Refine
Year of publication
- 2015 (77) (remove)
Document Type
- Conference Proceeding (77) (remove)
Conference Type
- Konferenzartikel (63)
- Konferenz-Abstract (7)
- Konferenzband (3)
- Sonstiges (3)
- Konferenz-Poster (1)
Keywords
- Applikation (5)
- Kommunikation (5)
- Ausbildung (4)
- Funktechnik (3)
- Licht (3)
- Physik (3)
- Sicherheit (3)
- Abtragung (2)
- Alexander von Humboldt (2)
- Datensicherung (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (40)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (17)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (14)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (14)
- Fakultät Wirtschaft (W) (10)
- ACI - Affective and Cognitive Institute (7)
- WLRI - Work-Life Robotics Institute (5)
- INES - Institut für nachhaltige Energiesysteme (3)
- IUAS - Institute for Unmanned Aerial Systems (1)
- POIM - Peter Osypka Institute of Medical Engineering (1)
Open Access
- Closed Access (41)
- Open Access (34)
- Bronze (7)
- Diamond (1)
This article sets the focus on methods of information technology in the Humboldt Portal, which represents an ongoing research project to develop a virtual research environment on the Internet for the legacy of Alexander von Humboldt. Based on the experiences of developing and providing the Humboldt Digital Library (www.avhumboldt.net) for more than a decade, we defined a working plan to create an Internet portal for comprehensive access to Humboldt’s writings, no matter if documents are provided as PDF files, scan images or XML-TEI documents on external archives (Google Books, Internet Archive, Deutsches Textarchiv, Bibliotheque National de France). Going far beyond services of a digital library we will provide an information network with multimedia assets, which are containing objects like terms, paragraphs, data tables, scan images, or illustrations, together with correlated properties like thematic linkage to other objects, relevant keywords with optional synonyms and dynamic hyperlinks to related translations in different languages. So the Humboldt Portal can contribute to the key question, how to present interconnected data in an appropriate form using information technologies on the Web.
Autonomous humanoid robots require light weight, high torque and high speed actuators to be able to walk and run. For conventional gears with a fixed gear ratio the product of torque and velocity is constant. On the other hand desired motions require maximum torque and speed. In this paper it is shown that with a variable gear ratio it is possible to vary the relation between torque and velocity. This is achieved by introducing systems of rods and levers to move the joints of our humanoid robot ”Sweaty II”. On the basis of a variable gear ratio low speed and high torque can be achieved for those joint angles, which require this motion mode, whereas high speed and low torque can be realized for those joint angles, where it is favorable for the desired motion.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
Covert and Side-Channels have been known for a long time due to their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit (ALU) as well as the L1 and L2 cache which enables establishing multiple covert channels. Even virtualization which is known for its isolation of multiple machines is prone to covert and side-channel attacks due to the sharing of resources. Therefore itis not surprising that cloud computing is not immune to this kind of attacks. Even more, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of unwanted communication. In such a setting the ”air gap” between physical servers and networks disappears and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand we will provide a survey on weak spots an adversary trying to exfiltrate private data from target virtual machines could exploit in a cloud environment. We will evaluate the feasibility of example attacks and point out possible mitigation solutions if they exist.
We propose secure multi-party computation techniques for the distributed computation of the average using a privacy-preserving extension of gossip algorithms. While recently there has been mainly research on the side of gossip algorithms (GA) for data aggregation itself, to the best of our knowledge, the aforementioned research line does not take into consideration the privacy of the entities involved. More concretely, it is our objective to not reveal a node's private input value to any other node in the network, while still computing the average in a fully-decentralized fashion. Not revealing in our setting means that an attacker gains only minor advantage when guessing a node's private input value. We precisely quantify an attacker's advantage when guessing - as a mean for the level of data privacy leakage of a node's contribution. Our results show that by perturbing the input values of each participating node with pseudo-random noise with appropriate statistical properties (i) only a minor and configurable leakage of private information is revealed, by at the same time (ii) providing a good average approximation at each node. Our approach can be applied to a decentralized prosumer market, in which participants act as energy consumers or producers or both, referred to as prosumers.
In online analytical processing (OLAP), filtering elements of a given dimensional attribute according to the value of a measure attribute is an essential operation, for example in top-k evaluation. Such filters can involve extremely large amounts of data to be processed, in particular when the filter condition includes “quantification” such as ANY or ALL, where large slices of an OLAP cube have to be computed and inspected. Due to the sparsity of OLAP cubes, the slices serving as input to the filter are usually sparse as well, presenting a challenge for GPU approaches which need to work with a limited amount of memory for holding intermediate results. Our CUDA solution involves a hashing scheme specifically designed for frequent and parallel updates, including several optimizations exploiting architectural features of Nvidia’s Fermi and Kepler GPUs.
