Refine
Year of publication
Document Type
- Conference Proceeding (456) (remove)
Conference Type
- Konferenzartikel (398)
- Konferenz-Abstract (38)
- Sonstiges (9)
- Konferenz-Poster (8)
- Konferenzband (3)
Is part of the Bibliography
- yes (456)
Keywords
- Assistive Technology (8)
- Gamification (8)
- Kommunikation (7)
- Deafblindness (5)
- Human Computer Interaction (5)
- Applikation (4)
- Messung (4)
- Sicherheit (4)
- Stahl (4)
- Wearables (4)
- Affective Computing (3)
- Batterie (3)
- Datensicherung (3)
- Dünnschichtchromatographie (3)
- Eingebettetes System (3)
- Energieversorgung (3)
- Finite-Elemente-Methode (3)
- Funktechnik (3)
- Haptics (3)
- Heart rhythm model (3)
- Innovation (3)
- Leistungselektronik (3)
- Methanisierung (3)
- Modeling and simulation (3)
- Sensortechnik (3)
- TRIZ methodology (3)
- Tactile (3)
- User Experience (3)
- Welle (3)
- neural networks (3)
- 5G mobile communication (2)
- Access protocols (2)
- Atrial fibrillation (2)
- Biomimetics (2)
- Brennstoffzelle (2)
- CST (2)
- Cardiac resynchronization therapy (2)
- Decoding (2)
- Education in Optics and Photonics (2)
- Emotion Recognition (2)
- Energy Management (2)
- Gehirn (2)
- HF-Ablation (2)
- Haustechnik (2)
- Herz (2)
- Hochtemperatur (2)
- Human Resources (2)
- Inventive principles (2)
- Kerbe (2)
- Kreativität (2)
- Künstliche Intelligenz (2)
- Leistung (2)
- Maschinenelement (2)
- Messtechnik (2)
- Mikrowellentechnik (2)
- Multiuser detection (2)
- Navigation (2)
- Netzwerk (2)
- Optik (2)
- Partikel (2)
- Payloads (2)
- Physical layer (2)
- Plastizität (2)
- Process engineering (2)
- Produktion (2)
- Psychometrie (2)
- Rehabilitation (2)
- Smart Textiles (2)
- TRIZ (2)
- TRIZ Inventive Principles (2)
- access protocols (2)
- convolutional neural networks (2)
- decoding (2)
- image classification (2)
- network coding (2)
- optics and photonics (2)
- printed electronics (2)
- research-oriented education (2)
- security (2)
- 3D interaction (1)
- 3D-Druck von leitfähigen Materialien (1)
- 3D-Time-of-Flight Cameras (1)
- 6LoWPAN (1)
- AC machines (1)
- Abgas (1)
- Absatz (1)
- Abtragung (1)
- Achilles tendonitis (1)
- Additive manufacturing (1)
- Adsorption (1)
- Agile Business (1)
- Agility (1)
- Air Pollution (1)
- Akustik (1)
- Algorithmus (1)
- Amplitude and Phase Errors (1)
- Analytical Query (1)
- Anbieter (1)
- Angle of Arrival (1)
- Arbeitswissenschaft (1)
- Artificial intelligence (1)
- Astronomical events (1)
- Atrioventricular delay (1)
- Augmented Reality (1)
- Ausbildung (1)
- Automated Invention (1)
- Automated idea generation (1)
- Automation (1)
- Automotive After Market (1)
- Automotive Industry (1)
- Automotive Radar (1)
- Banana residues (1)
- Battery storage (1)
- Bestrahlung (1)
- Bildungscontrolling (1)
- Biogas (1)
- Biogas Potential (1)
- Biogasanlage (1)
- Biogasreaktor (1)
- Bioreaktor (1)
- Biosignals (1)
- Biventricular pacing (1)
- Blockchain (1)
- Bloom filters (1)
- Bluetooth Low Energy (1)
- Breitbandkommunikation (1)
- Bruchmechanik (1)
- Bussystem (1)
- CAE (1)
- COVID-19 (1)
- CRT (1)
- Calibration (1)
- Car Repair Service Performance (1)
- Challenges During Pandemic 2022 (1)
- Cheer and Challenge (1)
- Chemical engineering (1)
- Cloud Computing (1)
- Cloud computing (1)
- Clustering (1)
- CoBot (1)
- Codierung (1)
- Cogeneration (1)
- Collision avoidance (1)
- Compensation (1)
- Computer Games (1)
- Computersicherheit (1)
- Computerunterstützte Kommunikation (1)
- Context-Awareness (1)
- Control Algorithms (1)
- Controlling (1)
- Cross-industry innovation (1)
- Cryoballoon catheter ablation (1)
- Current Control (1)
- Customer Centricity (1)
- Customer Solution Design (1)
- DC-AC converters (1)
