Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (712) (remove)
Has Fulltext
- no (712) (remove)
Language
- English (712) (remove)
Document Type
- Article (413)
- Conference Proceeding (228)
- Part of a Book (38)
- Book (23)
- Conference: Meeting Abstract (6)
- Patent (2)
- Conference Poster (1)
- Doctoral Thesis (1)
Keywords
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Optimization (3)
- Powertrain (3)
- Technical Operations Research (3)
- Telecommunication (3)
- Competence Developing Games (2)
- Energy efficiency (2)
- Engineering education (2)
- Experimental validation (2)
- Gamification (2)
- Hot S-parameter (2)
- Machine Learning (2)
- Optimal Topology (2)
- Process engineering (2)
- Pump System (2)
- Robotic Process Automation (2)
- Serious Game (2)
- Ventilation System (2)
- Water (2)
- Water distribution system (2)
- autonomous driving (2)
- mathematical optimization (2)
- robotic process automation (2)
- 197m/gHg (1)
- 3-D printing (1)
- 3D object detection (1)
- Accuracy (1)
- Advanced driver assistance systems (ADAS/AD) (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomaly detection (1)
- Artificial Intelligence (1)
- Automated driving (1)
- Automation (1)
- Automotive application (1)
- Autonomous mobile robots (1)
- Awareness (1)
- BEV (1)
- Benchmark (1)
- Bloom’s Taxonomy (1)
- Booster Stations (1)
- Buffering Capacity (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- CAV (1)
- CDG (1)
- CO2 (1)
- Carbon Dioxide (1)
- Cardiovascular Magnetic Resonance (1)
- Case Study (1)
- Case study (1)
- Chance Constraint (1)
- Change culture (1)
- Charging stations (1)
- Circuit simulation (1)
- Competence Developing Game (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Control engineering (1)
- Controller Parameter (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Orientation (1)
- DC machines (1)
- Data analysis (1)
- Data visualization (1)
- Datasets (1)
- Deep learning (1)
- Digital Age (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Discrete Optimisation (1)
- Drinking Water Supply (1)
- E-carsharing (1)
- E-mobility (1)
- EGG (1)
- Education (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electronic learning (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Engineering Application (1)
- Engineering optimisation (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- FPGA (1)
- Frequency Doubler (1)
- Fully connected car (1)
- Furnace (1)
- Fusion (1)
- Future Skills (1)
- GPU (1)
- Game-based learning (1)
- Gearbox (1)
- Global optimization (1)
- Gold nanoparticle (AuNP) (1)
- Graph Theory (1)
- Harmonic Radar (1)
- Heuristic algorithms (1)
- High field MRI (1)
- Home Assistant (1)
- Home Automation Platform (1)
- ICS (1)
- IP-based networks (1)
- ISO 26262 (1)
- IT security education (1)
- Image Database (1)
- Image Forensics (1)
- Image Quality Assessment (1)
- Image Quality Score (1)
- Implementation Case (1)
- Incremental Encoder (1)
- Inductive charging (1)
- Industrial optimisation (1)
- Industry 4.0 (1)
- Information and communication technology (1)
- Integrated mobility (1)
- Interactive process mining (1)
- Interdisciplinarity (1)
- Interval Time Series (1)
- Keyword analysis (1)
- LQR (1)
- Larynx position (1)
- Latin Hypercube Sampling (1)
- Leaderboard (1)
- Lean thinking (1)
- Level Control System (1)
- Li7La3Zr2O12 (1)
- LiDAR (1)
- LiGaO2 (1)
- Lidar (1)
- Literature review (1)
- Low voltage (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MILP (1)
- MPC (1)
- MR safety (1)
- MRI (1)
- Machine learning (1)
- Magneto alert sensor (1)
- Malicious model (1)
- Manifolds (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Matlab (1)
- Meitner-Auger-electron (MAE) (1)
- Methodology (1)
- Minimum Risk Manoeuvre (1)
- Mixed Integer Programming (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear black-box optimization (1)
- Mixed-integer nonlinear problem (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Mobility management (1)
- Mode converter (1)
- Modeling (1)
- Monitoring (1)
- Mpc (1)
- Multi-criteria optimization (1)
- Multi-robot systems (1)
- NGN (1)
- Navigation (1)
- Network (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Objective data (1)
- Online services (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Closed Loop (1)
- PPO (1)
- Paper recycling (1)
- Path-following (1)
- Performance (1)
- Personality (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Plasma (1)
- Plasma diagnostics (1)
- Player Types (1)
- Position Encoder (1)
- Power dissipation (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process optimization (1)
- Process reference model (1)
- Process virtualization (1)
- Product bundling (1)
- Product family optimization (1)
- Prototype (1)
- Pumping systems (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Radar (1)
- Reference Process Model (1)
- Reference modelling (1)
- Reinforcement Learning (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- RoboCup (1)
