Refine
Year of publication
Document Type
- Master's Thesis (208) (remove)
Has Fulltext
- yes (208)
Is part of the Bibliography
- no (208)
Keywords
- IT-Sicherheit (10)
- E-Learning (7)
- Maschinelles Lernen (7)
- Deep learning (6)
- Internet der Dinge (5)
- Künstliche Intelligenz (5)
- Marketing (5)
- Social Media (5)
- Computersicherheit (4)
- Internet of Things (4)
- JavaScript (4)
- Automatisierung (3)
- Cloud Computing (3)
- Digitaler Zwilling (3)
- Digitalisierung (3)
- Effizienz (3)
- Electronic Commerce (3)
- HTML 5.0 (3)
- Schluckspecht (3)
- Simulation (3)
- Social Media Marketing (3)
- security (3)
- App <Programm> (2)
- Bildverarbeitung (2)
- Change Management (2)
- Content Management (2)
- Convolutional Neural Network (2)
- Data Science (2)
- Datenverarbeitung (2)
- Didaktik (2)
- Digital Twin (2)
- Digitale Medien (2)
- E-Commerce (2)
- Empfehlungssysteme (2)
- Energiemanagement (2)
- Energiewende (2)
- HTML (2)
- Homomorphic Encryption (2)
- Identitätsverwaltung (2)
- Instagram (2)
- Kommunikation (2)
- LES (2)
- Landwirtschaft (2)
- MPC (2)
- Machine Learning (2)
- Messsystem (2)
- Neuronales Netz (2)
- Organischer Abfall (2)
- Ottomotor (2)
- Pflanzenkohle (2)
- Risikoanalyse (2)
- Risk Analysis (2)
- Security (2)
- Sensor (2)
- Sicherheit (2)
- Unternehmen (2)
- Unternehmenskommunikation (2)
- Visualisierung (2)
- Web Site (2)
- Web-Seite (2)
- biowaste (2)
- optimization (2)
- 10Gbit/s (1)
- 3D (1)
- 3D printing (1)
- 3D-Druck (1)
- 4-Oxocrotonic acid (1)
- 40Gbit/s (1)
- 5G (1)
- 6LoWPAN (1)
- AI (1)
- AR SDK (1)
- ARTE (1)
- ARTE GEIE (1)
- Access Management (1)
- Accounting (1)
- Adversarial Attacks (1)
- Agent <Künstliche Intelligenz> (1)
- Agent Fitness (1)
- Agrophotovoltaics (1)
- Akustik (1)
- Algorithmus (1)
- Aluminiumguss (1)
- Amazon Echo (1)
- Analytical Chemistry (1)
- Analytische Chemie (1)
- Android (1)
- Angriff (1)
- Anomalieerkennung (1)
- Anomaly Detection (1)
- Anwendungsschicht-Protokolle (1)
- Apache Spark (1)
- Applikation (1)
- Archiv (1)
- Archivierung (1)
- Artificial Intelligence (1)
- Attention-basiert (1)
- Aufmerksamkeit (1)
- Augmented Reality (1)
- Augmented Reality, Telepräsenz, Telerobotik, Google Cardboard, Head Mounted Device (1)
- Ausstellung (1)
- AutoML (1)
- Autoencoder (1)
- Automation (1)
- Automatisiertes Fahren (1)
- Autonomes Fahrzeug (1)
- Autonomie (1)
- B2C (1)
- Bautagesbericht (1)
- Bellman Ford algorithm (1)
- Benutzeroberfläche (1)
- Berichterstattung (1)
- Berufliche Schulen (1)
- Betriebsoptimierung (1)
- Bevölkerungsschutz (1)
- Biochar (1)
- Biogas (1)
- Biologika (1)
- Biomasse (1)
- Biosimilars (1)
- Black Forest Formula (1)
- Blended Learning (1)
- Blickaufzeichnung (1)
- Blockchain (1)
- Bluetooth-Applikation (1)
- Bodenradar (1)
- Bot Classification (1)
- Buchführung (1)
- Business Intelligence (1)
- Business-to-Consumer (1)
- CANopen (1)
- CCS (1)
- CFD (1)
- CNN (1)
- CO2-Bilanz (1)
- COVID-19 (1)
- Carbon Footprint (1)
- Carbon nanotube membran (1)
- Cellulasen (1)
- Cement Industry (1)
- ChatGPT (1)
- Chatbot (1)
- Chiffrierung (1)
- China (1)
- Client-side (1)
- Cloud (1)
- Cloud Security (1)
- Comic (1)
- Composable Commerce (1)
- Computertomografie (1)
- Computerunterstützte Kommunikation (1)
- Content Management System (1)
- Content Marketing (1)
- Conversational Commerce (1)
- Convolutional neural networks (1)
- Corona-Pandemie (1)
- Corporate Social Responsibility (1)
- Customer Centricity (1)
- Cyber Maturity Assessment Model (1)
- CyberDeception (1)
- Cybersecurity (1)
- Cytochrome (1)
