Refine
Year of publication
- 2016 (306) (remove)
Document Type
- Conference Proceeding (79)
- Article (reviewed) (52)
- Article (unreviewed) (44)
- Bachelor Thesis (33)
- Part of a Book (31)
- Book (18)
- Working Paper (13)
- Master's Thesis (10)
- Patent (9)
- Report (6)
Conference Type
- Konferenzartikel (63)
- Konferenz-Abstract (9)
- Sonstiges (6)
- Konferenzband (2)
- Konferenz-Poster (1)
Keywords
- Digitalisierung (6)
- Management (6)
- Eingebettetes System (5)
- Energieversorgung (5)
- Haustechnik (5)
- Mathematik (5)
- Bildung (4)
- Marketing (4)
- Messtechnik (4)
- Design (3)
Institute
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (109)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (105)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (53)
- Fakultät Wirtschaft (W) (38)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (22)
- INES - Institut für nachhaltige Energiesysteme (18)
- ACI - Affective and Cognitive Institute (4)
- IfTI - Institute for Trade and Innovation (2)
- POIM - Peter Osypka Institute of Medical Engineering (2)
- Rektorat/Verwaltung (2)
Open Access
- Open Access (95)
- Closed Access (83)
- Bronze (10)
- Closed (5)
Structured Innovation with TRIZ in Science and Industry - Creating Value for Customers and Society
(2016)
Covert channels have been known for a long time because of their versatile forms of appearance. For nearly every technical improvement or change in technology, such channels have been (re-)created or known methods have been adapted. For example, the introduction of hyperthreading technology has introduced new possibilities for covert communication between malicious processes because they can now share the arithmetic logical unit as well as the L1 and L2 caches, which enable establishing multiple covert channels. Even virtualization, which is known for its isolation of multiple machines, is prone to covert- and side-channel attacks because of the sharing of resources. Therefore, it is not surprising that cloud computing is not immune to this kind of attacks. Moreover, cloud computing with multiple, possibly competing users or customers using the same shared resources may elevate the risk of illegitimate communication. In such a setting, the “air gap” between physical servers and networks disappears, and only the means of isolation and virtual separation serve as a barrier between adversary and victim. In the work at hand, we will provide a survey on vulnerable spots that an adversary could exploit trying to exfiltrate private data from target virtual machines through covert channels in a cloud environment. We will evaluate the feasibility of example attacks and point out proposed mitigation solutions in case they exist.
Optimal microgrid scheduling with peak load reduction involving an electrolyzer and flexible loads
(2016)
This work consists of a multi-objective mixed-integer linear programming model for defining optimized schedules of components in a grid-connected microgrid. The microgrid includes a hydrogen energy system consisting of an alkaline electrolyzer, hydrogen cylinder bundles and a fuel cell for energy storage. Local generation is provided from photovoltaic panels, and the load is given by a fixed load profile combined with a flexible electrical load, which is a battery electric vehicle. The electrolyzer has ramp-up constraints which are modeled explicitly. The objective function includes, besides operational costs and an environmental indicator, a representation of peak power costs, thus leading to an overall peak load reduction under optimized operation. The model is used both for controlling a microgrid in a field trial set-up deployed in South-West Germany and for simulating the microgrid operation for defined period, thus allowing for economic system evaluation. Results from defined sample runs show that the energy storage is primarily used for trimming the peak of electricity drawn from the public grid and is not solely operated with excess power. The flexible demand operation also helps keeping the peak at its possible minimum.
Der sommerliche Wärmeschutz von Schulgebäuden im Oberrheingraben und die Bereitstellung von Kühlenergie wurden bereits untersucht und finden Aufnahme im Leitfaden „Natürliche Gebäudeklimatisierung in Klassenzimmern des südlichen Oberrheins“. Im Rahmen der Arbeiten zur Minderung der sommerlichen Überhitzung wurde durch den Einbau und die damit verbundene kontinuierliche Aufzeichnung der CO2‐Konzentrationen der Raumluft festgestellt, dass besonders im Winterhalbjahr eine Verbesserung der Luftqualität erreicht werden muss.
All business is local
(2016)