- Robotic process automation (1)
- Rotary encoder (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- Safety of the intended functionality (SOTIF) (1)
- Safety-critical systems validation (1)
- Secure multi-party computation (1)
- Self-driving (1)
- Sensors comparison (1)
- Serious Games (1)
- Services (1)
- Similarity Theory (1)
- Smart Building (1)
- Smart factory (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software development (1)
- Software packages (1)
- Software testing (1)
- Solver Per- formance (1)
- Sound Pressure Level (1)
- Stochastic Programming (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Sustainability (1)
- Synchronous machines (1)
- System Design (1)
- System Design Problem (1)
- TGA (1)
- TM Forum (1)
- Tag (1)
- Targeted radionuclide therapy (TRT) (1)
- Teamwork (1)
- Technical Operation Research (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Throughput (1)
- Time-series synchronization (1)
- Tomography (1)
- Training (1)
- Transdisciplinarity (1)
- Transfer impedance (1)
- Transformation (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- Uktrahigh field MRI (1)
- Uncertainty (1)
- Urban areas (1)
- V2X (1)
- VOP compression (1)
- Validation (1)
- Video Game (1)
- Voice assessment (1)
- WLTP (1)
- Water Distribution (1)
- Water Supply Networks (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wiegand Effect (1)
- Wiegand sensor (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- applications (1)
- artificial intelligence (1)
- automated vehicles (1)
- availability (1)
- batteries and fuel cells (1)
- body imaging at 7 T MRI (1)
- body imaging at UHF MRI (1)
- business analytics (1)
- business process automation (1)
- business simulation (1)
- commercial offthe- shelf solutions (1)
- competence developing games (1)
- connected automated vehicles (1)
- culpability (1)
- cybersecurity (1)
- decision analytics (1)
- design of technical systems (1)
- digital economy (1)
- do-it-yourself (1)
- eTOM (1)
- education (1)
- electrospinning (1)
- embedded hardware (1)
- energy efficiency (1)
- energy transfer (1)
- enhanced Telecom Operations Map (eTOM) (1)
- experimental evaluation (1)
- fault detection (1)
- fibers (1)
- ga-doping (1)
- garnet solid electrolyte (1)
- genetic algorithm (1)
- global optimization (1)
- harmonic radar (1)
- harmonic radar tags (1)
- heating system (1)
- honeynet (1)
- honeypot (1)
- ignition (1)
- information systems (1)
- integrated transmit coil arrays (1)
- irradiation (1)
- lab work (1)
- learning theories (1)
- legal obligations (1)
- liability (1)
- management (1)
- metrological characterization (1)
- microplasma (1)
- microwave (MW) plasma (1)
- microwave measurements (1)
- mixed-integer linear programming (1)
- model-predictive control (1)
- motivation theories (1)
- next generation network (1)
- nonlinear VNA measurements (1)
- optimization (1)
- passive inter-modulation (1)
- plasma jet (1)
- porous materials (1)
- power integrity (1)
- product bundling (1)
- product liability (1)
- professional skills (1)
- programming (1)
- remote sensing (1)
- requirements (1)
- research framework (1)
- resilience (1)
- sensor networks (1)
- signal integrity (1)
- slum classification (1)
- software engineering (1)
- software evaluation (1)
- software selection (1)
- solid-state battery (1)
- stochastic optimization (1)
- sustainability (1)
- system optimization (1)
- system synthesis (1)
- systematic literature review (1)
- tablet game (1)
- technical operations research (1)
- technology (1)
- telecommunication (1)
- thermal dose (1)
- tissue temperature (1)
- transmit antenna arrays (1)
- water supply design (1)
- water supply system (1)
Thermal and Optical Study on the Frequency Dependence of an Atmospheric Microwave Argon Plasma Jet
(2019)
This paper describes the development of a capacitively coupled high-pressure lamp with input power between 20 and 43 W at 2.45 GHz, using a coaxial line network. Compared with other electrodeless lamp systems, no cavity has to be used and a reduction in the input power is achieved. Therefore, this lamp is an alternative to the halogen incandescent lamp for domestic lighting. To serve the demands of domestic lighting, the filling of the lamp is optimized over all other resulting requirements, such as high efficacy at low induced powers and fast startups. A workflow to develop RF-driven plasma applications is presented, which makes use of the hot S-parameter technique. Descriptions of the fitting process inside a circuit and FEM simulator are given. Results of the combined ignition and operation network from simulations and measurements are compared. An initial prototype is built and measurements of the lamp's lighting properties are presented along with an investigation of the efficacy optimizations using large signal amplitude modulation. With this lamp, an efficacy of 135 lmW -1 is achieved.
