Refine
Year of publication
- 2024 (15) (remove)
Document Type
- Article (reviewed) (7)
- Part of a Book (2)
- Doctoral Thesis (2)
- Book (1)
- Patent (1)
- Article (unreviewed) (1)
- Working Paper (1)
Has Fulltext
- no (15) (remove)
Is part of the Bibliography
- yes (15)
Keywords
- Export (2)
- Social Media (2)
- Trade (2)
- Additive Tooling (1)
- Artificial Intelligence (1)
- Bone Cement (1)
- Content-Marketing (1)
- Crossmediale Werbung (1)
- Design (1)
- Digitalisierung (1)
Institute
- Fakultät Medien (M) (ab 22.04.2021) (5)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (4)
- Fakultät Wirtschaft (W) (3)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (2)
- IfTI - Institute for Trade and Innovation (2)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (2)
- ACI - Affective and Cognitive Institute (1)
- IBMS - Institute for Advanced Biomechanics and Motion Studies (ab 16.11.2022) (1)
Open Access
- Closed (9)
- Open Access (6)
- Bronze (3)
- Diamond (2)
- Gold (1)
With the expansion of IoT devices in many aspects of our life, the security of such systems has become an important challenge. Unlike conventional computer systems, any IoT security solution should consider the constraints of these systems such as computational capability, memory, connectivity, and power consumption limitations. Physical Unclonable Functions (PUFs) with their special characteristics were introduced to satisfy the security needs while respecting the mentioned constraints. They exploit the uncontrollable and reproducible variations of the underlying component for security applications such as identification, authentication, and communication security. Since IoT devices are typically low cost, it is important to reuse existing elements in their hardware (for instance sensors, ADCs, etc.) instead of adding extra costs for the PUF hardware. Micro-electromechanical system (MEMS) devices are widely used in IoT systems as sensors and actuators. In this thesis, a comprehensive study of the potential application of MEMS devices as PUF primitives is provided. MEMS PUF leverages the uncontrollable variations in the parameters of MEMS elements to derive secure keys for cryptographic applications. Experimental and simulation results show that our proposed MEMS PUFs are capable of generating enough entropy for a complex key generation, while their responses show low fluctuations in different environmental conditions.
Keeping in mind that the PUF responses are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In the second part of this thesis, we elaborate on different key generation schemes and their advantages and drawbacks. We propose the PUF output positioning (POP) and integer linear programming (ILP) methods, which are novel methods for grouping the PUF outputs in order to maximize the extracted entropy. To implement these methods, the key enrollment and key generation algorithms are presented. The proposed methods are then evaluated by applying on the responses of the MEMS PUF, where it can be practically shown that the proposed method outperforms other existing PUF key generation methods.
The final part of this thesis is dedicated to the application of the MEMS PUF as a security solution for IoT systems. We select the mutual authentication of IoT devices and their backend system, and propose two lightweight authentication protocols based on MEMS PUFs. The presented protocols undergo a comprehensive security analysis to show their eligibility to be used in IoT systems. As the result, the output of this thesis is a lightweight security solution based on MEMS PUFs, which introduces a very low overhead on the cost of the hardware.
Physical unclonable functions (PUFs) are increasingly generating attention in the field of hardware-based security for the Internet of Things (IoT). A PUF, as its name implies, is a physical element with a special and unique inherent characteristic and can act as the security anchor for authentication and cryptographic applications. Keeping in mind that the PUF outputs are prone to change in the presence of noise and environmental variations, it is critical to derive reliable keys from the PUF and to use the maximum entropy at the same time. In this work, the PUF output positioning (POP) method is proposed, which is a novel method for grouping the PUF outputs in order to maximize the extracted entropy. To achieve this, an offset data is introduced as helper data, which is used to relax the constraints considered for the grouping of PUF outputs, and deriving more entropy, while reducing the secret key error bits. To implement the method, the key enrollment and key generation algorithms are presented. Based on a theoretical analysis of the achieved entropy, it is proven that POP can maximize the achieved entropy, while respecting the constraints induced to guarantee the reliability of the secret key. Moreover, a detailed security analysis is presented, which shows the resilience of the method against cyber-security attacks. The findings of this work are evaluated by applying the method on a hybrid printed PUF, where it can be practically shown that the proposed method outperforms other existing group-based PUF key generation methods.