- DAM (1)
- DIN 2304-1 (1)
- DTLS (1)
- DVRIP (1)
- Data analysis (1)
- Datenanalyse (1)
- Datenbanksystem (1)
- Datenstrategie (1)
- Decarbonization (1)
- Decentralized applications (1)
- Deep Learning Verfahren (1)
- Defekt Mapping (1)
- Dekarbonisierung (1)
- Development (1)
- Digital Asset Management (1)
- Digital Leadership (1)
- Digital Twins (1)
- Digitale Produkte (1)
- Digitale Teamführung (1)
- Direct Aeroacoustic Simulation (1)
- Distributed Sensor Network (1)
- Distributed computing (1)
- Drupal (1)
- Duale Ausbildung (1)
- Durchflussmessung von Gasen (1)
- E-Book (1)
- E-Commerce System (1)
- E-Magazin (1)
- E-Publishing (1)
- EAP-Protokoll (1)
- ETL Data Pipeline (1)
- EU 933/2019 (1)
- Edge Computing (1)
- Eingebettete Systeme (1)
- Eingruppierung (1)
- Einzelhandel (1)
- Eisen- und Stahlindustrie (1)
- Electric Tractors (1)
- Electrochemical membrane (1)
- Electrochemical membrane reactor (1)
- Elektrizitätsnetz (1)
- Elektrofahrzeug (1)
- Elektromagnetische Reflexionsmethode (1)
- Elektromotor (1)
- Elektronische Musik (1)
- Eltern (1)
- Embedded Rust (1)
- Empfehlung (1)
- Empfehlungssystem (1)
- Energie (1)
- Energiespeicherung (1)
- Energieversorgung (1)
- Energy (1)
- Energy System Analysis (1)
- Energy System Model (1)
- Energy System Modelling (1)
- Energy Transition (1)
- Energy management (1)
- Engineering (1)
- Enterprise 2.0 (1)
- Entwicklung (1)
- Entwicklungsprozess (1)
- Enzym (1)
- Enzyme assay (1)
- Erfolgsfaktoren (1)
- Erlösmodell (1)
- Ermüdungsfestigkeit (1)
- Ermüdungsriss (1)
- Erweiterte Realität <Informatik> (1)
- Erweiterte Realität <Informatik> , Telepräsenz , Robotik (1)
- Ethanolkraftstoff (1)
- Ethernet (1)
- Ethernet-Stack (1)
- Express.js (1)
- Extensible Authentication Protocol (1)
- Eyetracking (1)
- FEM (1)
- Facebook Check-In Deals (1)
- Fahrassistenzsysteme (1)
- Fahrerablenkung (1)
- Fahrzeugtechnik (1)
- Fehlerrechnung (1)
- Fermentation (1)
- Fertigungsoptimierung (1)
- Filmproduktion (1)
- Finite Elemente (1)
- Finite-Elemente-Methode (1)
- Flash CS3 (1)
- Flash CS4 (1)
- Flash CS5 (1)
- FlowNet (1)
- Foreign Direct Investment (1)
- Fotografie (1)
- Fotovoltaik (1)
- Framework (1)
- Friedländer-Bakterium (1)
- Future Energy System (1)
- GPR (1)
- Gallenschütz (1)
- Gaming (1)
- Gasdynamik (1)
- Gasmotor (1)
- Gebäudeleittechnik (1)
- Gebäudetechnik (1)
- Generationen (1)
- Generics (1)
- German Electrical Grid (1)
- Geschäftsmodell (1)
- Gesundheitskommunikation (1)
- Glasfaser (1)
- Glaubwürdigkeit (1)
- Global Payroll (1)
- Go (1)
- Godot (1)
- Grain boundary (1)
- Grain growth (1)
- Green House effect (1)
- Green Production (1)
- Ground penetrating radar (1)
- HPTLC (1)
- HTTP Live Streaming (1)
- Handel (1)
- High Performance Computing (HPC) (1)
- High content measurement (1)
- Hochleistungsrechnen , Informatik (1)
- Hochschule (1)
- Hohlprobe (1)
- Homomorphe Kryptosysteme (1)
- Homomorphe Verschlüsselung (1)
- Homomorphic Encryption Schemes (1)
- Hot-Spot (1)
- Human Firewewall (1)
- Humorvolle Kommunikation (1)
- Hybrid approach (1)
- Hydroakustik (1)
- Hydrodynamik (1)
- Hydrokultur (1)
- Hydroponic Farming (1)
- Hydroxylierung (1)
- Höhenvermessung (1)
- IPv6 (1)
- ISMS (1)
- Identity Management (1)
- Incentivization (1)
- Induktive Wärmebehandlung (1)
- Industrial Sector (1)
- Industrie 4.0 (1)
- Inertial measurement unit (1)
- Influencer (1)
- Influencer Marketing (1)
- Information Security (1)
- Informationsbeschaffung (1)
- Informationssicherheit (1)
- Infotainment (1)
- Inhaltsanalyse (1)
- Instagram Marketing (1)
