Refine
Year of publication
- 2015 (52) (remove)
Document Type
- Conference Proceeding (32)
- Article (reviewed) (12)
- Article (unreviewed) (4)
- Part of a Book (3)
- Patent (1)
Conference Type
- Konferenzartikel (25)
- Konferenz-Abstract (5)
- Sonstiges (2)
Language
- English (52) (remove)
Is part of the Bibliography
- yes (52) (remove)
Keywords
- Applikation (4)
- Eingebettetes System (3)
- Kommunikation (3)
- Abtragung (2)
- Herzrhythmusstörung (2)
- Medizintechnik (2)
- Raman-Spektroskopie (2)
- Analytical Query (1)
- App <Programm> (1)
- Automotive engineering (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (52) (remove)
Open Access
- Closed Access (27)
- Open Access (16)
- Bronze (5)
The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method.
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).
Chronic insomnia is defined by difficulties in falling asleep, maintaining sleep, and early morning awakening, and is coupled with daytime consequences such as fatigue, attention deficits, and mood instability. These symptoms persist over a period of at least 3 months (Diagnostic and Statistical Manual 5 criteria). Chronic insomnia can be a symptom of many medical, neurological, and mental disorders. As a disorder, it incurs substantial health-care and occupational costs, and poses substantial risks for the development of cardiovascular and mental disorders, including cognitive deficits. Family and twin studies confirm that chronic insomnia can have a genetic component (heritability coefficients between 42% and 57%), whereas the investigation of autonomous and central nervous system parameters has identified hyperarousal as a final common pathway of the pathophysiology, implicating an imbalance of sleep–wake regulation consisting of either overactivity of the arousal systems, hypoactivity of the sleep-inducing systems, or both. Insomnia treatments include benzodiazepines, benzodiazepine-receptor agonists, and cognitive behavioural therapy. Treatments currently under investigation include transcranial magnetic or electrical brain stimulation, and novel methods to deliver psychological interventions.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.