Background
To assess the in-field walking mechanics during downhill hiking of patients with total knee arthroplasty five to 14 months after surgery and an age-matched healthy control group and relate them to the knee flexor and extensor muscle strength.
Methods
Participants walked on a predetermined hiking trail at a self-selected, comfortable pace wearing an inertial sensor system for recording the whole-body 3D kinematics. Sagittal plane hip, knee, and ankle joint angles were evaluated over the gait cycle at level walking and two different negative slopes. The concentric and eccentric lower extremity muscle strength of the knee flexors and extensors isokinetically at 50 and 120°/s were measured.
Findings
Less knee flexion angles during stance have been measured in patients in the operated limb compared to healthy controls in all conditions (level walking, moderate downhill, steep downhill). The differences increased with steepness. Muscle strength was lower in patients for both muscle groups and all measured conditions. The functional hamstrings to quadriceps ratio at 120°/sec correlated with knee angle during level and downhill walking at the moderate slope in patients, showing higher ratios with lower peak knee flexion angles.
Interpretation
The study shows that even if rehabilitation has been completed successfully and complication-free, five to 14 months after surgery, the muscular condition was still insufficient to display a normal gait pattern during downhill hiking. The muscle balance between quadriceps and hamstring muscles seems related to the persistence of a stiff knee gait pattern after knee arthroplasty. LoE: III.
Social Media hat für Unternehmen der Medienbranche mehrere Dimensionen. Es sind Wettbewerbsmedien im Kampf um Marktanteile im Nutzer- und Werbemarkt, aber auch neue Kommunikationskanäle und Umfelder für die Entwicklung und Vermarktung neuer eigener Social-Media-Produkte. Entsprechend ist die Integration der Möglichkeiten sozialer Medien in die strategische Planung von Medienunternehmen seit der Jahrtausendwende mehr und mehr zum Erfolgsfaktor geworden; ein Thema, das in die digitale Transformationsstrategie eingebettet werden muss.
Marketing in Kommunalverwaltungen muss sich an einige besondere Rahmenbedingungen anpassen – sei es rechtlicher, organisatorischer oder gesellschaftspolitischer Art. Dies bedeutet auch, dass das Marketinginstrument „Social Media“ bewusst und taktisch klug angewandt werden sollte. Die Relevanz dieses Instruments für die Kommunalverwaltungen ist groß. So hilft es nicht nur, Social Media strategisch einzubetten, sondern auch die Ziele klar zu setzen, sich der Zielgruppen und Rollen im Kontext Social Media bewusst zu sein und diese zielführend einzusetzen.
Verfahren zum Betrieb eines batterieelektrischen Fahrzeugs mit einer elektrischen Maschine zum Antrieb des Fahrzeugs und einem Inverter (1) zum Ansteuern der elektrischen Maschine, wobei der Inverter (1) eine dreiphasige Brückenschaltung mit einer Anzahl von als Halbleiter ausgebildeten Schaltern (3) umfasst, wobei im Inverter (1) entstehende Verluste zum Heizen eines Innenraums des Fahrzeugs und/oder zum Temperieren einer Batterie und/oder zum Temperieren von Getriebeöl verwendet werden, wobei der Inverter (1) mittels Raumzeigermodulation gesteuert wird, wobei ein nicht-optimales Schaltverhalten des Inverters (1) herbeigeführt wird, indem nicht optimale Spannungs-Raumzeiger (e, eu, ev, ew, e1, e2, -e1, -e2) eingestellt werden, wobei eine Skalierung der Spannungs-Raumzeiger (e, e1, e2) über die Schaltung von Nullspannungsvektoren, die je nach zeitlichem Anteil die Spannung reduzieren, oder durch Zuhilfenahme eines jeweils gegenüberliegenden Spannungs-Raumzeigers (-e1, -e2) erfolgt, so dass eine Schaltfolge mit einer maximalen Anzahl von Schaltzyklen realisiert wird, dadurch gekennzeichnet, dass in der Mitte einer Schaltperiode (Tp) keine Symmetrie erzeugt wird.
