Refine
Year of publication
- 2017 (34) (remove)
Document Type
- Conference Proceeding (18)
- Article (11)
- Part of Periodical (2)
- Report (2)
- Lecture (1)
Is part of the Bibliography
- no (34)
Keywords
- Automated Driving Technology (1)
- Automotive User Interfaces (1)
- Fachhochschule (1)
- Future Driving Experiences (1)
- Hochschule Ruhr West (1)
- Mülheim an der Ruhr (1)
- Public Relations (1)
- Quality Criteria (1)
- Wissensmanagement (1)
- Zeitschrift (1)
Anonymity-preserving Methods for Client-side Filtering in Position-based Collaboration Approaches
(2017)
Checking wind turbines for damage is a common problem for operators of wind parks, as regular inspections are legally required in many countries and prevention is economically viable. While some of the common forms of damage are easily visible on the surface, structural problems can remain invisible for years before they eventually result in catastrophic failure of a rotor blade. Common forms of testing fibre composite parts like ultrasonic testing or X-ray tests are impractical due to the large dimensions of wind turbine components and their limited accessibility for any short-range methods. Active thermographic inspection of wind turbines is a promising approach to testing for structural flaws beneath the surface of rotor blades. As part of an ongoing research project, a setup for testing the general viability of this method was built and used to compare different thermographic cameras. A sample cut from a discarded rotor blade was modified to emulate structural damage. The results are promising for the development of a cost effective on-site testing system.
Das kEFIR‐Projekt untersucht die praktische Anwendung von thermographischen Verfahren zur Analyse der strukturellen Integrität von Windkraftrotorblättern. Das Projekt entstand in Zusammenarbeit der Hochschule Ruhr West (HRW) mit der IQbis Consulting GmbH im Rahmen eines ZIM‐Förderprojekts des Bundesministeriums für Wirtschaft und Energie (BMWi). Hintergrund ist die zunehmende Anzahl von Windkraftanlagen (WKA) und der somit steigende Wartungsaufwand. Um einen reibungslosen Betrieb dieser Anlagen zu gewährleisten und damit den besonderen Anforderungen an die Verfügbarkeit energieerzeugender Anlagen sicherzustellen, ist ein Bedarf an qualitativ hochwertigen Fehleranalysesystemen für im Betrieb befindlicher WKA von besonderer Bedeutung. Erfahrungsgemäß ist der Zeitaufwand für diese Inspektionen mit aktuellen Mitteln sehr groß und wird üblicherweise mit mehreren Arbeitstagen kalkuliert. Die Reproduzierbarkeit der gewonnenen Daten ist bei den derzeitigen Methoden meist nicht gewährleistet. Um frühzeitig auf Instabilitäten oder Schäden in den Rotorblättern einer WKA aufmerksam zu werden, ist die Entwicklung eines schnellen und qualitativ hoch wertigen Fehleranalysesystems von zentraler Bedeutung. Ein Forschungsschwerpunkt in diesem Zusammenhang ist die Entwicklung von geeigneten bildgebenden und berührungslosen Verfahren, welche bei den Inspektionen eingesetzt werden können. Beispielsweise erlaubt der Einsatz thermographischer Sensoren eine Analyse nicht nur der Rotorblattoberfläche, sondern auch ihrer inneren Struktur. Weiterhin ist aufgrund des schnell wachsenden Marktes bei unbemannten Luftfahrzeugen, wie beispielsweise positionsstabiler Quatrocoptersysteme, eine zusätzliche Möglichkeit gegeben, die Inspektion von Windenergieanlagen mit Hilfe mobiler, kompakter und fliegender Analysesysteme zu unterstützen.
Das CameraFramework wurde entwickelt, um mittels Socket-Kommunikation [1] als Middleware zwischen verschiedenen Kamerainstanzen mit eigenen Kameratreibern und Clienten zu fungieren. Über diesen Kommunikationsweg ist es möglich Clienten nicht nur lokal, sondern auch über das Netzwerk mit Kameradaten zu versorgen. Um neue Kameras mit dem Framework nutzen zu können, muss die Implementierung gewissen Regeln folgen, was durch ein vorgegebenes Basis-Interface (abstrakte Basis-Klasse in C++ [2]) fast vollständig sichergestellt ist. Neue Kameras werden zur Laufzeit über dynamische Bibliotheken geladen. Parameter für Kameras sind über ein XML-File [3] einzustellen. Funktionen zur Übergabe von neuen Kameradaten sind implementiert und müssen durch den Entwickler der einzelnen Kamerainterfaces aufgerufen werden.
