Refine
Year of publication
- 2024 (5)
- 2023 (23)
- 2022 (18)
- 2021 (26)
- 2020 (29)
- 2019 (44)
- 2018 (44)
- 2017 (37)
- 2016 (35)
- 2015 (36)
- 2014 (43)
- 2013 (41)
- 2012 (32)
- 2011 (38)
- 2010 (35)
- 2009 (36)
- 2008 (40)
- 2007 (39)
- 2006 (27)
- 2005 (25)
- 2004 (35)
- 2003 (33)
- 2002 (29)
- 2001 (33)
- 2000 (34)
- 1999 (31)
- 1998 (28)
- 1997 (34)
- 1996 (25)
- 1995 (22)
- 1994 (21)
- 1993 (18)
- 1992 (13)
- 1991 (14)
- 1990 (9)
- 1989 (17)
- 1988 (11)
- 1987 (8)
- 1986 (9)
- 1985 (9)
- 1984 (3)
- 1983 (7)
- 1982 (4)
- 1981 (3)
- 1980 (12)
- 1979 (6)
- 1978 (7)
- 1977 (1)
- 1976 (7)
- 1975 (3)
- 1974 (4)
- 1973 (1)
- 1972 (3)
- 1971 (2)
- 1970 (1)
Document Type
- Article (625)
- Conference Proceeding (296)
- Book (113)
- Part of a Book (61)
- Patent (15)
- Report (9)
- Other (8)
- Contribution to a Periodical (6)
- Course Material (6)
- Doctoral Thesis (6)
- Bachelor Thesis (1)
- Video (1)
- Poster (1)
- Review (1)
- Talk (1)
Language
- English (693)
- German (456)
- Multiple languages (1)
Keywords
- Multimediamarkt (7)
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Gamification (4)
- Serious Game (4)
- Auslenkung (3)
- Digitale Transformation (3)
- Digitalisierung (3)
- Education (3)
- Javasimulation (3)
- Literaturanalyse (3)
- Optimization (3)
- Powertrain (3)
- Referenzmodellierung (3)
- Robotic Process Automation (3)
- Technical Operations Research (3)
- Telecommunication (3)
- Amplitude (2)
- Autonomous mobile robots (2)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1150) (remove)
Objective
In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance.
Method
Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression.
Result
Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20% at the cost of a higher absolute overestimation at high actual local SAR values.
Conclusion
The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.
Design and Development of a Hot S-Parameter Measurement System for Plasma and Magnetron Applications
(2020)
In this paper, an approach to propulsion system modelling for hybrid-electric general aviation aircraft is presented. Because the focus is on general aviation aircraft, only combinations of electric motors and reciprocating combustion engines are explored. Gas turbine hybrids will not be considered. The level of the component's models is appropriate for the conceptual design stage. They are simple and adaptable, so that a wide range of designs with morphologically different propulsive system architectures can be quickly compared. Modelling strategies for both mass and efficiency of each part of the propulsion system (engine, motor, battery and propeller) will be presented.
Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, Ändern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Darüber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden können. Durch die Anwendung dieses Gedankengebäudes auf IT Sicherheit von Organisationen können eine Reihe von Verbesserungen in Unternehmen identifiziert werden.
Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.
Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security
(2021)
Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.
The increasing complexity of Advanced Driver Assistance Systems (ADAS) presents a challenging task to validate safe and reliable performance of these systems under varied conditions. The test and validation of ADAS/AD with real test drives, although important, involves huge costs and time. Simulation tools provide an alternative with the added advantage of reproducibility but often use ideal sensors, which do not reflect real sensor output accurately. This paper presents a new validation methodology using fault injection, as recommended by the ISO 26262 standard, to test software and system robustness. In our work, we investigated and developed a tool capable of inserting faults at different software and system levels to verify its robustness. The scope of this paper is to cover the fault injection test for the Visteon’s DriveCore™ system, a centralized domain controller for Autonomous driving which is sensor agnostic and SoC agnostic. With this new approach, the validation of safety monitoring functionality and its behavior can be tested using real-world data instead of synthetic data from simulation tools resulting in having better confidence in system performance before proceeding with in-vehicle testing.