- Integration (1)
- Integriertes Lernen (1)
- Interaktive Medien (1)
- Interessentengewinnung (1)
- International Business Consulting (1)
- Intranet (1)
- Intrexx (1)
- IoT (1)
- Java (1)
- JavaScript 1.5 (1)
- Javascript (1)
- Jugendliche (1)
- Kaba (1)
- Kapazitätserweiterung (1)
- Kapazitätsmanagement (1)
- Kerben (1)
- Klassifikation (1)
- Klebsiella pneumoniae (1)
- Klebverbindungen (1)
- Kollaboration (1)
- Komfortaktuatoren (1)
- Kommunikationskonzept (1)
- Kommunikationsstrategie (1)
- Kompaktantrieb (1)
- Konfigurationen (1)
- Konzeption (1)
- Kooperativer Unterricht (1)
- Kornwachstum (1)
- Kosten (1)
- Kostenrechnung (1)
- Kostensenkung (1)
- Kraftfahrzeugtechnik (1)
- Krisenmanagement (1)
- Kryptologie (1)
- LINUX (1)
- LPD <Funktechnik> (1)
- LSTM (1)
- Label (1)
- Laborkonzept (1)
- Lamellenpaket (1)
- Lattice Boltzmann Method (1)
- Leadgenerierung (1)
- Lean Accounting (1)
- Lean Accounting Transformation (1)
- Lean Management (1)
- Learning Experience Plattform (1)
- Lebensgeschichte (1)
- Lehrkonzept (1)
- Leichtbau (1)
- Leistungsbedarf (1)
- Leistungselektronik (1)
- Lernfeldkonzept (1)
- Lernkonzept (1)
- Lernprogramm (1)
- Lernvideo (1)
- Lernvideos (1)
- Lichtschranke (1)
- Lichtsetzung (1)
- Livestreaming (1)
- LoRaWAN (1)
- Location Based Services (1)
- Lohnbuchführung (1)
- Low Carbon network (1)
- Low-Power (1)
- Luftschadstoffprognose (1)
- Luftverunreinigender Stoff (1)
- Machine Firewall (1)
- Machine learning (1)
- MarTech (1)
- Markenimage (1)
- Markenkommunikation (1)
- Marketing Automation (1)
- Marokko (1)
- Mass spectrometry (1)
- Massenspektrometrie (1)
- Materialermüdung (1)
- Maturity Model (1)
- Maßstab (1)
- Mediengestalterin / Mediengestalter (1)
- Medieninformatik (1)
- Mediennutzung (1)
- Medienwissenschaft (1)
- Mensch-Computer-Interaktion (1)
- Messsystemanalyse (1)
- Methan (1)
- Mikrofon (1)
- Mikroklima (1)
- Mikroklimamessung (1)
- MinION-sequencing (1)
- Mitarbeitendenbeteiligung (1)
- Mitarbeiterschulung (1)
- Mobile Marketing (1)
- Mobiles Endgerät (1)
- Mobilfunk (1)
- Modellprädiktive Regelung (1)
- Moodle 2.0 (1)
- Morocco (1)
- Motorenprüfstand (1)
- Multi-Channel-Handel (1)
- Multi-task learning (1)
- Multichannel-Publishing (1)
- Multicrystalline silicon (mc-Si) (1)
- Multidrug-Resistenz (1)
- Multimedia (1)
- Musikproduktion (1)
- Musikvideo (1)
- Musikwirtschaft (1)
- NADPH (1)
- Nachhaltigkeit (1)
- Navigation (1)
- Negative Emission Technology (1)
- Netzdienlichkeit (1)
- Netzintegration (1)
- Netzwerk (1)
- Neuro-Evolution (1)
- New Media (1)
- New Retail (1)
- Nichtwohngebäude (1)
- NoSQL-Datenbanksystem (1)
- Node.js (1)
- Node.js security (1)
- Non-Reflecting Boundary Conditions (1)
- Nudge (1)
- Nudging (1)
- Numerik (1)
- Nusselt-Zahl (1)
- OSINT (1)
- Omni-Channel-Handel (1)
- Online Marketing (1)
- Online Medien (1)
- Online Speicher (1)
- Online Storage (1)
- Online-Handel (1)
- Online-Journalismus (1)
- Online-Marketing (1)
- Open Source (1)
- Open Source Intelligence (1)
- Operante Konditionierung (1)
- Optical Fiber Network (1)
- Optical Network (1)
- Optimierung (1)
- Optischer Fluss (1)
- Optischer Sensor (1)
- Organisationsentwicklung (1)
- Outsourcing (1)
- Oxford Nanopore Technology (1)
- Oxyfuel (1)
- P450 Cytochrome (1)
- PQC (1)
- PROFINET (1)
- PV-Module (1)
- PandaPower (1)
- Peer-to-peer trading (1)
- Penetration Testing (1)
- Penetrationstest (1)
- Personal Assistent (1)
- Phagetherapy (1)
- Phising detection (1)
- PhoneGap (1)
- Platform as a Service (1)
- Platformer (1)
- Porosität (1)