Die Zuordnung von Kameradaten zum passenden Nutzer übernimmt das Framework. Jeder Clienterhält seinen eigenen konfigurierbaren Ringbuffer [4] um unabhängig von anderen Nutzern und Kameras zu sein. Die Aufgaben des Frameworks sind auf verschiedene Module, wie in Abbildung 1 dargestellt, aufgeteilt.
Wissensmanagement (WM) und IT-gestütztes Lernen sind gerade in kleinen Behörden der Öffentlichen Verwaltung (ÖV), wie z.B. in ländlichen
Gemeinden, noch ausbaufähig. Am Beispiel des EU-Projekts EAGLE werden
Projektergebnisse als Verbesserungsansätze für ein arbeitsprozessorientiertes, IT-gestütztes Lernen vorgestellt. Neuartige Plattform-Features und ihr ÖV-spezifischer Nutzen werden erläutert. Die Ergebnisse der Plattformvalidierung werden vorgestellt. Ferner werden Vorschläge gemacht, wie die Ergebnisse aus EAGLE mit WM und weiteren Wissensquellen der ÖV, wie z.B. der Registratur, zu einem Gesamtkonzept mit bereits vorhandenen Fortbildungs- und WM-Ansätzen verbunden werden können.
Web based security applications have become increasingly important in the past years. Especially in times of blockchain based crypto currencies, user authentication is a critical aspect for the overall security, integrity and acceptance of such systems. While blockchain technologies provide a decentralized approach, the client side still largely relies on centralized security approaches. Those centralized approaches are easier to implement, but at the same time bear the risk of usual security flaws. Therefore, this paper presents a decentralized approach for increasing the security by adding a decentralized two-factor authentication mechanism to the execution of
operations.
In recent times, a lot of attacks against central server infrastructures have been recognized. Those infrastructures have seen attacks ranging from attacks against Internt of Things (IoT) infrastructures, via attacks against public infrastructure to attacks against cryptocurrency exchanges and blockchain based infrastructures themselves, e.g., the already almost legendary Decentralized Autonomous Organization (DAO) hack. Measured by press coverage, attacks against cryptocurrency exchanges and infrastructures seem to be among the most prominently reported attacks, probably due to the large amount of money that is stolen during those attacks and the great (but obviously still quite risky) potential (and financial involvement) of the blockchain technology. Naturally, attacks like the ones we have seen recently in crease the notion of uncertainty of blockchain technologies among the people,mreflected in lower values of cryptocurrencies in general. Obviously, this demands for an overall increase of security of cryptocurrency based technologies. Therefore, this paper provides an architectural approach, based on a proxy,to increase security of publicly available nodes of a blockchain based technology. Furthermore, it provides a first evaluation of the approach based on the results of an extensive community test of a new cryptocurrency.
A Large and Quick Induction Field Scanner for Examining the Interior of Extended Objects or Humans
(2017)
This study describes the techniques and signal properties of a large, powerful, and linear-scanning 1.5 MHz induction field scanner. The mechanical system is capable of quickly reading the volume of relative large objects, e.g., a test person. The general approach mirrors Magnetic Induction Tomography (MIT), but the details differ considerably from currently-described MIT systems: the setup is asymmetrical, and it operates in gradiometric modalities, either with coaxial excitation with destructive interference or with a single excitation loop and tilted receivers. Following this approach, the primary signals were almost completely nulled, and test objects' real or imaginary imprint was obtained directly. The coaxial gradiometer appeared advantageous: exposure to strong fields was reduced due to destructive interference. Meanwhile, the signals included enhanced components at higher spatial frequencies, thereby obtaining a gradually improved capability for localization. For robust signals, the excitation field can be powered towards the rated limits of human exposure to time-varying magnetic fields. Repeated measurements assessed the important signal integrity, which is affected by the scanner´s imperfections, particularly any motions or respiratory changes in living beings during or between repeated scans. The currently achieved and overall figure of merit for artifacts was 58 dB for inanimate test objects and 44 dB for a test person. Both numbers should be understood as worst case levels: a repeated scan with intermediate breathing and drift/dislocations requires 50 seconds, whereas a single measurement (with respiratory arrest) takes only about 5 seconds.
Practical application of object detection systems, in research or industry, favors highly optimized black box solutions. We show how such a highly optimized system can be further augmented in terms of its reliability with only a minimal increase of computation times, i.e. preserving realtime boundaries. Our solution leaves the initial (HOG-based) detector unchanged and introduces novel concepts of non-linear metrics and fusion of ROIs. In this context we also introduce a novel way of combining feature vectors for mean-shift grouping. We evaluate our approach on a standarized image database with a HOG detector, which is representative for practical applications. Our results show that the amount of false-positive detections can be reduced by a factor of 4 with a negligable complexity increase. Although introduced and applied to a HOG-based system, our approach can easily be adapted for different detectors.