- Data Integrity (1)
- Data Mining (1)
- Data mining (1)
- Datenbank (1)
- Datenbanksystem (1)
- Datenmanagement (1)
- Defibrillator (1)
- Design (1)
- Design for fibre reinforced AM (1)
- Device characterization (1)
- Diagnostics (1)
- Diesel-Ethanol-Mischkraftstoff (1)
- Digital Beamforming (1)
- Digital Business Models (1)
- Digital Transformation (1)
- Digital Twin (1)
- Digitale Medien (1)
- Digitalisierung (1)
- Digitalpakt Schule (1)
- Dimension 2 (1)
- Diskretisierung (1)
- Drahtloses lokales Netz (1)
- Drohne (1)
- Durchblutung (1)
- Durchmesser (1)
- E-Commerce (1)
- Eco Sciences (1)
- Eco-innovation (1)
- Eco-inventive principles (1)
- Ecodesign (1)
- Educations (1)
- Eindringprüfung (1)
- Einkapselung (1)
- Elderly care (1)
- Electromagnetic and thermal simulation (1)
- Electronic Commerce (1)
- Elektrochemie (1)
- Elektrode (1)
- Elektrofahrzeug (1)
- Elektrokardiogramm (1)
- Elektronik (1)
- Elektronische Medien (1)
- Emission (1)
- Emotion analysis (1)
- Emotions (1)
- Emotionsforschung (1)
- Empirical Research (1)
- Encapsulation (1)
- Energiemanagement (1)
- Energieverbrauch (1)
- Energy Flexibility (1)
- Engineering Creativity (1)
- Engineering Education (1)
- Engineering creativity (1)
- Entlastungskerbe (1)
- Environmental monitoring (1)
- Ermüdung (1)
- Error (1)
- Ersatz (1)
- Erweitere Realität (1)
- Eye Tracking (1)
- Eyetracking, Technisches Zeichnen (1)
- Eöelktrokardiogramm (1)
- FSK Wake-Up (1)
- FT-Raman-Spektroskopie (1)
- FUSION (1)
- Fachwissen (1)
- Faseroptik (1)
- Faserstoff (1)
- Feature extraction (1)
- Fertigungstechnik (1)
- Festoxidbrennstoffzelle (1)
- Field Programmable Gate Array (FPGA) (1)
- Filter Dimension (1)
- Footwear (1)
- Fotovoltaik (1)
- Fractionated atrial signals (1)
- Fractionated ventricular signals (1)
- GPU Computing (1)
- GPU computing (1)
- Game Design (1)
- Games (1)
- Ganztagsschule (1)
- Gebäudeleittechnik (1)
- Gefäßverschluß (1)
- Gender in Science and Technology Studies (STS), digitalization, interactive documentary, participation (1)
- Gerichtliche Wissenschaften (1)
- Gewebe (1)
- Greifsystemen (1)
- Grid Integration (1)
- Hands ON (1)
- Hash Function (1)
- Hash Table (1)
- Herzrhythmusstörung (1)
- Hidden Champions (1)
- High frequency ablation (1)
- Hochfrequenztechnik (1)
- Hohlform (1)
- Human Computrer Interaction (1)
- Human-Robot Collaboration (1)
- Human-centered computing (1)
- Hyperledger (1)
- IEEE802.15.4 (1)
- Ideation Performance (1)
- Ideation efficiency (1)
- Ideation performance function (1)
- Impairments (1)
- Implementation (1)
- Imprägnierung (1)
- Informatik (1)
- Informationssystem (1)
- Informationsvermittlung (1)
- Ingenieurwissenschaften (1)
- Ink (1)
- Instandhaltung (1)
- Intelligent Agents (1)
- Interaction metaphor (1)
- International Day of Light, IDL (1)
- International Year of Light, IYL (1)
- Internet der Dinge (1)
- Internet of Things (1)
- Inventive problem solving (1)
- Kalibrieren (1)
- Kalibrierung (1)
- Kamera (1)
- Kardiale Resynchronisationstherapie (1)
- Kinetik (1)
- Konferenz (1)
- Konsum (1)
- Kontextbewusstsein (1)
- Kontrolltheorie (1)
- Korrelation (1)
- Korrosion (1)
- Kraftstoff (1)
- Kraftwerk (1)
- Kryoptologie (1)
- Kugel (1)
- Lastenverschiebung (1)
- Learning (1)
- Learning Analytics (1)
- Left atrial ECG (1)
- Left atrial delay (1)
- Left cardiac ECG (1)
- Lernen (1)
- Lightweight design (1)
- Live Broadcasting (1)
- Loneliness (1)
- Long Term Evolution (1)
- Lumineszenz (1)
- Lupe (1)
- Lärmschutz (1)
- MIMO (1)
- MINT (1)
- Machine Learning (1)
- Many-core architectures (1)
- Materialermüdung (1)
- Materialwirtschaft (1)
- Mean Square Error (1)
- Measurement (1)
- Mechanik (1)