- Positionsschätzung (1)
- Post-Quanten Kryptographie (1)
- Power Consumption (1)
- Power Quality (1)
- Preissteigerung (1)
- Privacy and Security (1)
- Product-Placement (1)
- Produktentstehungsprozess (1)
- Produktentwicklung (1)
- Produktkonfigurationssystem (1)
- Prognose (1)
- Programmablauf (1)
- Programmiersprache (1)
- Programmierung (1)
- Proteine (1)
- Prothetik (1)
- Public-Key-Verschlüsselung (1)
- Purpose (1)
- Python Programming (1)
- QCM-D Array (1)
- Quantencomputer (1)
- RANS (1)
- RFID-/NFC-Ausleseschnittstelle (1)
- RTMP (1)
- Ransomware (1)
- Rechnungswesen (1)
- Recommendations (1)
- Redakteur (1)
- Regression (1)
- Reibkontakte (1)
- Reinforcement (1)
- Reinforcement Learning (1)
- Rektifizierung (1)
- Responsive Web Design (1)
- Responsive Web Design Workflow (1)
- Rest-API (1)
- Risikomanagement (1)
- Risk Management (1)
- Roboterfinger (1)
- Rotorwelle (1)
- Rust (1)
- Rückverfolgbarkeit (1)
- Rührreibschweißen (1)
- SEO (1)
- SOC (1)
- SPC waiver (1)
- Schallfeld (1)
- Schalllokalisation (1)
- Schlagfertige Kommunikation (1)
- Schluckspecht V (1)
- Schreiben (1)
- Schulung (1)
- Schulungskonzept (1)
- Schweißverfahren (1)
- Scientific workflow (1)
- Scrum (1)
- Security Operation Center (1)
- Security Operation Centers (1)
- Security Operations Center (1)
- Sensomotorisch (1)
- Sequenzanalyse (1)
- SharePoint 2010 (1)
- Shell Eco-marathon (1)
- Shopper Marketing (1)
- Smart City (1)
- Smart Home (1)
- Smart Load Management (1)
- Smartphone (1)
- Social Web (1)
- Social Workplace 2020 (1)
- Social-Media-Marketing (1)
- Software (1)
- Software Integration (1)
- Softwareeinführung (1)
- Sound (1)
- Soziale Software (1)
- Staatlich-geprüfter Grafikdesignerin / Staatlich-geprüfter Grafikdesigner (1)
- Stadtklima (1)
- Stadtklimasimulation (1)
- Stand Alone (1)
- Start-up Companies (1)
- Static Code Analysis (1)
- Stationärer Handel (1)
- Statistische Versuchsplanung (1)
- Steroid hormone micropollutant (1)
- Steroidhormon (1)
- Steuerungsalgorithmen (1)
- Strategie (1)
- Strategisches Management (1)
- Streaming (1)
- Streit (1)
- Stress (1)
- Strom (1)
- Strömung (1)
- Substrate and product specificity (1)
- Suchmaschinenoptimierung (1)
- Supervised Learning (1)
- Supply Chain Risk Management (1)
- Supraschmierung (1)
- Surveillance (1)
- Sustainability (1)
- Synthetischer Datensatz (1)
- TCO (1)
- TLV (1)
- TQM (1)
- Teambildung (1)
- Teamentwicklung (1)
- Technische Akustik (1)
- Temperature control (1)
- Temperaturregelung (1)
- Terminal (1)
- Test-driven development (1)
- Testablauf (1)
- Text (1)
- Thermoaktive Bauteilsysteme (1)
- Thread (1)
- Threat Modeling (1)
- TikTok (1)
- Timing Attacks (1)
- Tiny House (1)
- Topologieoptimierung (1)
- Tor (1)
- Total Cost of Ownership (1)
- Total Quality Management (1)
- Transfer learning (1)
- Transformer (1)
- Tribologie (1)
- Trichoderma reesei (1)
- Twitch.tv (1)
- Ultrafiltration (1)
- Unity3d (1)
- Unsupervised Learning (1)
- Unternehmensgründung (1)
- Unüberwachtes Lernen (1)
- Usability (1)
- User Experience (1)
- VHDL (1)
- Verbrennungsmotor (1)
- Verfahren (1)
- Verfahrenstechnik (1)
- Verfikation (1)
- Vergüten (1)
- Verhaltensökonomie (1)
- Verlag (1)
- Verschlüsselung (1)
- Versuchsplanung (1)
- Verteilter Speicher (1)
- Videogames (1)
- Videoproduktion (1)
- Videospiel (1)
- Videostreaming (1)
- Vierquadrantensteller (1)
- Virtual Reality (1)
- Virtuelle Teamentwicklung (1)
- Virtuelle Teams (1)
- Visuelle Notizen (1)
- Vitalparametern bei Kleinstlebewesen (1)
- Volkshochschule (1)