A novel method to determine the extruded length of a metallic wire for a directed energy deposition (DED) process using a microwave (MW) plasma jet with a straight-through wire feed is presented. The method is based on the relative comparison of the measured frequency response obtained by the large-signal scattering parameter (Hot-S) technique. In the practical working range, repeatability of less than 6% for a nonactive plasma and 9% for the active plasma state is found. Measurements are conducted with a focus on a simple solution to decrease the processing time and reduce the integration time of the process into the existing hardware. It is shown that monitoring a single frequency for magnitude and phase changes is sufficient to achieve good accuracy. A combination of different measurement values to determine the length is possible. The applicability to different diameter of the same material is shown as well as a contact detection of the wire and metallic substrate.
Performance Investigations of the IP Multicast Architecture / Hermanns, Oliver ; Schuba, Marko
(1995)
Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed
An Analysis of Retransmission Strategies for Reliable Multicast Protocols / Schuba, M. ; Reichl, P.
(1998)
Reducing poverty, protecting the planet, and improving life on earth for everyone are the essential goals of the "2030 Agenda for Sustainable Development"committed by the United Nations (UN). Achieving those goals will require technological innovation as well as their implementation in almost all areas of our business and day-to-day life. This paper proposes a high-level framework that collects and structures different uses cases addressing the goals defined by the UN. Hence, it contributes to the discussion by proposing technical innovations that can be used to achieve those goals. As an example, the goal "Climate Actionïs discussed in detail by describing use cases related to tackling biodiversity loss in order to conservate ecosystems.
Benchmarking of various LiDAR sensors for use in self-driving vehicles in real-world environments
(2022)
Abstract
In this paper, we report on our benchmark results of the LiDAR sensors Livox Horizon, Robosense M1, Blickfeld Cube, Blickfeld Cube Range, Velodyne Velarray H800, and Innoviz Pro. The idea was to test the sensors in different typical scenarios that were defined with real-world use cases in mind, in order to find a sensor that meet the requirements of self-driving vehicles. For this, we defined static and dynamic benchmark scenarios. In the static scenarios, both LiDAR and the detection target do not move during the measurement. In dynamic scenarios, the LiDAR sensor was mounted on the vehicle which was driving toward the detection target. We tested all mentioned LiDAR sensors in both scenarios, show the results regarding the detection accuracy of the targets, and discuss their usefulness for deployment in self-driving cars.
Modern implementations of driver assistance systems are evolving from a pure driver assistance to a independently acting automation system. Still these systems are not covering the full vehicle usage range, also called operational design domain, which require the human driver as fall-back mechanism. Transition of control and potential minimum risk manoeuvres are currently research topics and will bridge the gap until full autonomous vehicles are available. The authors showed in a demonstration that the transition of control mechanisms can be further improved by usage of communication technology. Receiving the incident type and position information by usage of standardised vehicle to everything (V2X) messages can improve the driver safety and comfort level. The connected and automated vehicle’s software framework can take this information to plan areas where the driver should take back control by initiating a transition of control which can be followed by a minimum risk manoeuvre in case of an unresponsive driver. This transition of control has been implemented in a test vehicle and was presented to the public during the IEEE IV2022 (IEEE Intelligent Vehicle Symposium) in Aachen, Germany.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.
The understanding that optimized components do not automatically lead to energy-efficient systems sets the attention from the single component on the entire technical system. At TU Darmstadt, a new field of research named Technical Operations Research (TOR) has its origin. It combines mathematical and technical know-how for the optimal design of technical systems. We illustrate our optimization approach in a case study for the design of a ventilation system with the ambition to minimize the energy consumption for a temporal distribution of diverse load demands. By combining scaling laws with our optimization methods we find the optimal combination of fans and show the advantage of the use of multiple fans.
Modeller for Value Systems
(1997)
20 Years of RoboCup
(2016)