- Medizin (1)
- Membran (1)
- Mensch-Maschine-Kommunikation (1)
- Mensch-Roboter-Kollaboration (1)
- Methan (1)
- Microgrid (1)
- Microgrid(s) (1)
- Microgrids (1)
- Mikrostruktur (1)
- Mimikanalyse (1)
- Mobile Computing (1)
- Mobilkommunikation (1)
- Model Predictive Control (1)
- Modell (1)
- Modellierung (1)
- Module Manufacturing (1)
- Monitoring (1)
- Monte-Carlo (1)
- Monte-Carlo Simulation (1)
- Multi-core architectures (1)
- Multiside heart stimulation (1)
- Nanotechnologie (1)
- Nature-inspired principles (1)
- Neurodivergent (1)
- Niedrigenergiehaus (1)
- Oberfläche (1)
- Online Studies (1)
- PKI (1)
- PROFINET IO (1)
- PV Applications (1)
- PV Applications, Smart PV, PV Battery Systems, PV Power Supplies (1)
- PV Module (1)
- PV System (1)
- Parallelization (1)
- Parameter Estimation (1)
- Peak shaving (1)
- Photovoltaik (1)
- Polymere (1)
- Predictive Models (1)
- Preis (1)
- Process design (1)
- Process innovation (1)
- Processing (1)
- Profilwelle (1)
- Programmierung (1)
- Prototyp (1)
- Pulmonary vein isolation (1)
- QFD (1)
- Quality Function Deployment (1)
- Quantitative Marketing Research (1)
- Quellcode (1)
- RFID (1)
- Racemisierung (1)
- Radar (1)
- Rahmen (1)
- Raman-Spektroskopie (1)
- Range imaging RGB-D (1)
- Rapid Prototyping (1)
- Real-Time Communication (1)
- Real-time (1)
- Recruiting (1)
- Recycling (1)
- Rede (1)
- Reliability (1)
- Ringnut (1)
- Risk Assessment (1)
- Rohrleitung (1)
- SAW-Bauelement (1)
- Safe Speed and Separation Monitoring. (1)
- Scanner (1)
- Schleudertrauma (1)
- Schrittmacher (1)
- Schulcloud (1)
- Schutz (1)
- Security Engineering (1)
- Segmentierung (1)
- Self-Calibration (1)
- Semiconductor Device (1)
- Servqual (1)
- Signal averaging ECG (1)
- Signaltechnik (1)
- Smart Grid (1)
- Smart Grid Operation (1)
- Smart Grids (1)
- Smart PV (1)
- SmartMAC (1)
- Social Interaction (1)
- Social isolation (1)
- Software Protection (1)
- Software Security (1)
- Software for measurements (1)
- Spannung (1)
- Spectral-temporal mapping (1)
- Speiseröhre (1)
- Spektralanalyse (1)
- Spektroskopie (1)
- Spektrum (1)
- Standort (1)
- Steuerung (1)
- Stromregelung (1)
- Strömungsmechanik (1)
- Studienanfänger (1)
- Studium (1)
- Subspace Clustering (1)
- Subspace clustering (1)
- Substrates (1)
- Supraventricular tachycardia (1)
- Sustainable (1)
- Sustainable Innovation (1)
- Sustainable product development (1)
- Sustainable technology (1)
- Synchronisation (1)
- System (1)
- Systematic innovation (1)
- Target Path (1)
- Task Analysis (1)
- Technik (1)
- Temperaturmessung (1)
- Textile (1)
- Thermomechanik (1)
- Threat Modeling (1)
- Touch (1)
- Transesophageal electrocardiography (1)
- Transesophageal left atrial pacing (1)
- Trigeneration (1)
- Trägheit (1)
- Ultra-Low Energy (1)
- Ultra-Low Power (1)
- Ultraschall (1)
- Ultraweitband (1)
- Umwelt (1)
- Umweltschutz (1)
- Unity Engine (1)
- University students (1)
- Unterricht (1)
- User Acceptance (1)
- User Experience Test (1)
- VR (1)
- Ventricular tachycardia (1)
- Verbrennungsmotor (1)
- Verfügbarkeit (1)
- Vermessung des Menschen (1)
- Vervielfältigung (1)
- Virtual Reality (1)
- Visual Impairments (1)
- Wake-Up Receiver (1)
- Wasser (1)
- Web-Applikation (1)
- Wellenabsatz (1)
- Wellenlänge (1)
- Windenergie (1)
- Wärmepumpe (1)
- Zahlung (1)
- Zahnwelle (1)
- Zelle (1)
- Zenware (1)
- Zwischenmodulation (1)
- adversarial attacks (1)
- adversarial detection (1)
- agent (1)
- agent based systems (1)
- akustisches Bauelement (1)
- approximate histograms (1)
- autonomous systems (1)
- bio-inspired models (1)
- building management systems (1)
- camera-based navigation (1)
- car2x networks (1)
- carbon fiber (1)
