Refine
Year of publication
- 2015 (70) (remove)
Document Type
- Conference Proceeding (38)
- Article (reviewed) (12)
- Article (unreviewed) (8)
- Part of a Book (5)
- Patent (4)
- Book (3)
Conference Type
- Konferenzartikel (30)
- Konferenz-Abstract (6)
- Sonstiges (2)
Is part of the Bibliography
- yes (70) (remove)
Keywords
- Applikation (5)
- Abtragung (3)
- Eingebettetes System (3)
- Herz (3)
- Kommunikation (3)
- Physik (3)
- Raman-Spektroskopie (3)
- Datensicherung (2)
- Funktechnik (2)
- Herzrhythmusstörung (2)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (70) (remove)
Open Access
- Closed Access (32)
- Open Access (22)
- Bronze (6)
The overview of public key infrastructure based security approaches for vehicular communications
(2015)
Modern transport infrastructure becomes a full member of globally connected network. Leading vehicle manufacturers have already triggered development process, output of which will open a new horizon of possibilities for consumers and developers by providing a new communication entity - a car, thus enabling Car2X communications. Nevertheless some of available systems already provide certain possibilities for vehicles to communicate, most of them are considered not sufficiently secured. During last 15 years a number of big research projects funded by European Union and USA governments were started and concluded after which a set of standards were published prescribing a common architecture for Car2X and vehicles onboard communications. This work concentrates on combining inner and outer vehicular communications together with a use of Public Key Infrastructure (PKI).
Extended Performance Measurements of Scalable 6LoWPAN Networks in an Automated Physical Testbed
(2015)
IPv6 over Low power Wireless Personal Area Networks, also known as 6LoWPAN, is becoming more and more a de facto standard for such communications for the Internet of Things, be it in the field of home and building automation, of industrial and process automation, or of smart metering and environmental monitoring. For all of these applications, scalability is a major precondition, as the complexity of the networks continuously increase. To maintain this growing amount of connected nodes a various 6LoWPAN implementations are available. One of the mentioned was developed by the authors' team and was tested on an Automated Physical Testbed for Wireless Systems at the Laboratory Embedded Systems and Communication Electronics of Offenburg University of Applied Sciences, which allows the flexible setup and full control of arbitrary topologies. It also supports time-varying topologies and thus helps to measure performance of the RPL implementation. The results of the measurements prove an excellent stability and a very good short and long-term performance also under dynamic conditions. In all measurements, there is an advantage of minimum 10% with regard to the average times, like global repair time; but the advantage with reagr to average values can reach up to 30%. Moreover, it can be proven that the performance predictions from other papers are consistent with the executed real-life implementations.
The demand of wireless solutions in industrial applications increases since the early nineties. This trend is not only ongoing, it is further pushed by developments in the area of software stacks like the latest Bluetooth Low Energy Stack. It is also pushed by new chip-designs and powerful and highly integrated electronic hardware. The acceptance of wireless technologies as a possible solution for industrial applications, has overcome the entry barrier [1]. The first step to see wireless as standard for many industrial applications is almost accomplished. Nevertheless there is nearly none acceptance of wireless technology for Safety applications. One highly challenging and demanding requirement is still unsolved: The aspect safety and robustness. Those topics have been addressed in many cases but always in a similar manner. WirelessHART as an example addresses this topic with redundant so called multiple propagation paths and frequency hopping to handle with interferences and loss of network participants. So far the pure peer to peer link is rarely investigated and there are less safety solutions available. One product called LoRa™ can be seen as one possible solution to address this lack of safety within wireless links. This paper focuses on the safety performance evaluation of a modem-chip-design. The use of diverse and redundant wireless technologies like LoRa can lead to an increase acceptance of wireless in safety applications. Many measurements in real industrial application have been carried out to be able to benchmark the new chip in terms of the safety aspects. The content of this research results can help to raise the level of confidence in wireless. In this paper, the term “safety” is used for data transmission reliability.