- Volkswirtschaft (1)
- Vollzeitschulische Ausbildung (1)
- Vorkammerzündsystem (1)
- Vuforia (1)
- Vulnerabilities (1)
- Vulnerability Management (1)
- Vulnerability Tracking (1)
- Vulnerability identification (1)
- WEITER.mit.BILDUNG@BW (1)
- Wahrnehmung (1)
- Wars (1)
- Wasseraufbereitung (1)
- Wassermangel (1)
- Wasserstoff (1)
- Water treatment (1)
- Web development (1)
- Web-Applications (1)
- Webassembly (1)
- Webdesign (1)
- Webentwicklung (1)
- Website (1)
- Werbefilmproduktion (1)
- Werbung (1)
- Wireless (1)
- Wireless Technology (1)
- Wirtschaftlichkeit (1)
- Wirtschaftskrise (1)
- Wissensmanagement (1)
- Workbook (1)
- Workflow (1)
- World Wide Web (1)
- Wärmepumpe (1)
- YouTube (1)
- Zement (1)
- Zentrale Sauerstoffversorgung (1)
- Zugriffskontrolle (1)
- Zugriffsverwaltung (1)
- Zwei-Faktor-Authentifizierung (1)
- Zykloidgetriebe (1)
- access management (1)
- analysis (1)
- android-security (1)
- artificial neural networks (1)
- audio (1)
- binary (1)
- biochar (1)
- biogas (1)
- cellulase (1)
- censhare (1)
- certificate management (1)
- classification (1)
- climate-neutral (1)
- cloud business impacts (1)
- community (1)
- confidentiality (1)
- cross-platform (1)
- cyber attack (1)
- dahua (1)
- determinats of FDI (1)
- e-learning (1)
- economic (1)
- electronic music (1)
- enzymatic pretreatment (1)
- fermentation (1)
- film (1)
- filmproduktion (1)
- financial impacts (1)
- fingerprinting (1)
- flash (1)
- html5 (1)
- iPad (1)
- identity management (1)
- industrial communication (1)
- interactivity (1)
- interne Kommunikation (1)
- lignocellulosic material (1)
- machine learning (1)
- microphone (1)
- mitigations (1)
- moving to cloud (1)
- multimedia (1)
- music production (1)
- network layer (1)
- nicht-invasives Messsystem (1)
- ns-3 (1)
- permissions (1)
- pharmaceuticals (1)
- privacy (1)
- protocol (1)
- routing (1)
- routing locator (1)
- single-sign-on (1)
- sound (1)
- steel industry (1)
- thickness estimation (1)
- virtual reality (1)
- vr (1)
- water treatment (1)
- web application security (1)
- Überlebensstrategien (1)
- Übersetzungsstrategie (1)
- Überwachtes Lernen (1)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (57)
- Fakultät Medien (M) (ab 22.04.2021) (55)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (40)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (34)
- Fakultät Wirtschaft (W) (15)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (13)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (5)
- INES - Institut für nachhaltige Energiesysteme (4)
- IDEeP - Institute for Digital Engineering and Production (ab 12.10.2022) (1)
- IUAS - Institute for Unmanned Aerial Systems (1)
Open Access
- Closed Access (101)
- Closed (75)
- Open Access (32)
- Diamond (6)
Globale Ereignisse politischen, wirtschaftlichen oder kulturellen Ursprungs führen dazu, dass Unternehmen sich gezwungen sehen zu handeln, um wettbewerbsfähig zu bleiben. In vielen Fällen wird dabei so vorgegangen, dass versteckte Preiserhöhungen vollzogen werden. Auch Unternehmen, die mit ihrem Angebot einen gesellschaftlichen Zusatznutzen erbringen, erhöhen die Preise, da nur so der verfolgte ökologische oder soziale Purpose erhalten werden kann, kommunizieren dies jedoch offen und erhöhen dadurch ihre Kundenloyalität. Dieses Vorgehen ist bislang jedoch überwiegend in den USA zu beobachten. Da das Thema Purpose auch in Deutschland immer höhere Relevanz erfährt, stellt sich die Frage der Übertragbarkeit. Die Forschungsfrage lautet deshalb: Inwiefern beeinflusst die Kommunikation