeinen Mobilitätsmanagements aufgezeigt, Automobilhersteller vernetzten sich zunehmend mit Technologie-Unternehmen.
Ziel der Arbeit war es eine spielerische Lernanwendung für Studierende der FH-Aachen zu entwickeln, um das individuelle Lernen zu fördern. Dabei lag der Fokus auf der Konzeptentwicklung eines Serious Games für die Fachhochschule Aachen. Abgeleitet von Motivationstheorien, Game Design Frameworks und Eigenschaften von digitalen spielerischen Konzepten wurde ein Vorgehensmodell zur Konzeptentwicklung eines Serious Games erstellt. Wichtige Punkte für die Anwendung waren eine intensive Austauschmöglichkeiten für Studierende und das Integrieren dieser in die Lehrveranstaltungen der FH-Aachen. In der abschließenden Evaluation wurde positives Feedback der Studierenden eingeholt und damit das Ziel der Arbeit erreicht.
Zusätzlich wurde für das erarbeitete Konzept die Wirtschaftlichkeit überprüft. Dafür wurde während der Bearbeitungszeit mit einem aufgestellten Team ein Business Plan für das Förderprogramm Start-Up transfer.NRW entwickelt.
Die steigende Popularität von mobilen Endgeräten im privaten und geschäftlichen Umfeld geht mit einem Anstieg an Sicherheitslücken und somit potentiellen Angriffsflächen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes können Monitoring-Apps dienen, die unerwünschtes Verhalten und Angriffe erkennen. Die automatisierte Überwachung von Endgeräten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilität der Nutzer und Nutzerinnen dieser Geräte in Bezug auf Privatsphäre, kann zu einer geringen Akzeptanz und Compliance führen. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess führt zu höherer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt Möglichkeiten zur Umsetzung.
Kurzschlußstromberechnung
(1980)
The main objective of our ROS Summer School series is to introduce MA level students to program mobile robots with the Robot Operating System (ROS). ROS is a robot middleware that is used my many research institutions world-wide. Therefore, many state-of-the-art algorithms of mobile robotics are available in ROS and can be deployed very easily. As a basic robot platform we deploy a 1/10 RC cart that is wquipped with an Arduino micro-controller to control the servo motors, and an embedded PC that runs ROS. In two weeks, participants get to learn the basics of mobile robotics hands-on. We describe our teaching concepts and our curriculum and report on the learning success of our students.
Verfügbarkeit und Nachhaltigkeit sind wichtige Anforderungen bei der Planung langlebiger technischer Systeme. Meist werden bei Lebensdaueroptimierungen lediglich einzelne Komponenten vordefinierter Systeme untersucht. Ob eine optimale Lebensdauer eine gänzlich andere Systemvariante bedingt, wird nur selten hinterfragt. Technical Operations Research (TOR) erlaubt es, aus Obermengen technischer Systeme automatisiert die lebensdaueroptimale Systemstruktur auszuwählen. Der Artikel zeigt dies am Beispiel eines hydrostatischen Getriebes.
Cardiac MR (CMR) is of proven clinical value but also an area of vigorous ongoing research since image quality is not always exclusively defined by signal-to-noise ratio (SNR) and contrast-to-noise ratio (CNR). Recent developments of CMR at 7.0 T have been driven by pioneering explorations into novel multichannel transmit and receive coil array technology to tackle the challenges B1+-field inhomogeneities, to offset specific-absorption rate (SAR) constraints and to reduce banding artifacts in SSFP imaging. For this study, recognition of the benefits and performance of local surface Tx/Rx-array structures recently established at 7.0 T inspired migration to 3.0 T, where RF inhomogeneities and SAR limitations encountered in routine clinical CMR, though somewhat reduced versus the 7.0 T situation, remain significant. For all these reasons, this study was designed to build and examine the feasibility of a local four channel Tx/Rx cardiac coil array for anatomical and functional cardiac imaging at 3.0 T. For comparison, a homebuilt 4 channel Rx cardiac coil array exhibiting the same geometry as the Tx/Rx coil and a Rx surface coil array were used.
Intelligent autonomous software robots replacing human activities and performing administrative processes are reality in today’s corporate world. This includes, for example, decisions about invoice payments, identification of customers for a marketing campaign, and answering customer complaints. What happens if such a software robot causes a damage? Due to the complete absence of human activities, the question is not trivial. It could even happen that no one is liable for a damage towards a third party, which could create an uncalculatable legal risk for business partners. Furthermore, the implementation and operation of those software robots involves various stakeholders, which result in the unsolvable endeavor of identifying the originator of a damage. Overall it is advisable to all involved parties to carefully consider the legal situation. This chapter discusses the liability of software robots from an interdisciplinary perspective. Based on different technical scenarios the legal aspects of liability are discussed.
Die Durchführung einer systematischen Literaturrecherche ist eine zentrale Kompetenz wissenschaftlichen Arbeitens und bildet daher einen festen Ausbildungsbestandteil von Bachelor- und Masterstudiengängen. In entsprechenden Lehrveranstaltungen werden Studierende zwar mit den grundlegenden Hilfsmitteln zur Suche und Verwaltung von Literatur vertraut gemacht, allerdings werden die Potenziale textanalytischer Methoden und Anwendungssysteme (Text Mining, Text Analytics) dabei zumeist nicht abgedeckt. Folglich werden Datenkompetenzen, die zur systemgestützten Analyse und Erschließung von Literaturdaten erforderlich sind, nicht hinreichend ausgeprägt. Um diese Kompetenzlücke zu adressieren, ist an der Hochschule Osnabrück eine Lehrveranstaltung konzipiert und projektorientiert umgesetzt worden, die sich insbesondere an Studierende wirtschaftswissenschaftlicher Studiengänge richtet. Dieser Beitrag dokumentiert die fachliche sowie technische Ausgestaltung dieser Veranstaltung und zeigt Potenziale für die künftige Weiterentwicklung auf.
Objective
In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance.
Method
Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression.
Result
Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20% at the cost of a higher absolute overestimation at high actual local SAR values.
Conclusion
The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.