Refine
Year of publication
- 2017 (258) (remove)
Institute
- Fachbereich Medizintechnik und Technomathematik (66)
- Fachbereich Elektrotechnik und Informationstechnik (37)
- IfB - Institut für Bioengineering (34)
- Fachbereich Luft- und Raumfahrttechnik (33)
- Fachbereich Wirtschaftswissenschaften (32)
- Fachbereich Energietechnik (27)
- INB - Institut für Nano- und Biotechnologien (27)
- Fachbereich Maschinenbau und Mechatronik (24)
- Fachbereich Bauingenieurwesen (14)
- Fachbereich Architektur (12)
Has Fulltext
- no (258) (remove)
Document Type
- Article (109)
- Conference Proceeding (86)
- Part of a Book (34)
- Book (13)
- Other (11)
- Report (2)
- Contribution to a Periodical (1)
- Doctoral Thesis (1)
- Patent (1)
Keywords
- Autonomous mobile robots (2)
- Gamification (2)
- Industry 4.0 (2)
- MASCOT (2)
- Multi-robot systems (2)
- Smart factory (2)
- 3D nonlinear finite element model (1)
- Acceptance tests (1)
- Ausfachungsmauerwerk (1)
- Automated Optimization (1)
Is part of the Bibliography
- no (258)
Robustheit
(2017)
Field-effect EIS (electrolyte-insulator-semiconductor) sensors modified with a positively charged weak polyelectrolyte layer have been applied for the electrical detection of DNA (deoxyribonucleic acid) immobilization and hybridization by the intrinsic molecular charge. The EIS sensors are able to detect the existence of target DNA amplicons in PCR (polymerase chain reaction) samples and thus, can be used as tool for a quick verification of DNA amplification and the successful PCR process. Due to their miniaturized setup, compatibility with advanced micro- and nanotechnologies, and ability to detect biomolecules by their intrinsic molecular charge, those sensors can serve as possible platform for the development of label-free DNA chips. Possible application fields as well as challenges and limitations will be discussed.
Ein Garten im Weltraum
(2017)
In a special paired sample case, Hotelling’s T² test based on the differences of the paired random vectors is the likelihood ratio test for testing the hypothesis that the paired random vectors have the same mean; with respect to a special group of affine linear transformations it is the uniformly most powerful invariant test for the general alternative of a difference in mean. We present an elementary straightforward proof of this result. The likelihood ratio test for testing the hypothesis that the covariance structure is of the assumed special form is derived and discussed. Applications to real data are given.
Scientific questions
- How can a non-stationary heat offering in the commercial vehicle be used to reduce fuel consumption?
- Which potentials offer route and environmental information among with predicted speed and load trajectories to increase the efficiency of a ORC-System?
Methods
- Desktop bound holistic simulation model for a heavy duty truck incl. an ORC System
- Prediction of massflows, temperatures and mixture quality (AFR) of exhaust gas
SAR Simulations & Safety
(2017)
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
Hotelling’s T² tests in paired and independent survey samples are compared using the traditional asymptotic efficiency concepts of Hodges–Lehmann, Bahadur and Pitman, as well as through criteria based on the volumes of corresponding confidence regions. Conditions characterizing the superiority of a procedure are given in terms of population canonical correlation type coefficients. Statistical tests for checking these conditions are developed. Test statistics based on the eigenvalues of a symmetrized sample cross-covariance matrix are suggested, as well as test statistics based on sample canonical correlation type coefficients.