The automatic classification of the modulation format of a detected signal is the intermediate step between signal detection and demodulation. If neither the transmitted data nor other signal parameters such as the frequency offset, phase offset and timing information are known, then automatic modulation classification (AMC) is a challenging task in radio monitoring systems. The approach of clustering algorithms is a new trend in AMC for digital modulations. A novel algorithm called `highest constellation pattern matching' is introduced to identify quadrature amplitude modulation and phase shift keying signals. The obtained simulation and measurement results outperform the existing algorithms for AMC based on clustering. Finally, it is shown that the proposed algorithm works in a real monitoring environment.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.
Concussions in sports and during recreational activities are a major source of traumatic brain injury in our society. This is mainly relevant in adolescence and young adulthood, where the annual rate of diagnosed concussions is increasing from year to year. Contact sports (e.g., ice hockey, American football, or boxing) are especially exposed to repeated concussions. While most of the athletes recover fully from the trauma, some experience a variety of symptoms including headache, fatigue, dizziness, anxiety, abnormal balance and postural instability, impaired memory, or other cognitive deficits. Moreover, there is growing evidence regarding clinical and neuropathological consequences of repetitive concussions, which are also linked to an increased risk for depression and Alzheimer’s disease or the development of chronic traumatic encephalopathy. With little contribution of conventional structural imaging (computed tomography (CT) or magnetic resonance imaging (MRI)) to the evaluation of concussion, nuclear imaging techniques (i.e., positron emission tomography (PET) and single-photon emission computed tomography (SPECT)) are in a favorable position to provide reliable tools for a better understanding of the pathophysiology and the clinical evaluation of athletes suffering a concussion.
Cardiac resynchronization therapy (CRT) is an established therapy for heart failure patients and improves quality of life in patients with sinus rhythm, reduced left ventricular ejection fraction (LVEF), left bundle branch block and wide QRS duration. Since approximately sixty percent of heart failure patients have a normal QRS duration they do not benefit or respond to the CRT. Cardiac contractility modulation (CCM) releases nonexcitatoy impulses during the absolute refractory period in order to enhance the strength of the left ventricular contraction. The aim of the investigation was to evaluate differences in cardiac index between optimized and nonoptimized CRT and CCM devices versus standard values. Impedance cardiography, a noninvasive method was used to measure cardiac index (CI), a useful parameter which describes the blood volume during one minutes heart pumps related to the body surface. CRT patients indicate an increase of 39.74 percent and CCM patients an improvement of 21.89 percent more cardiac index with an optimized device.
Im Projekt bwLehrpool wurde ein verteiltes System für die flexible Nutzung von Rechnerpools durch Desktop-Virtualisierung entwickelt. Auf Basis eines zentral gebooteten Linux- Grundsystems können beliebige virtualisierbare Betriebssysteme für Lehrund Prüfungszwecke zentral bereitgestellt und lokal auf den Maschinen aus-gewählt werden. Die verschiedenen Ar- beitsumgebungen müssen nicht mehr auf den PCs installiert werden und erlauben so eine multifunktionale Nutzung von PCs und Räumen für vielfältige Lehrund Lernszenarien sowie für elektronische Prüfungen. bwLehrpool abstrahiert von der PC-Hardware vor Ort und ermöglicht den Dozenten die eigene Gestaltung und Verwaltung ihrer Softwareumgebungen als Self-Service. Darüber hinaus fördert bwLehrpool den hochschulübergreifenden Austausch von Kursumgebungen.
Bluetooth Low Energy extends the Bluetooth standard in version 4.0 for ultra-low energy applications through the extensive usage of low-power sleeping periods, which inherently difficult in frequency hopping technologies. This paper gives an introduction into the specifics of the Bluetooth Low Energy protocol, shows a sample implementation, where an embedded device is controlled by an Android smart phone, and shows the results of timing and current consumption measurements.
