Refine
Year of publication
Document Type
- Conference Proceeding (139) (remove)
Conference Type
- Konferenzartikel (137)
- Konferenz-Abstract (1)
- Sonstiges (1)
Language
- English (139) (remove)
Is part of the Bibliography
- yes (139)
Keywords
- Eingebettetes System (5)
- Kommunikation (5)
- Messung (3)
- Security (3)
- Sensortechnik (3)
- cryptography (3)
- Applikation (2)
- Energieversorgung (2)
- Internet der Dinge (2)
- Internet of Things (2)
- MEMS (2)
- Messtechnik (2)
- NB-IoT (2)
- Netzwerk (2)
- Neural networks (2)
- PKI (2)
- Predictive Maintenance (2)
- TLS (2)
- accelerometer (2)
- certificate management (2)
- efficient training (2)
- printed electronics (2)
- security (2)
- 5G (1)
- 5G mobile communication (1)
- 5G private networks (1)
- 6LoWPAN (1)
- AIN Cantilever (1)
- Abbreviate Injury Scale (1)
- Accident Analysis (1)
- Advanced Driver Assistance System (1)
- Android (1)
- Authentication (1)
- Authorization (1)
- Automation (1)
- Automotive engineering (1)
- Bearings (1)
- Blockchain (1)
- Blockchains (1)
- Bussystem (1)
- Car-2-Car communication (1)
- Car-2-X communication (1)
- Car-to-Car-(C2C)-Communication (1)
- Cascading Style Sheets (1)
- Collision Point (1)
- Computerunterstützte Kommunikation (1)
- Cyber Physical Systems, (1)
- Data breech (1)
- Design (1)
- Drahtloses lokales Netz (1)
- EAP-TLS (1)
- ETAP Simulations (1)
- Economics (1)
- Edge AI (1)
- Education (1)
- Electronic Commerce (1)
- Embedded AI (1)
- Embedded Software (1)
- Embedded Systems (1)
- Energieverbrauch (1)
- Fahrzeug (1)
- Failure analysis (1)
- Fault Classification (1)
- Federated Learning (1)
- Funktechnik (1)
- Haustechnik (1)
- Hybrid system (1)
- IEC/IEEE 60802 security (1)
- IEEE802.11p/WAVE (1)
- IEEE802.15.4 (1)
- IIoT (1)
- Implementation (1)
- Industrial Blockchain (1)
- Industrie 4.0 (1)
- IoT Security (1)
- IoT security (1)
- Kabel (1)
- LPWAN (1)
- Leistung (1)
- Load Flow Analysis (1)
- Long Term Evolution (1)
- Machine learning (1)
- Machine-to- Machine-(M2M)-Communication (1)
- Manufacturing automation (1)
- Manufacturing industries (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Monitoring (1)
- Monte-Carlo method (1)
- NETCONF security (1)
- Network Test (1)
- Niedrige Energie (1)
- OT security (1)
- PROFINET IO (1)
- PROFINET Security (1)
- Performance evaluation (1)
- Physical Unclonable Functions (1)
- Physical unclonable function (1)
- Power Loss (1)
- Produktion (1)
- RUL (1)
- Radio frequency (1)
- Real-Time Communication (1)
- Sicherheit (1)
- Sicherheitstechnik (1)
- Signaltechnik (1)
- Simulation (1)
- Smart Energy Metering (1)
- Smart-UPS (1)
- SmartMAC (1)
- Strahl (1)
- Synchronisation (1)
- System (1)
- TSN security (1)
- TTCN3 (1)
- Target Vehicle (1)
- Testbed (1)
- Testumgebung (1)
- Time Sensitive Networking (1)
- Time Synchronization (1)
- TinyML (1)
- TinyOS (1)
- Total Harmonic Distortion (1)
- Traceability (1)
- Training (1)
- Trust management (1)
- Trägheit (1)
- Ultra-Low Energy (1)
- Ultraweitband (1)
- Umwelt (1)
- Unsupervised Learning (1)
- VRU eSafety (1)
- Variational Autoencoders (1)
- Vehicle safety (1)
- Wasser (1)
- Wasserstand (1)
- Wireless IoT (1)
- Wireless M-Bus (1)
- algorithm-based data analysis (1)
- bearing (1)
- bench-marking (1)
- benchmarking (1)
- car2x networks (1)
- cellular radio (1)
- cluster (1)
- computer network management (1)
- credentials (1)
- crossbar (1)
- cybersecurity (1)
- degradation stages (1)
- dickkopf 3 (1)
- e-Mobilität (1)
- embedded systems (1)
- emulation (1)
- fingerprinting (1)
- gyroscope (1)
- hybrid systems (1)
- identification (1)
- industrial Ethernet (1)
- industrial IoT (1)
- industrial communication (1)
- inertial measurement unit (1)
- kabellos (1)
- localization (1)
- machine learning (1)
- machine-to-machine communication (1)
- metal oxide transistor (1)
- model driven design (1)
- mutual authentication (1)
- performance (1)
- physical unclonable function (1)
- physically unclonable function (PUF) (1)
- predictive maintenance (1)
- primary authentication (1)
- privacy (1)
- radio networks (1)
- real time (1)
- rekeying (1)
- resource efficiency (1)
- secondary surveillance radar (1)
- secure communication (1)
- smart metering (1)
- software defined radio (1)
- sparse backpropagation (1)
- standardization (1)
- subsystem design (1)
- system authenticity (1)
- telecommunication equipment testing (1)
- temperature dependency (1)
- temperature sensor (1)
- thinned ASIC in foil (1)
- transmit beamforming (1)
- wide area networks (1)
- Ökologie (1)
Institute
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (98)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (82)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (54)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (2)
- Fakultät Medien (M) (ab 22.04.2021) (1)
Open Access
- Closed Access (79)
- Closed (29)
- Open Access (26)
- Bronze (7)
- Diamond (4)
- Gold (1)
