Refine
Year of publication
Document Type
- Article (reviewed) (139) (remove)
Is part of the Bibliography
- yes (139) (remove)
Keywords
- Intelligentes Stromnetz (5)
- Lithiumbatterie (5)
- Batterie (3)
- Brennstoffzelle (3)
- Elektrolyt (3)
- Netzwerk (3)
- Automatisierungssystem (2)
- CDMA (2)
- Codierung (2)
- Computer Aided Design (CAD) (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (139) (remove)
Open Access
- Closed Access (58)
- Open Access (34)
- Closed (3)
- Gold (2)
Eine Regelung zur optimalen Kraftschlußausnutzung von Lokomotiven setzt das Erreichen folgender Ziele voraus: Frühzeitiges Erkennen der Schleudergrenze zur Vermeidung von Gleitvorgängen; Fahren eines optimalen Kraftschlusses vom Fahr- und Bremsbetrieb ohne Überschreitung des Kraftschlußmaximums und schnelle Anpassung an wechselnde Arbeitspunkte, zum Beispiel an wechselnde Schienenzustände. Die vorgestellte optimale Regelung der Kraftschlußausnutzung erfaßt Schleuder- und Gleitzustände, die mit bisher eingesetzten Verfahren nicht erkannt werden können und ist Basis für ein Konzept, das ein quasi permanentes Fahren in der Nähe des Kraftschlußmaximums ermöglicht.
Seit den ersten Projekten der 90er Jahre arbeiten Hochschulen daran, geeignete Servicestrukturen für E-Learning zu etablieren, die die erforderliche technische, didaktische und organisatorische Unterstützung hochschulweit zur Verfügung stellen. Ging es zunächst darum, Services überhaupt dauerhaft zu sichern, steht heute die Frage des „wie“ im Vordergrund. Dabei wird am Bereich E-Learning ein eigentlich viel allgemeineres Problem deutlich: Die bisher überwiegende Organisation der Hochschule nach funktionellen Einheiten stößt an ihre Grenzen. Wir schlagen eine stärker prozessorientierte Sichtweise vor, analog zu Entwicklungen bei der Organisation von Unternehmen.
The growing demand for active medical implantable devices requires data and or power links between the implant and the outside world. Every implant has to be encapsulated from the body by a specific housing and one of the most common materials used is titanium or titanium alloy. Titanium thas the necessary properties in terms of mechanical and chemical stability and biocompatibility. However, its electrical conductivity presents a challenge for the electromagnetic transmission of data and power. The proposed paper presents a fast and practical method to determine the necessary transmission parameters for titanium encapsulated implants. Therefore, the basic transformer-transmission-model is used with measured or calculated key values for the inductances. Those are then expanded with correction factors to determine the behavior with the encapsulation. The correction factors are extracted from finite element method simulations. These also enable the analysis of the magnetic field distribution inside of the housing. The simulated transmission properties are very close to the measured values. Additionally, based on lumped elements and magnetic field distribution, the influential parameters are discussed in the paper. The parameter discussion describes how to enhance the transmitted power, data-rate or distance, or to reduce the size of the necessary coils. Finally, an example application demonstrates the usage of the methods.
The bandwidth behavior of graded-index multimode fibers (GI-MMFs) for different launching conditions is investigated to understand and characterize the effect of differential mode delay. In order to reduce the launch-power distribution the near field of a single-mode fiber is used to produce a controlled restricted launch. The baseband response is measured by observing the broadening of a narrow input pulse (time-domain measurement). The paper verifies the degradation in bandwidth due to profile distortion by scanning the spot of the single-mode fiber with a transversal offset from the center of the test sample. In addition, the impact of the launch-power distribution tuned by different spot-size diameters is demonstrated. Measurements were taken on ‘older’ 50-μm and 62.5-μm GI-MMFs as well as on laser-performance-optimized fibers more recently developed.
Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP).
The mobile devices related industries are subject to rapid change, driven by technological advances and dynamic consumer behaviour. Hence, the understanding of the mobile devices markets is an important step in the analysis phase of mobile applications development. In this paper, a brief description of the different markets is introduced followed by an analysis of the main features of the markets leaders' devices which are important in the development process of mobile web applications. Finally, approaches are proposed to deal with the mobile devices diversity.
A new yield function for lamellar gray cast iron materials is proposed. The new model is able to describe the results of recently performed microstructure-based finite-element computations that resolve the three dimensional yield surface of three different gray cast irons. The yield function requires only the yield stress in tension and compression of the respective material as model parameters. Furthermore, the algorithmic formulation of the new model is assessed for numerical robustness and efficiency.
In this study, a high-performance controller is proposed for single-phase grid-tied energy storage systems (ESSs). To control power factor and current harmonics and manage time-shifting of energy, the ESS is required to have low steady-state error and fast transient response. It is well known that fast controllers often lack the required steady-state accuracy and trade-off is inevitable. A hybrid control system is therefore presented that combines a simple yet fast proportional derivative controller with a repetitive controller which is a type of learning controller with small steady-state error, suitable for applications with periodic grid current harmonic waveforms. This results in an improved system with distortion-free, high power factor grid current. The proposed controller model is developed and design parameters are presented. The stability analysis for the proposed system is provided and the theoretical analysis is verified through stability, transient and steady-state simulations.
Exploiting Dissent: Towards Fuzzing-based Differential Black Box Testing of TLS Implementations
(2017)
The Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the internet. Yet do implementations of TLS keep on suffering from bugs and security vulnerabilities. In large part is this due to the protocol's complexity which makes implementing and testing TLS notoriously difficult. In this paper, we present our work on using differential testing as effective means to detect issues in black-box implementations of the TLS handshake protocol. We introduce a novel fuzzing algorithm for generating large and diverse corpuses of mostly-valid TLS handshake messages. Stimulating TLS servers when expecting a ClientHello message, we find messages generated with our algorithm to induce more response discrepancies and to achieve a higher code coverage than those generated with American Fuzzy Lop, TLS-Attacker, or NEZHA. In particular, we apply our approach to OpenssL, BoringSSL, WolfSSL, mbedTLS, and MatrixSSL, and find several real implementation bugs; among them a serious vulnerability in MatrixSSL 3.8.4. Besides do our findings point to imprecision in the TLS specification. We see our approach as present in this paper as the first step towards fully interactive differential testing of black-box TLS protocol implementations. Our software tools are publicly available as open source projects.