Transcatheter aortic valve implantation is a therapy for patients with reduced left ventricular ejection fraction and symptomatic aortic stenosis. The aim of the study was to compare the pre-and post- transcatheter aortic valve implantation procedures to determine the QRS and QT ventricular conduction times as a potential predictor of permanent pacemaker therapy requirement after transcatheter aortic valve implantation. QRS and QT ventricular conduction times were prolonged after transcatheter aortic valve implantation in heart failure patients with permanent dual chamber pacemaker therapy after transcatheter aortic valve implantation. QRS and QT ventricular conduction times may be useful parameters to evaluate the risk of post-procedural ventricular conduction block and permanent pacemaker therapy in transcatheter aortic valve implantation.
In online analytical processing (OLAP), filtering elements of a given dimensional attribute according to the value of a measure attribute is an essential operation, for example in top-k evaluation. Such filters can involve extremely large amounts of data to be processed, in particular when the filter condition includes “quantification” such as ANY or ALL, where large slices of an OLAP cube have to be computed and inspected. Due to the sparsity of OLAP cubes, the slices serving as input to the filter are usually sparse as well, presenting a challenge for GPU approaches which need to work with a limited amount of memory for holding intermediate results. Our CUDA solution involves a hashing scheme specifically designed for frequent and parallel updates, including several optimizations exploiting architectural features of Nvidia’s Fermi and Kepler GPUs.
The increasing number of transistors being clocked at high frequencies of modern microprocessors lead to an increasing power consumption, which calls for an active dynamic thermal management. In a research project a system environment has been developed, which includes thermal modeling of the microprocessor in the board system, a software environment to control the characteristics of the system’s timing behavior, and a modified Linux scheduler, which is enhanced with a prediction controller. Measurement results are shown for this development for a Freescale i.MX6Q quad-core microprocessor.
The application of leaky feeder (radiating) cables is a common solution for the implementation of reliable radio communication in huge industrial buildings, tunnels and mining environment. This paper explores the possibilities of leaky feeders for 1D and 2D localization in wireless systems based on time of flight chirp spread spectrum technologies. The main focus of this paper is to present and analyse the results of time of flight and received signal strength measurements with leaky feeders in indoor and outdoor conditions. The authors carried out experiments to compare ranging accuracy and radio coverage area for a point-like monopole antenna and for a leaky feeder acting as a distributed antenna. In all experiments RealTrac equipment based on nanoLOC radio standard was used. The estimation of the most probable path of a chirp signal going through a leaky feeder was calculated using the ray tracing approach. The typical non-line-of-sight errors profiles are presented. The results show the possibility to use radiating cables in real time location technologies based on time-of-flight method.
Verfahren zur Bestimmung von Eigenschaften einer Rohrleitung, insbesondere der Position eines Abzweigs einer Abwasserrohrleitung, (a) bei dem ein Schallwellensendesignal (S, S') an einem vorgegebenen Einspeisepunkt in die Rohrleitung (1) eingespeist wird und sich in axialer Richtung der Rohrleitung (1) ausbreitet, (b) wobei das Frequenzspektrum des Schallwellensendesignals (S, S') eine Frequenzkomponente oder einen Spektralbereich aufweist, dessen maximale Frequenz kleiner ist als die untere Grenzfrequenz (fc) für die erste Obermode, (c) bei dem innerhalb der Rohrleitung (1) reflektierte Anteile (Sr1, Sr2, Sr3, S'r1, S'r2, S'r3) des Schallwellensendesignals (S, S') als Schallwellenempfangssignal (E, E') detektiert werden, und (d) bei dem die Rohrleitung (1) durch eine Auswertung des Schallwellenempfangssignal (E, E') in Bezug auf das Schallwellensendesignal (S, S') hinsichtlich des Vorhandenseins von Schallwellenreflexionen (Sr1, Sr2, Sr3, S'r1, S'r2, S'r3) verursachenden Reflexionsorten entlang der Rohrleitung (1) untersucht wird, (e) wobei mittels der Auswertung des Schallwellenempfangssignals (E, E') zumindest jeweils der Abstand (I) eines Reflexionsortes von dem Einspeisepunkt bestimmt wird.