von purpose-getriebenen Preissteigerungen das Markenimage von B2C-Unternehmen in Deutschland? Um der Forschungsfrage nachzugehen, wurde ein empirischer Forschungsansatz gewählt, der in Form einer quantitativen Studie umgesetzt wurde, die die Meinung der Studierendenschaft der Gen Z und Y der Hochschule Offenburg abbildet. Die Ergebnisse der Umfrage zeigten, dass die Glaubwürdigkeit und Akzeptanz von purpose-getriebenen Preiserhöhungen vom gegenwärtigen Markenimage bzw. dem übergeordneten Image einer Branche abhängen. Purpose wird eine hohe Bedeutung zugesprochen, die sich jedoch aufgrund der Preissensibilität der Zielgruppe nicht immer in der Markenwahl widerspiegelt. Dies verdeutlicht, dass Purpose das Potenzial besitzt, das Markenimage nachhaltig zu beeinflussen und zu prägen und die Zielgruppe der Gen Z und Y zukünftig an sich zu binden. Ferner wurde deutlich, dass bei der Umsetzung von Purpose bestimmte Kriterien verfolgt werden sollten, die bei der Kommunikation zu berücksichtigen sind, um eine authentische Wirkung zu erzielen.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
The progress in machine learning has led to advanced deep neural networks. These networks are widely used in computer vision tasks and safety-critical applications. The automotive industry, in particular, has experienced a significant transformation with the integration of deep learning techniques and neural networks. This integration contributes to the realization of autonomous driving systems. Object detection is a crucial element in autonomous driving. It contributes to vehicular safety and operational efficiency. This technology allows vehicles to perceive and identify their surroundings. It detects objects like pedestrians, vehicles, road signs, and obstacles. Object detection has evolved from being a conceptual necessity to an integral part of advanced driver assistance systems (ADAS) and the foundation of autonomous driving technologies. These advancements enable vehicles to make real-time decisions based on their understanding of the environment, improving safety and driving experiences. However, the increasing reliance on deep neural networks for object detection and autonomous driving has brought attention to potential vulnerabilities within these systems. Recent research has highlighted the susceptibility of these systems to adversarial attacks. Adversarial attacks are well-designed inputs that exploit weaknesses in the deep learning models underlying object detection. Successful attacks can cause misclassifications and critical errors, posing a significant threat to the functionality and safety of autonomous vehicles. With the rapid development of object detection systems, the vulnerability to adversarial attacks has become a major concern. These attacks manipulate inputs to deceive the target system, significantly compromising the reliability and safety of autonomous vehicles. In this study, we focus on analyzing adversarial attacks on state-of-the-art object detection models. We create adversarial examples to test the models’ robustness. We also check if the attacks work on a different object detection model meant for similar tasks. Additionally, we extensively evaluate recent defense mechanisms to see how effective they are in protecting deep neural networks (DNNs) from adversarial attacks and provide a comprehensive overview of the most commonly used defense strategies against adversarial attacks, highlighting how they can be implemented practically in real-world situations.