The Bitcoin whitepaper states that security of the system is guaranteed as long as honest miners control more than half of the current total computational power. The whitepaper assumes a static difficulty, thus it is equally hard to solve a cryptographic proof-of-work puzzle for any given moment of the system history. However, the real Bitcoin network is using an adaptive difficulty adjustment mechanism. In this paper we introduce and analyze a new kind of attack on a mining difficulty retargeting function used in Bitcoin. A malicious miner is increasing his mining profits from the attack, named coin-hopping attack, and, as a side effect, an average delay between blocks is increasing. We propose an alternative difficulty adjustment algorithm in order to reduce an incentive to perform coin-hopping, and also to improve stability of inter-block delays. Finally, we evaluate the presented approach and show that the novel algorithm performs better than the original algorithm of Bitcoin.
Applying step heating thermography to wind turbine rotor blades as a non-destructive testing method
(2017)
Group-centered framework towards a positive design of digital collaboration in global settings
(2017)
Globally distributed groups require collaborative systems to support their work. Besides being able to support the teamwork, these systems also should promote well-being and maximize the human potential that leads to an engaging system and joyful experience. Designing such system is a significant challenge and requires a thorough understanding of group work. We used the field theory as a lens to view the essential aspects of group motivation and then utilized collaboration personas to analyze the elements of group work. We integrated well-being determinants as engagement factors to develop a group-centered framework for digital collaboration in a global setting. Based on the outcomes, we proposed a conceptual framework to design an engaging collaborative system and recommend system values that can be used to evaluate the system further.
The open education movement has witnessed ups and downs from initial interest in transparency and openness, followed by a lack of reuse of open educational resources (OER) and the massive boost of interest in massive open online courses (MOOCs). This article addresses educators' online behaviors and perceptions regarding participation in collaborative development of OER in online settings. Using a data-driven approach to study educators' perceptions, this article presents multiple considerations for collaborative OER development and validates a new model explaining educators' intention to participate in collaborative action. The findings reveal the contradictory nature of emotional ownership of knowledge: a critical enabling factor for commitment and a barrier to knowledge exchange in an open and transparent manner. The findings also show how outcome expectations regarding increase in reputation and status in the network do not influence the intention to share knowledge. Further interviews with idea-sharing platform users enable us to explain the favorable settings to resolve the dilemma of emotional ownership. The study contributes not only to further development of the open education movement but also to theory development of educators’ collaborative behaviors online.
Photoluminescence (PL) in GaN or InGaN layers monitored during epitaxial growth at high temperatures permits a quasi-continuous in situ characterization of opto-electronic properties. Therefore, epitaxial parameters can now be optimized at the earliest possible stage. A pulsed and high-power UV laser was required for PL excitation at high temperatures. Herein, the underlying nonlinear mechanism was studied via time-resolved PL experiments and rate equation-based modeling. A temperature-activated and saturable path for quenching over defects was identified. Beyond the saturation threshold, reasonably-intensive PL sets in. At high temperatures not only is the near band gap-PL present, but also—as a new observation—a defect-assisted PL emerges. Apart from these specific electronic transitions in high-temperature PL of GaN, a simple, but reasonably predictive model of the luminescent thin film has been set up to track down interference fringes in the PL spectra. It is worth mentioning that the spectral PL modulation (aiming at the Purcell effect) is often mixed up with ordinary Fabry–Pérot interference. A distinction has become key to properly analyze the spectral signatures of high-temperature PL in order to provide a reliable in situ characterization of GaN layers during epitaxial growth
Gallium Nitride (GaN) and Indium Gallium Nitride (InGaN) have become important semiconductor materials for the LED lighting industry. Recently, a photoluminescence (PL) technique for direct in-situ characterization of GaN and InGaN layers during epitaxial growth in a planetary metalorganic vapor phase epitaxy (MOVPE) reactor was reported. The PL signals reveal – at the earliest possible stage – information about current layer thickness, temperature, composition, surface roughness, and self-absorption. Thus, the PL data is valuable for both controlling and optimizing the growth parameters, thereby promising both better devices and a better yield for the LED industry. This technical report describes an extension of this PL technique to close coupled showerhead (CCS) reactors with narrow optical viewports. In contrast to the wide aperture optics in previous investigations, a compact and all-fiber optical probe without voluminous lens optics, filter elements or beam splitters was used.