- cellular radio (1)
- cloud security (1)
- color vision (1)
- computer network management (1)
- correlation (1)
- crossbar (1)
- curb (1)
- cushioning (property) (1)
- customization (1)
- cyclic plasticity (1)
- datengestützte Schulentwicklung (1)
- display technologies (1)
- distributed computing (1)
- e-Mobilität (1)
- education and research (1)
- eingebettetes Gerät (1)
- electrolyte-gated transistors (1)
- energy harvesting (1)
- face recognition (1)
- fail-operational (1)
- fingerprinting (1)
- footwear (1)
- gedruckter Sensorik (1)
- generative adversarial networks (1)
- hair (1)
- hardness (1)
- height estimation (1)
- home automation (1)
- hot work tool steel (1)
- hybrid systems (1)
- identification (1)
- image color analysis (1)
- industrial Ethernet (1)
- industrial communication (1)
- insoles (1)
- irrigation (1)
- kabellos (1)
- kanal (1)
- learning scenario (1)
- machine learning (1)
- machine-to-machine communication (1)
- metal oxide transistor (1)
- metatarsals (1)
- mild traumatic brain injury (1)
- modeling (1)
- multipath (1)
- noise measurement (1)
- nose (1)
- overuse injury (1)
- parking (1)
- particle coarsening (1)
- pattern recognition (1)
- peer to peer network (1)
- perception (1)
- physically unclonable function (PUF) (1)
- prevention (1)
- printed Antennas (1)
- privacy (1)
- radio networks (1)
- rekeying (1)
- reliability (1)
- running (1)
- self-organizing networks (1)
- semantics (1)
- sensor node (1)
- slope (1)
- softwaregenerierter Code (1)
- statistical methods, ROS (1)
- stochastic computing (1)
- style (1)
- telecommunication equipment testing (1)
- time series data (1)
- virtual experiments (1)
- walking (1)
- wide area networks (1)
- wireless sensor networks (1)
Institute
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (151)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (93)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (82)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (68)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (67)
- Fakultät Wirtschaft (W) (66)
- ACI - Affective and Cognitive Institute (28)
- INES - Institut für nachhaltige Energiesysteme (17)
- WLRI - Work-Life Robotics Institute (17)
- IMLA - Institute for Machine Learning and Analytics (7)
Open Access
- Closed Access (456) (remove)
In recent years, light-weight cryptography has received a lot of attention. Many primitives suitable for resource-restricted hardware platforms have been proposed. In this paper, we present a cryptanalysis of the new stream cipher A2U2 presented at IEEE RFID 2011 [9] that has a key length of 56 bit. We start by disproving and then repairing an extremely efficient attack presented by Chai et al. [8], showing that A2U2 can be broken in less than a second in the chosen-plaintext case. We then turn our attention to the more challenging known-plaintext case and propose a number of attacks. A guess-and-determine approach combined with algebraic cryptanalysis yields an attack that requires about 249 internal guesses. We also show how to determine the 5-bit counter key and how to reconstruct the 56-bit key in about 238 steps if the attacker can freely choose the IV. Furthermore, we investigate the possibility of exploiting the knowledge of a “noisy keystream” by solving a Max-PoSSo problem. We conclude that the cipher needs to be repaired and point out a number of simple measures that would prevent the above attacks.
