Conference Proceeding
Refine
Year of publication
- 2024 (5)
- 2023 (30)
- 2022 (43)
- 2021 (46)
- 2020 (46)
- 2019 (74)
- 2018 (64)
- 2017 (66)
- 2016 (65)
- 2015 (71)
- 2014 (51)
- 2013 (57)
- 2012 (59)
- 2011 (44)
- 2010 (48)
- 2009 (52)
- 2008 (37)
- 2007 (44)
- 2006 (60)
- 2005 (23)
- 2004 (22)
- 2003 (22)
- 2002 (25)
- 2001 (12)
- 2000 (12)
- 1999 (7)
- 1998 (8)
- 1997 (8)
- 1996 (4)
- 1995 (4)
- 1993 (6)
- 1992 (3)
- 1991 (2)
- 1990 (1)
- 1989 (3)
- 1988 (3)
- 1986 (1)
- 1985 (2)
- 1984 (3)
- 1983 (2)
- 1981 (2)
- 1980 (1)
- 1979 (1)
- 1978 (3)
- 1975 (2)
- 1973 (2)
Document Type
- Conference Proceeding (1146) (remove)
Language
- English (1146) (remove)
Keywords
- Biosensor (25)
- CAD (7)
- Finite-Elemente-Methode (7)
- civil engineering (7)
- Bauingenieurwesen (6)
- Blitzschutz (6)
- Enterprise Architecture (5)
- Clusterion (4)
- Energy storage (4)
- Gamification (4)
- Leadership (4)
- Limit analysis (4)
- Natural language processing (4)
- Power plants (4)
- Sonde (4)
- Telekommunikationsmarkt (4)
- hydrogen (4)
- solar sail (4)
- Air purification (3)
- Associated liquids (3)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (230)
- Fachbereich Medizintechnik und Technomathematik (208)
- Fachbereich Luft- und Raumfahrttechnik (178)
- Fachbereich Energietechnik (177)
- IfB - Institut für Bioengineering (147)
- Solar-Institut Jülich (110)
- Fachbereich Maschinenbau und Mechatronik (107)
- Fachbereich Bauingenieurwesen (73)
- Fachbereich Wirtschaftswissenschaften (51)
- ECSM European Center for Sustainable Mobility (50)
- MASKOR Institut für Mobile Autonome Systeme und Kognitive Robotik (46)
- INB - Institut für Nano- und Biotechnologien (39)
- Fachbereich Chemie und Biotechnologie (23)
- Kommission für Forschung und Entwicklung (16)
- Nowum-Energy (11)
- Fachbereich Architektur (7)
- Fachbereich Gestaltung (4)
- Institut fuer Angewandte Polymerchemie (2)
- ZHQ - Bereich Hochschuldidaktik und Evaluation (2)
- Arbeitsstelle fuer Hochschuldidaktik und Studienberatung (1)
Seismic design of buried pipeline systems for energy and water supply is not only important for plant and operational safety but also for the maintenance of the supply infrastructure after an earthquake. The present paper shows special issues of the seismic wave impacts on buried pipelines, describes calculation methods, proposes approaches and gives calculation examples. This paper regards the effects of transient displacement differences and resulting tensions within the pipeline due to the wave propagation of the earthquake. However, the presented model can also be used to calculate fault rupture induced displacements. Based on a three-dimensional Finite Element Model parameter studies are performed to show the influence of several parameters such as incoming wave angle, wave velocity, backfill height and synthetic displacement time histories. The interaction between the pipeline and the surrounding soil is modeled with non-linear soil springs and the propagating wave is simulated affecting the pipeline punctually, independently in time and space. Special attention is given to long-distance heat pipeline systems. Here, in regular distances expansion bends are arranged to ensure movements of the pipeline due to high temperature. Such expansion bends are usually designed with small bending radii, which during the earthquake lead to high bending stresses in the cross-section of the pipeline. Finally, an interpretation of the results and recommendations are given for the most critical parameters.
Frequency Dependent Impedance Analysis of the Foundation-Soil-Systems of Onshore Wind Turbines
(2018)
Reinforced concrete (RC) frames with masonry infills are frequently used in seismic regions all over the world. Generally masonry infills are considered as nonstructural elements and thus are typically neglected in the design process. However, the observations made after strong earthquakes have shown that masonry infills can modify the dynamic behavior of the structure significantly. The consequences were total collapses of buildings and loss of human lives. This paper presents the new system INODIS (Innovative Decoupled Infill System) developed within the European research project INSYSME (Innovative Systems for Earthquake Resistant Masonry Enclosures in RC Buildings). INODIS decouples the frame and the masonry infill by means of special U-shaped rubbers placed in between frame and infill. The effectiveness of the system was investigated by means of full scale tests on RC frames with masonry infills subjected to in-plane and out-of-plane loading. Furthermore small specimen tests were conducted to determine material characteristics of the components and the resistances of the connections. Finally, a micromodel was developed to simulate the in-plane behavior of RC frames infilled with AAC blocks with and without installation of the INODIS system.
The continuing growth of scientific publications raises the question how research processes can be digitalized and thus realized more productively. Especially in information technology fields, research practice is characterized by a rapidly growing volume of publications. For the search process various information systems exist. However, the analysis of the published content is still a highly manual task. Therefore, we propose a text analytics system that allows a fully digitalized analysis of literature sources. We have realized a prototype by using EBSCO Discovery Service in combination with IBM Watson Explorer and demonstrated the results in real-life research projects. Potential addressees are research institutions, consulting firms, and decision-makers in politics and business practice.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
Research collaborations provide opportunities for both practitioners and researchers: practitioners need solutions for difficult business challenges and researchers are looking for hard problems to solve and publish. Nevertheless, research collaborations carry the risk that practitioners focus on quick solutions too much and that researchers tackle theoretical problems, resulting in products which do not fulfill the project requirements.
In this paper we introduce an approach extending the ideas of agile and lean software development. It helps practitioners and researchers keep track of their common research collaboration goal: a scientifically enriched software product which fulfills the needs of the practitioner’s business model.
This approach gives first-class status to application-oriented metrics that measure progress and success of a research collaboration continuously. Those metrics are derived from the collaboration requirements and help to focus on a commonly defined goal.
An appropriate tool set evaluates and visualizes those metrics with minimal effort, and all participants will be pushed to focus on their tasks with appropriate effort. Thus project status, challenges and progress are transparent to all research collaboration members at any time.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.