Refine
Document Type
- Article (reviewed) (3)
- Article (unreviewed) (3)
- Conference Proceeding (1)
- Master's Thesis (1)
Conference Type
- Konferenzartikel (1)
Keywords
- Algorithmus (8) (remove)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (4)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (3)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (2)
- INES - Institut für nachhaltige Energiesysteme (2)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (1)
- Fakultät Medien (M) (ab 22.04.2021) (1)
Open Access
- Closed Access (5)
- Open Access (1)
Organizations striving to achieve success in the long term must have a positive brand image which will have direct implications on the business. In the face of the rising cyber threats and intense competition, maintaining a threat-free domain is an important aspect of preserving that image in today's internet world. Domain names are often near-synonyms for brand names for numerous companies. There are likely thousands of domains that try to impersonate the big companies in a bid to trap unsuspecting users, usually falling prey to attacks such as phishing or watering hole. Because domain names are important for organizations for running their business online, they are also particularly vulnerable to misuse by malicious actors. So, how can you ensure that your domain name is protected while still protecting your brand identity? Brand Monitoring, for example, may assist. The term "Brand Monitoring" applies only to keep tabs on an organization's brand performance, reception, and overall online presence through various online channels and platforms [1]. There has been a rise in the need of maintaining one's domain clear of any linkages to malicious activities as the threat environment has expanded. Since attackers are targeting domain names of organizations and luring unsuspecting users to visit malicious websites, domain monitoring becomes an important aspect. Another important aspect of brand abuse is how attackers leverage brand logos in creating fake and phishing web pages. In this Master Thesis, we try to solve the problem of classification of impersonated domains using rule-based and machine learning algorithms and automation of domain monitoring. We first use a rule-based classifier and Machine Learning algorithms to classify the domains gathered into two buckets – "Parked" and "Non-Parked". In the project's second phase, we will deploy object detection models (Scale Invariant Feature Transform - SIFT and Multi-Template Matching – MTM) to detect brand logos from the domains of interest.
There is a growing trend for the use of thermo-active building systems (TABS) for the heating and cooling of buildings, because these systems are known to be very economical and efficient. However, their control is complicated due to the large thermal inertia, and their parameterization is time-consuming. With conventional TABS-control strategies, the required thermal comfort in buildings can often not be maintained, particularly if the internal heat sources are suddenly changed. This paper shows measurement results and evaluations of the operation of a novel adaptive and predictive calculation method, based on a multiple linear regression (AMLR) for the control of TABS. The measurement results are compared with the standard TABS strategy. The results show that the electrical pump energy could be reduced by more than 86%. Including the weather adjustment, it could be demonstrated that thermal energy savings of over 41% could be reached. In addition, the thermal comfort could be improved due to the possibility to specify mean room set-point temperatures. With the AMLR, comfort category I of the comfort norms ISO 7730 and DIN EN 15251 are observed in about 95% of occasions. With the standard TABS strategy, only about 24% are within category I.
Adaptive predictive control of thermo-active building systems (TABS) based on a multiple regression algorithm: First practical test. Available from: https://www.researchgate.net/publication/305903009_Adaptive_predictive_control_of_thermo-active_building_systems_TABS_based_on_a_multiple_regression_algorithm_First_practical_test [accessed Jul 7, 2017].
Signal detection and bandwidth estimation, also known as channel segmentation or information channel estimation, is a perpetual topic in communication systems. In the field of radio monitoring this issue is extremely challenging, since unforeseeable effects like fading occur accidentally. In addition, most radio monitoring devices normally scan a wide frequency range of several hundred MHz and have to detect a multitude of different signals, varying in signal power, bandwidth and spectral shape. Since narrowband sensing techniques cannot be directly applied, most radio monitoring devices use Nyquist wideband sensing to discover the huge frequency range. In practice, sensing is normally conducted by an FFT sweep spectrum analyzer that delivers the power spectral density (PSD) values to the radio monitoring system. The channel segmentation is the initial step of a comprehensive signal analysis in a radio monitoring system based on the PSD values. In this paper, a novel approach for channel segmentation is presented that is based on a quantization and a histogram evaluation of the measured PSD. It will be shown that only the combination of both evaluations will lead to an successful automatic channel segmentation. The performance of the proposed algorithm is shown in a real radio monitoring szenario.
Das Virtuelle Informatiklabor soll Schülern und Studierenden den übergroßen Respekt vor dem Fach Informatik nehmen und sie beim Lernen der Inhalte unterstützen. Zu diesem Zweck werden grundlegende Algorithmen der Informatik anhand konkreter Aufgabenstellungen in interaktiven Anwendungen behandelt, um den Lernenden das explorative Erkunden zu ermöglichen. Animationen sollen das Verstehen fördern, Experimente das eigenständige, durch vielfältige Hilfen unterstützte Anwenden und Umsetzen des Gelernten. Der erste Themenbereich im Virtuellen Informatiklabor umfasst die Rekursion, die in mehreren Anwendungen präsentiert wird.
An algorithm is presented that has successfully been utilized in practice for several years. It improves data analysis in chromatography. The program runs in an extremely reliable way and evaluates chromatographic raw data with an acceptable error. The algorithm requires a minimum of preliminaries and integrates even unsmoothed noisy data correctly.