The number of use cases for autonomous vehicles is increasing day by day especially in commercial applications. One important application of autonomous vehicles can be found within the parcel delivery section. Here, autonomous cars can massively help to reduce delivery efforts and time by supporting the courier actively. One important component of course is the autonomous vehicle itself. Nevertheless, beside the autonomous vehicle, a flexible and secure communication architecture also is a crucial key component impacting the overall performance of such system since it is required to allow continuous interactions between the vehicle and the other components of the system. The communication system must provide a reliable and secure architecture that is still flexible enough to remain practical and to address several use cases. In this paper, a robust communication architecture for such autonomous fleet-based systems is proposed. The architecture provides a reliable communication between different system entities while keeping those communications secure. The architecture uses different technologies such as Bluetooth Low Energy (BLE), cellular networks and Low Power Wide Area Network (LPWAN) to achieve its goals.
Due to its potential in improving the efficiency of energy supply, smart energy metering (SEM) has become an area of interest with the surge in Internet of Things (IoT). SEM entails remote monitoring and control of the sensors and actuators associated with the energy supply system. This provides a flexible platform to conceive and implement new data driven Demand Side Management (DSM) mechanisms. The IoT enablement allows the data to be gathered and analyzed at requisite granularity. In addition to efficient use of energy resources and provisioning of power, developing countries face an additional challenge of temporal mismatch in generation capacity and load factors. This leads to widespread deployment of inefficient and expensive Uninterruptible Power Supply (UPS) solutions for limited power provisioning during resulting blackouts. Our proposed “Soft-UPS” allows dynamic matching of load and generation through a combination of managed curtailment. This eliminates inefficiencies in the energy and power value chain and allows a data-driven approach to solving a widespread problem in developing countries, simultaneously reducing both upfront and running costs of conventional UPS and storage. A scalable and modular platform is proposed and implemented in this paper. The architecture employs “WiMODino” using LoRaWAN with a “Lite Gateway” and SQLite repository for data storage. Role based access to the system through an android application has also been demonstrated for monitoring and control.
Modeling of Random Variations in a Switched Capacitor Circuit based Physically Unclonable Function
(2020)
The Internet of Things (IoT) is expanding to a wide range of fields such as home automation, agriculture, environmental monitoring, industrial applications, and many more. Securing tens of billions of interconnected devices in the near future will be one of the biggest challenges. IoT devices are often constrained in terms of computational performance, area, and power, which demand lightweight security solutions. In this context, hardware-intrinsic security, particularly physically unclonable functions (PUFs), can provide lightweight identification and authentication for such devices. In this paper, random capacitor variations in a switched capacitor PUF circuit are used as a source of entropy to generate unique security keys. Furthermore, a mathematical model based on the ordinary least square method is developed to describe the relationship between random variations in capacitors and the resulting output voltages. The model is used to filter out systematic variations in circuit components to improve the quality of the extracted secrets.
