Conference Proceeding
Refine
Year of publication
- 2014 (52) (remove)
Institute
- Fachbereich Energietechnik (15)
- Fachbereich Medizintechnik und Technomathematik (14)
- Fachbereich Elektrotechnik und Informationstechnik (9)
- IfB - Institut für Bioengineering (8)
- INB - Institut für Nano- und Biotechnologien (6)
- Fachbereich Luft- und Raumfahrttechnik (4)
- Fachbereich Bauingenieurwesen (3)
- Fachbereich Chemie und Biotechnologie (1)
- Fachbereich Maschinenbau und Mechatronik (1)
- Fachbereich Wirtschaftswissenschaften (1)
Language
- English (52) (remove)
Document Type
- Conference Proceeding (52) (remove)
Keywords
This paper describes two courses on
simulation methods for graduate students:
“Simulation Methods” and “Simulation and
Optimization in Virtual Engineering” The
courses were planned to teach young engineers
how to work with simulation software as well as
to understand the necessary mathematical background.
As simulation software COMSOL is
used. The main philosophy was to combine
theory and praxis in a way that motivates the
students. In addition “soft skills” should be
improved. This was achieved by project work as
final examination. As underlying didactical principle
the ideas of Bloom’s revised taxonomy
were followed. The paper basically focusses on
educational aspects, e.g. how to structure the
course, plan the exercises, organize the project
work and include practical COMSOL examples.
Risk management for structures with a risk of explosion should be considered very carefully when performing a risk analysis according to IEC 62305-2. In contrast to the 2006 edition of the standard, the 2010 edition describes the topic “Structures with a risk of explosion” in more detail. Moreover, in Germany separate procedures and parameters are defined for the risk analysis of structures with a risk of explosion (Supplement 3 of the German DIN EN 62305-2 standard). This paper describes the contents and the relevant calculations of this Supplement 3, together with a numerical example.
The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.