In a dynamic global landscape, the role of UK Export Finance (UKEF) and other export credit agencies (ECAs) has never been more important. Access to finance is critical for exporters as it enables them to invest in production, expand operations, manage cash flow and mitigate trade risks. However, businesses face challenges in securing export finance and trade credit insurance as geopolitical and trade megatrends lead to increased political, market and credit risks. Drawing on qualitative data from 35 semi-structured interviews and expert discussions and based on the Futures Triangle analytical framework, this white paper analyses the geopolitical and trade megatrends that UKEF and other ECAs will face in the coming years. It presents novel findings about the implications for ECA mandates, strategies, products and operations: The evolution of mandates towards a “growth promoter”, the need to further scale up operations, the use of big data and artificial intelligence for risk analysis and forecasting, and the need to balance multiple and conflicting priorities, including export growth, support for small and medium-sized exporters, inclusive trade, climate action, and positive impact in developing markets.
This report examines exporters’ challenges and possible solutions for public intervention to promote foreign trade. Based on fieldwork conducted in Georgia, we explore which policy approaches can help to stimulate Georgian exports further. Our outcomes show that exporters face substantial barriers such as navigating complex trade regulations, lack of knowledge about target markets, trade finance gaps, as well as new export promotion programs (EPPs) in competitor countries. Other upper-middle-income countries can learn from our results that exporters can significantly benefit from a comprehensive export promotion strategy combined with an ecosystem-based “team” approach. EPPs related to awareness and capacity building in Georgia should be part of this strategy, focusing on challenges such as a lack of knowledge about trade practices and international business skills. Other EPPs must help to mitigate related market failures, as information gathering is costly, and firms have no incentive to share this information with competitors. Furthermore, targeted marketing support and customer matchmaking can answer Georgian exporters’ challenges, such as lack of market access and low sector visibility. Our results also show that public intervention through financial support and risk mitigation is essential for firms with an international orientation. The high-quality, rich outcomes provide significant value for other upper-middle-income countries by exploring the example of Georgia’s contemporary circumstances in an in-depth manner based on extensive interviews and document analysis. Limitations include that our work primarily relies on qualitative data and further research could involve a quantitative study with a diverse range of sectors.
Analysing and predicting the advance rate of a tunnel boring machine (TBM) in hard rock is integral to tunnelling project planning and execution. It has been applied in the industry for several decades with varying success. Most prediction models are based on or designed for large-diameter TBMs, and much research has been conducted on related tunnelling projects. However, only a few models incorporate information from projects with an outer diameter smaller than 5 m and no penetration prediction model for pipe jacking machines exists to date. In contrast to large TBMs, small-diameter TBMs and their projects have been considered little in research. In general, they are characterised by distinctive features, including insufficient geotechnical information, sometimes rather short drive lengths, special machine designs and partially concurring lining methods like pipe jacking and segment lining. A database which covers most of the parameters mentioned above has been compiled to investigate the performance of small-diameter TBMs in hard rock. In order to provide sufficient geological and technical variance, this database contains 37 projects with 70 geotechnically homogeneous areas. Besides the technical parameters, important geotechnical data like lithological information, unconfined compressive strength, tensile strength and point load index is included and evaluated. The analysis shows that segment lining TBMs have considerably higher penetration rates in similar geological and technical settings mostly due to their design parameters. Different methodologies for predicting TBM penetration, including state-of-the-art models from the literature as well as newly derived regression and machine learning models, are discussed and deployed for backward modelling of the projects contained in the database. New ranges of application for small-diameter tunnelling in several industry-standard penetration models are presented, and new approaches for the penetration prediction of pipe jacking machines in hard rock are proposed.