Soccer simulation league is one of the founding leagues of RoboCup. In this paper we discuss the past, present and planned future achievements and changes. Also we summarize the connections and inter-league achievements of this league and provide an overview of the community contributions that made this league successful.
The excessive control signaling in Long Term Evolution networks required for dynamic scheduling impedes the deployment of ultra-reliable low latency applications. Semi-persistent scheduling was originally designed for constant bit-rate voice applications, however, very low control overhead makes it a potential latency reduction technique in Long Term Evolution. In this paper, we investigate resource scheduling in narrowband fourth generation Long Term Evolution networks through Network Simulator (NS3) simulations. The current release of NS3 does not include a semi-persistent scheduler for Long Term Evolution module. Therefore, we developed the semi-persistent scheduling feature in NS3 to evaluate and compare the performance in terms of uplink latency. We evaluate dynamic scheduling and semi-persistent scheduling in order to analyze the impact of resource scheduling methods on up-link latency.
Vehicle-to-Everything (V2X) communication promises improvements in road safety and efficiency by enabling low-latency and reliable communication services for vehicles. Besides using Mobile Broadband (MBB), there is a need to develop Ultra Reliable Low Latency Communications (URLLC) applications with cellular networks especially when safety-related driving applications are concerned. Future cellular networks are expected to support novel latencysensitive use cases. Many applications of V2X communication, like collaborative autonomous driving requires very low latency and high reliability in order to support real-time communication between vehicles and other network elements. In this paper, we classify V2X use-cases and their requirements in order to identify cellular network technologies able to support them. The bottleneck problem of the medium access in 4G Long Term Evolution(LTE) networks is random access procedure. It is evaluated through simulations to further detail the future limitations and requirements. Limitations and improvement possibilities for next generation of cellular networks are finally detailed. Moreover, the results presented in this paper provide the limits of different parameter sets with regard to the requirements of V2X-based applications. In doing this, a starting point to migrate to Narrowband IoT (NB-IoT) or 5G - solutions is given.
The next generation cellular networks are expected to improve reliability, energy efficiency, data rate, capacity and latency. Originally, Machine Type Communication (MTC) was designed for low-bandwidth high-latency applications such as, environmental sensing, smart dustbin, etc., but there is additional demand around applications with low latency requirements, like industrial automation, driver-less cars, and so on. Improvements are required in 4G Long Term Evolution (LTE) networks towards the development of next generation cellular networks for providing very low latency and high reliability. To this end, we present an in-depth analysis of parameters that contribute to the latency in 4G networks along with a description of latency reduction techniques. We implement and validate these latency reduction techniques in the open-source network simulator (NS3) for narrowband user equipment category Cat-Ml (LTE-M) to analyze the improvements. The results presented are a step towards enabling narrowband Ultra Reliable Low Latency Communication (URLLC) networks.
Ripple: Overview and Outlook
(2015)
Ripple is a payment system and a digital currency which evolved completely independently of Bitcoin. Although Ripple holds the second highest market cap after Bitcoin, there are surprisingly no studies which analyze the provisions of Ripple.
In this paper, we study the current deployment of the Ripple payment system. For that purpose, we overview the Ripple protocol and outline its security and privacy provisions in relation to the Bitcoin system. We also discuss the consensus protocol of Ripple. Contrary to the statement of the Ripple designers, we show that the current choice of parameters does not prevent the occurrence of forks in the system. To remedy this problem, we give a necessary and sufficient condition to prevent any fork in the system. Finally, we analyze the current usage patterns and trade dynamics in Ripple by extracting information from the Ripple global ledger. As far as we are aware, this is the first contribution which sheds light on the current deployment of the Ripple system.
NEXCODE is a project promoted by the European Space Agency aimed at research design development and demonstration of a receiver chain for telecomm and links in space missions including the presence of new short low-density parity-check codes for error correction. These codes have excellent performance from the error rate viewpoint but also put new challenges as regards synchronization issues and implementation. In this paper after a short review of the results obtained through numerical simulations we present an overview of the breadboard designed for practical testing and the test-plan proposed for the verification of the breadboard and the validation of the new codes and novel synchronization techniques under relevant operation conditions.
