Refine
Year of publication
- 2015 (70) (remove)
Document Type
- Conference Proceeding (38)
- Article (reviewed) (12)
- Article (unreviewed) (8)
- Part of a Book (5)
- Patent (4)
- Book (3)
Conference Type
- Konferenzartikel (30)
- Konferenz-Abstract (6)
- Sonstiges (2)
Is part of the Bibliography
- yes (70) (remove)
Keywords
- Applikation (5)
- Abtragung (3)
- Eingebettetes System (3)
- Herz (3)
- Kommunikation (3)
- Physik (3)
- Raman-Spektroskopie (3)
- Datensicherung (2)
- Funktechnik (2)
- Herzrhythmusstörung (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (70) (remove)
Open Access
- Closed Access (32)
- Open Access (22)
- Bronze (6)
Chronic insomnia is defined by difficulties in falling asleep, maintaining sleep, and early morning awakening, and is coupled with daytime consequences such as fatigue, attention deficits, and mood instability. These symptoms persist over a period of at least 3 months (Diagnostic and Statistical Manual 5 criteria). Chronic insomnia can be a symptom of many medical, neurological, and mental disorders. As a disorder, it incurs substantial health-care and occupational costs, and poses substantial risks for the development of cardiovascular and mental disorders, including cognitive deficits. Family and twin studies confirm that chronic insomnia can have a genetic component (heritability coefficients between 42% and 57%), whereas the investigation of autonomous and central nervous system parameters has identified hyperarousal as a final common pathway of the pathophysiology, implicating an imbalance of sleep–wake regulation consisting of either overactivity of the arousal systems, hypoactivity of the sleep-inducing systems, or both. Insomnia treatments include benzodiazepines, benzodiazepine-receptor agonists, and cognitive behavioural therapy. Treatments currently under investigation include transcranial magnetic or electrical brain stimulation, and novel methods to deliver psychological interventions.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
Stromzustandsregelung
(2015)
Smartphones Welcome! Preparatory Course in Mathematics using the Mobile App MassMatics. Case Study
(2015)
Environmental Monitoring is an attractive application field for Wireless Sensor Network (WSN). Water Level Monitoring helps to increase the efficiency of water distribution and management. In Pakistan, the world’s largest irrigation system covers 90.000 km of channels which needs to be monitored and managed on different levels. Especially the sensor systems for the small distribution channels need to be low energy and low cost. The distribution presents a technical solution for a communication system which is developed in a research project being co-funded by German Academic Exchange Service (DAAD). The communication module is based on IEEE-802.15.4 transceivers which are enhanced through Wake-On-Radio (WOR) to combine low-energy and real-time behavior. On higher layers, IPv6 (6LoWPAN) and corresponding routing protocols like Routing Protocol for Low power and Lossy Networks (RPL) can extend range of the network. The data are stored in a database and can be viewed online via a web interface. Of course, also automatic data analysis can be performed.
Transcatheter aortic valve implantation is a therapy for patients with reduced left ventricular ejection fraction and symptomatic aortic stenosis. The aim of the study was to compare the pre-and post- transcatheter aortic valve implantation procedures to determine the QRS and QT ventricular conduction times as a potential predictor of permanent pacemaker therapy requirement after transcatheter aortic valve implantation. QRS and QT ventricular conduction times were prolonged after transcatheter aortic valve implantation in heart failure patients with permanent dual chamber pacemaker therapy after transcatheter aortic valve implantation. QRS and QT ventricular conduction times may be useful parameters to evaluate the risk of post-procedural ventricular conduction block and permanent pacemaker therapy in transcatheter aortic valve implantation.