Refine
Year of publication
- 2015 (3) (remove)
Document Type
- Conference Proceeding (2)
- Patent (1)
Conference Type
- Konferenzartikel (2)
Language
- English (3) (remove)
Has Fulltext
- no (3) (remove)
Is part of the Bibliography
- yes (3) (remove)
Keywords
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (3) (remove)
Open Access
- Bronze (3) (remove)
The invention concerns a method for spectrum monitoring a given frequency band, in which the spectral power density (S(f)) within the given frequency band is determined for all noise and signal components in the frequency band and, in order to detect the presence of one or more signals within the given frequency band, it is evaluated whether the spectral power density (S(f)) exceeds a threshold value (&lgr;). According to the invention, the threshold value (&lgr;) is calculated in accordance with an estimation of a distribution density (hR(S)) for the noise component of the spectral power density (S(f)) within the given frequency band and in accordance with a predefined value for the false-alarm probability (Pfa).
Autonomous humanoid robots require light weight, high torque and high speed actuators to be able to walk and run. For conventional gears with a fixed gear ratio the product of torque and velocity is constant. On the other hand desired motions require maximum torque and speed. In this paper it is shown that with a variable gear ratio it is possible to vary the relation between torque and velocity. This is achieved by introducing systems of rods and levers to move the joints of our humanoid robot ”Sweaty II”. On the basis of a variable gear ratio low speed and high torque can be achieved for those joint angles, which require this motion mode, whereas high speed and low torque can be realized for those joint angles, where it is favorable for the desired motion.
Security in IT systems, particularly in embedded devices like Cyber Physical Systems (CPSs), has become an important matter of concern as it is the prerequisite for ensuring privacy and safety. Among a multitude of existing security measures, the Transport Layer Security (TLS) protocol family offers mature and standardized means for establishing secure communication channels over insecure transport media. In the context of classical IT infrastructure, its security with regard to protocol and implementation attacks has been subject to extensive research. As TLS protocols find their way into embedded environments, we consider the security and robustness of implementations of these protocols specifically in the light of the peculiarities of embedded systems. We present an approach for systematically checking the security and robustness of such implementations using fuzzing techniques and differential testing. In spite of its origin in testing TLS implementations we expect our approach to likewise be applicable to implementations of other cryptographic protocols with moderate efforts.