Privacy is the capacity to keep some things private despite their social repercussions. It relates to a person’s capacity to control the amount, time, and circumstances under which they disclose sensitive personal information, such as a person’s physiology, psychology, or intelligence. In the age of data exploitation, privacy has become even more crucial. Our privacy is now more threatened than it was 20 years ago, outside of science and technology, due to the way data and technology highly used. Both the kinds and amounts of information about us and the methods for tracking and identifying us have grown a lot in recent years. It is a known security concern that human and machine systems face privacy threats. There are various disagreements over privacy and security; every person and group has a unique perspective on how the two are related. Even though 79% of the study’s results showed that legal or compliance issues were more important, 53% of the survey team thought that privacy and security were two separate things. Data security and privacy are interconnected, despite their distinctions. Data security and data privacy are linked with each other; both are necessary for the other to exist. Data may be physically kept anywhere, on our computers or in the cloud, but only humans have authority over it. Machine learning has been used to solve the problem for our easy solution. We are linked to our data. Protect against attackers by protecting data, which also protects privacy. Attackers commonly utilize both mechanical systems and social engineering techniques to enter a target network. The vulnerability of this form of attack rests not only in the technology but also in the human users, making it extremely difficult to fight against. The best option to secure privacy is to combine humans and machines in the form of a Human Firewall and a Machine Firewall. A cryptographic route like Tor is a superior choice for discouraging attackers from trying to access our system and protecting the privacy of our data There is a case study of privacy and security issues in this thesis. The problems and different kinds of attacks on people and machines will then be briefly talked about. We will explain how Human Firewalls and machine learning on the Tor network protect our privacy from attacks such as social engineering and attacks on mechanical systems. As a real-world test, we will use genomic data to try out a privacy attack called the Membership Inference Attack (MIA). We’ll show Machine Firewall as a way to protect ourselves, and then we’ll use Differential Privacy (DP), which has already been done. We applied the method of Lasso and convolutional neural networks (CNN), which are both popular machine learning models, as the target models. Our findings demonstrate a logarithmic link between the desired model accuracy and the privacy budget.
This study investigates the impact of global payroll outsourcing on organizational efficiency and cost reduction based on the analysis of diverse implications stemming from thirty one (31) survey results. The findings reveal multifaceted challenges and benefitsassociated with outsourcing global payroll processing.
The research also unveils the most benefits of global payroll outsourcing. Notably, there's a consensus on the reduction in time-to-process payroll, cost per payroll processed, and improved payroll accuracy rate. Outsourcing streamlines processes, enhances operational efficiency, and contributes to faster, more accurate financial reporting.
Despite these benefits and challenges, statistical analysis reveals weak correlations between outsourcing global payroll and cost reduction or improved efficiency in various parameters, indicating a lack of a significant relationship. Consequently, the results, suggest no substantial correlation between global payroll outsourcing and enhanced efficiency or cost reduction based on this study's data.
Decarbonisation Strategies in Energy Systems Modelling: APV and e-tractors as Flexibility Assets
(2023)
This work presents an analysis of the impact of introducing Agrophotovoltaic technologies and electric tractors into Germany’s energy system. Agrophotovoltaics involves installing photovoltaic systems in agricultural areas, allowing for dual usage of the land for both energy generation and food production. Electric tractors, which are agricultural machinery powered by electric motors, can also function as energy storage units, providing flexibility to the grid. The analysis includes a sensitivity study to understand how the availability of agricultural land influences Agrophotovoltaic investments, followed by the examination of various scenarios that involve converting diesel tractors to electric tractors. These scenarios are based on the current CO2 emission reduction targets set by the German Government, aiming for a 65% reduction below 1990 levels by 2030 and achieving zero emissions by 2045. The results indicate that approximately 3% of available agricultural land is necessary to establish a viable energy mix in Germany. Furthermore, the expansion of electric tractors tends to reduce the overall system costs and enhances the energy-cost-efficiency of Agrophotovoltaic investments.