The design of control systems of concentrator photovoltaic power plants will be more challenging in the future. Reasons are cost pressure, the increasing size of power plants, and new applications for operation, monitoring and maintenance required by grid operators, manufacturers and plant operators. Concepts and products for fixed-mounted photovoltaic can only partly be adapted since control systems for concentrator photovoltaic are considerable more complex due to the required high accurate sun-tracking. In order to assure reliable operation during a lifetime of more than 20 years, robustness of the control system is one crucial design criteria. This work considers common engineering technics for robustness, safety and security. Potential failures of the control system are identified and their effects are analyzed. Different attack scenarios are investigated. Outcomes are design criteria that encounter both: failures of system components and malicious attacks on the control system of future concentrator photovoltaic power plants. Such design criteria are a transparent state management through all system layers, self-tests and update capabilities for security concerns. The findings enable future research to develop a more robust and secure control system for concentrator photovoltaics when implementing new functionalities in the next generation.
The communication system of a large-scale concentrator photovoltaic power plant is very challenging. Manufacturers are building power plants having thousands of sun tracking systems equipped with communication and distributed over a wide area. Research is necessary to build a scalable communication system enabling modern control strategies. This poster abstract describes the ongoing work on the development of a simulation model of such power plants in OMNeT++. The model uses the INET Framework to build a communication network based on Ethernet. First results and problems of timing and data transmission experiments are outlined. The model enables research on new communication and control approaches to improve functionality and efficiency of power plants based on concentrator photovoltaic technology.
Several cloud schedulers have been proposed in the literature with different optimization goals such as reducing power consumption, reducing the overall operational costs or decreasing response times. A less common goal is to enhance the system security by applying specific scheduling decisions. The security risk of covert channels is known for quite some time, but is now back in the focus of research because of the multitenant nature of cloud computing and the co-residency of several per-tenant virtual machines on the same physical machine. Especially several cache covert channels have been identified that aim to bypass a cloud infrastructure's sandboxing mechanism. For instance, cache covert channels like the one proposed by Xu et. al. use the idealistic scenario with two alternately running colluding processes in different VMs accessing the cache to transfer bits by measuring cache access time. Therefore, in this paper we present a cascaded cloud scheduler coined C 3 -Sched aiming at mitigating the threat of a leakage of customers data via cache covert channels by preventing processes to access cache lines alternately. At the same time we aim at maintaining the cloud performance and minimizing the global scheduling overhead.
Eine neue Prozessidee zur Auftrennung racemischer Wirkstoffe unter Verwendung nanoskaliger AlO(OH)‐Hohlkugeln als Adsorbens und überkritischen Kohlenstoffdioxides (sc‐CO2) als Lösungsmittel wird vorgestellt. Zur Auslegung des Prozesses werden Untersuchungen zur Abscheidung der racemischen Wirkstoffe (RS)‐Flurbiprofen, (RS)‐Ibuprofen, (RS)‐Ketoprofen und den reinen Enantiomeren (R)‐Flurbiprofen, (S)‐Ibuprofen und (S)‐Ketoprofen an AlO(OH)‐Hohlkugeln präsentiert und bewertet. Zudem werden Adsorptionsdaten von gasförmigem CO2 an den Hohlkugeln und kommerziellen AlO(OH)‐Partikeln, die mit einer Magnetschwebewaage ermittelt wurden, verglichen. Abschließend werden erste Ergebnisse von orientierenden Versuchen zur Adsorption von racemischem Flurbiprofen aus sc‐CO2 an den Hohlkugeln vorgestellt.
The transition from college to university can have a variety of psychological effects on students who need to cope with daily obligations by themselves in a new setting, which can result in loneliness and social isolation. Mobile technology, specifically mental health apps (MHapps), have been seen as promising solutions to assist university students who are facing these problems, however, there is little evidence around this topic. My research investigates how a mobile app can be designed to reduce social isolation and loneliness among university students. The Noneliness app is being developed to this end; it aims to create social opportunities through a quest-based gamified system in a secure and collaborative network of local users. Initial evaluations with the target audience provided evidence on how an app should be designed for this purpose. These results are presented and how they helped me to plan the further steps to reach my research goals. The paper is presented at MobileHCI 2020 Doctoral Consortium.