Training deep neural networks using backpropagation is very memory and computationally intensive. This makes it difficult to run on-device learning or fine-tune neural networks on tiny, embedded devices such as low-power micro-controller units (MCUs). Sparse backpropagation algorithms try to reduce the computational load of on-device learning by training only a subset of the weights and biases. Existing approaches use a static number of weights to train. A poor choice of this so-called backpropagation ratio limits either the computational gain or can lead to severe accuracy losses. In this paper we present TinyProp, the first sparse backpropagation method that dynamically adapts the back-propagation ratio during on-device training for each training step. TinyProp induces a small calculation overhead to sort the elements of the gradient, which does not significantly impact the computational gains. TinyProp works particularly well on fine-tuning trained networks on MCUs, which is a typical use case for embedded applications. For typical datasets from three datasets MNIST, DCASE2020 and CIFAR10, we are 5 times faster compared to non-sparse training with an accuracy loss of on average 1%. On average, TinyProp is 2.9 times faster than existing, static sparse backpropagation algorithms and the accuracy loss is reduced on average by 6 % compared to a typical static setting of the back-propagation ratio.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
This paper presents the elements and the results from the European research project inCASA (Integrated Network for Completely Assisted Senior Citizen’s Autonomy), which designed and implemented a seamless integration of heterogeneous systems and network protocols for regionally distributed telecare and telehealth applications. The integration includes a multitude of physical interface, the transcoding of data models using embedded middleware, and a backend system with open interfaces. The implementation was verified in field tests in five European countries.
Efficient, secure and reliable communication is a major precondition for powerful applications in smart metering and smart grid. This especially holds true for the so called primary communication in the Local Metrological Network (LMN) between meter and data collector, as the LMN comes with the most stringent requirements with regard to cost, range, as well as bandwidth and energy efficiency. Until today, LMN field tests are operated all over the world. In these installations, however, energy autarkic systems play a marginal role. This contribution describes the results of the framework 7 (FP 7) WiMBex project (“Remote wireless water meter reading solution based on the EN 13757 standard, providing high autonomy, interoperability and range”). In this project an energy autarkic water meter was developed and tested, which follows the specification of the Wireless M-Bus protocol (EN 13757). The complete system development covers the PCB with the RF transceiver and the microcontroller, the energy converter and storage, and the software with the protocol. This contribution especially concentrates on the design, the development and the verification of the routing protocol. The routing protocol is based on the Q mode of EN13757-5 (Wireless M-Bus) and was extended by an additional energy state related parameter. This extension is orthogonal to the existing protocol and considers both the charge level and the charge characteristics (rate of occurrences, intensity). The software was implemented in NesC under the operating system TinyOS. The system was verified in an automated test bed and in field tests in UK and Ireland.
In the last decade, IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, has well evolved as a primary contender for short range wireless communication and holds the promise of an Internet of Things, which is completely based on the Internet Protocol. In the meantime, various 6LoWPAN implementations are available, be it open source or commercial. One of these implementations, which was developed by the authors' team, was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements show a very good stability and short-term and long-term performance also under dynamic conditions. In addition, it can be proven that the performance predictions from other papers are consistent with real-life implementations.
On the possibility to use leaky feeders for positioning in chirp spread spectrum technologies
(2014)
Real Time Localization Systems using electromagnetic waves have significantly evolved during the last years. They also might be used in industrial and in mining environments. Here, topologies might include tunnels, where it might be difficult to ensure the field coverage. Leaky feeder cables are a common solution in case of normal radio communication. In this paper, we study the possibilities to use leaky feeders also for Time-of-Flight based real time localization in such linear topologies, like tunnels, but possibly also for 2D-localization. Theoretical analysis is verified with real-life measurements, which were performed using Chirp Spread Spectrum Technologies.