Cardiac resynchronization therapy (CRT) is an established class I level A biventricular pacing therapy in chronic heart failure patients with left bundle branch block and reduced left ventricular ejection fraction, but not all patients improved clinically. Purpose of the study was to evaluate electrical interatrial conduction delay (IACD) to interventricular conduction delay (IVCD) ratio with focused transesophageal left atrial and left ventricular electrocardiography.
Methods: Thirty eight chronic heart failure patients (age 63.4±10.2 years; 3 females, 35 males) with New York Heart Association (NYHA) functional class 3.0±0.2 and 171.71±36.17ms QRS duration were analysed using posterior left atrial and left ventricular transesophageal electrocardiography with hemispherical electrodes before CRT. Electrical IACD was measured between onset of P-wave in the surface ECG and onset of left atrial signal. Electrical IVCD was measured between onset of QRS complex in the surface ECG and onset of left ventricular signal.
Results: Electrical IACD and IVCD could be evaluated by transesophageal left atrial and left ventricular electrocardiography in all heart failure patients with correlation to 1.18±0.92 IACD-IVCD-ratio (r=-0.57, P<0.001; r=0.66, P<0.001). There were 32 CRT responder with reduction of NYHA class from 3.0±0.22 to 1.97±0.31 (P<0.001) during 16.5±18.9 month CRT with 75.19±33.49ms IACD, 78.91±24.73ms IVCD, 1.04±0.66 IACD-IVCD-ratio and correlation between IACD and IACDIVCD- ratio (r=0.84, P<0.001). There were 6 CRT nonresponder with no reduction of NYHA class from 3.0±0.3 to 2.9±0.5 during 14.3±13.7 month biventricular pacing, 50.0±28.26ms IVCD (P=0.014), 1.92±1.65 IACD-IVCD-ratio (P=0,029) and correlation between 67.0±24.9ms IACD and IACD-IVCD-ratio (r=0.85, P=0.031).
Conclusions: Focused transesophageal left atrial and left ventricular electrocardiography can be utilized to analyse electrical IACD and IVCD in heart failure patients. IACDIVDC- ratio may be a useful parameter to evaluate electrical left cardiac desynchronization in heart failure patients.
Cardiac resynchronization therapy (CRT) is an established biventricular pacing therapy in heart failure patients with left bundle branch block and reduced left ventricular ejection fraction, but not all patients improved clinically as CRT responder. Purpose of the study was to evaluate electrical left atrial conduction delay (LACD) with focused transesophageal electrocardiography in CRT responder and CRT non-responder.
Methods: Twenty heart failure patients (age 66.6±8.2 years; 2 females, 18 males) with New York Heart Association functional class 3.0±0.3 and 174.2±40.2ms QRS duration were analysed using posterior left atrial transesophageal electrocardiography with hemispherical electrodes. Electrical LACD was measured between onset and offset of transesophageal left atrial signal before implantation of CRT devices.
Results: Electrical LACD could be evaluated by bipolar transesophageal left atrial electrocardiography using TO Osypka electrode in all heart failure patients with negative correlation between 54.7±18.1ms LACD and 24.9±6.4% left ventricular ejection fraction (r=-0.65, P=0.002). There were 16 CRT responders with reduction of New York Heart Association functional class from 3.0±0.29 to 2.1±0.2 (r=0.522, P=0.038) during 9.41±10.96 month biventricular pacing and negative correlation between 49.6±14.2ms LACD and 26.0±6.2% left ventricular ejection fraction (r=-0.533, P=0.034). There were 4 CRT non-responders with no reduction of New York Heart Association functional class from 3.0±0.4 to 2.8±0.5 (r=0.816, P=0.184) during with 13.88±16.39 month biventricular pacing and no correlation between 75.25±19.17ms LACD and 20.75±6.4% left ventricular ejection fraction (r=-0.831, P=0.169).
Conclusions: Focused transesophageal left atrial electrocardiography can be utilized to analyse electrical LACD in heart failure patients. LACD correlated negative with left ventricular ejection fraction in CRT responders. LACD may be a useful parameter to evaluate electrical left atrial desynchronization in heart failure patients.
Soccer simulation league is one of the founding leagues of RoboCup. In this paper we discuss the past, present and planned future achievements and changes. Also we summarize the connections and inter-league achievements of this league and provide an overview of the community contributions that made this league successful.