In the past ten years, applications of artificial neural networks have changed dramatically. outperforming earlier predictions in domains like robotics, computer vision, natural language processing, healthcare, and finance. Future research and advancements in CNN architectures, Algorithms and applications are expected to revolutionize various industries and daily life further. Our task is to find current products that resemble the given product image and description. Deep learning-based automatic product identification is a multi-step process that starts with data collection and continues with model training, deployment, and continuous improvement. The caliber and variety of the dataset, the design selected, and ongoing testing and improvement all affect the model's effectiveness. We achieved 81.47% training accuracy and 72.43% validation accuracy for our combined text and image classification model. Additionally, we have discussed the outcomes from the other dataset and numerous methods for creating an appropriate model.
As the population grows, so does the amount of biowaste. As demand for energy grows, biogas is a promising solution to the problem. Lignocellulosic materials are challenged of slow degradability due to the presence of polymers such as cellulose, lignin and hemicellulose. There are several pretreatment methods available to enhance the degradability of such materials, including enzymatic pretreatment. In this pretreatment, there are few parameters that can influence the results, the most important being the enzyme to solid ratio and the solid to liquid ratio. During this project, experiments were conducted to determine the optimal conditions for those two factors. It was discovered that a solid to liquid ratio of 31 g of buffer per 1 gram of organic dry matter produced the highest reducing sugar release in flasks when combined with 34 mg of protein per 1 gram of organic dry mass. Additionally, another experiment was carried out to investigate the impact of enzymatic pretreatment on biogas production using artificial biowaste as a substrate. Artificial biowaste produced 577,9 NL/kg oDM, while enzymatically pretreated biowaste produced 639,3 NL/kg oDM. This resulted in a 10,6% rise in cumulative biogas production compared to its use without enzymatic pretreatment. By the conclusion of the investigation, specific cumulative dry methane yields of 364,7 NL/kg oDM and 426,3 NL/kg oDM were obtained from artificial biowaste without and with enzymatic pretreatment, respectively. This resulted in a methane production boost of 16,9%. Additionally in case of the reactors with enzymatically pretreated substrate kinetic constant was lower more than double, where maximum volume of biogas increased, comparing to the reactors without enzymatic pretreatment.
In dieser Arbeit werden Untersuchungen an einem neuartigen Sensorkonzept zur Erfassung von Winkelbeschleunigungen durchgeführt. Ziel dieser Arbeit war es, die Möglichkeit, eine Miniaturisierung des Prototyps zu untersuchen. Hierfür wurde eine analytische und experimentelle Untersuchung durchgeführt. Für die analytische Betrachtung erfolgte eine Fehlerfortpflanzung nach Gauß, welche die Fertigungstoleranzen, Dimensionsfehler des Accelerometers, Rauschen und Messabweichungen von Accelerometer und Gyroskop berücksichtigt. Die Ergebnisse zeigen, dass bei Verwendung der hochwertigen Inertial Measurment Units (IMUs) eine theoretische Verkleinerung bis auf 21mm eine höhere Genauigkeit bietet als die numerischen Differentiationen der Winkelgeschwindigkeit.
Für die Verifizierung unter realen Bedingungen wurden verschiedene Prüfkonzepte verglichen.
Dabei erwies sich ein Pendelprüfstand als vielversprechender Ansatz. Durch die Verwendung von Kugellagern kann ein breites Spektrum an Winkelbeschleunigungen abgebildet werden. Die kontinuierliche Erfassung reflektierender Marker auf der Pendelstange ermöglicht die Ermittlung der Winkel, die als Grundlage für ein Modell dienen, wodurch sich reale Winkelbeschleunigungen mit den Messdaten des Sensors vergleichen lassen. Dabei stellt die Modellierung der Verlustterme eine zukünftige Herausforderung dar.
Die Ergebnisse zeigen, dass eine Miniaturisierung des Sensorprototyps möglich ist und das der Pendelprüfstand eine Methode zur Verifizierung darstellt. Dies trägt dazu bei, die Anwendungsmöglichkeiten des Sensorkonzepts in der Praxis zu erweitern.