Refine
Year of publication
Document Type
- Master's Thesis (63)
- Bachelor Thesis (29)
- Study Thesis (13)
- Conference Proceeding (8)
- Article (reviewed) (6)
- Book (1)
- Other (1)
Conference Type
- Konferenzartikel (4)
- Konferenzband (4)
Language
- English (121) (remove)
Is part of the Bibliography
- no (121) (remove)
Keywords
- COVID-19 (13)
- Government Measures (13)
- Corona (9)
- Crisis (8)
- Export (7)
- IT-Sicherheit (7)
- Deep learning (4)
- Maschinelles Lernen (4)
- Communication Systems (3)
- Computersicherheit (3)
- Design automation (3)
- Finite difference methods (3)
- Information Systems (3)
- JavaScript (3)
- Security (3)
- security (3)
- Analysis (2)
- Cloud Computing (2)
- Energiemanagement (2)
- Energiewende (2)
- Exportfinanzierung (2)
- FETs (2)
- Finite-Elemente-Methode (2)
- Frequency (2)
- Homomorphic Encryption (2)
- Identitätsverwaltung (2)
- Integrated circuit interconnections (2)
- Internet der Dinge (2)
- Künstliche Intelligenz (2)
- LINUX (2)
- Landwirtschaft (2)
- Leichtbau (2)
- Machine Learning (2)
- Microwave devices (2)
- Mikrowelle (2)
- Modellieren (2)
- Organischer Abfall (2)
- Pflanzenkohle (2)
- Resonator (2)
- Risikoanalyse (2)
- Risk Analysis (2)
- Rust (2)
- Schluckspecht (2)
- Semiconductor device packaging (2)
- Unity (2)
- Web Development (2)
- Web development (2)
- Webentwicklung (2)
- biowaste (2)
- optimization (2)
- (COM) (1)
- 3D printing (1)
- 3D-CAD (1)
- 3D-Druck (1)
- 4-Oxocrotonic acid (1)
- 5G (1)
- 6LoWPAN (1)
- AI (1)
- API (1)
- AUTOSAR (1)
- AVD (1)
- Access Management (1)
- Accounting (1)
- Adversarial Attacks (1)
- Agent <Künstliche Intelligenz> (1)
- Agent Fitness (1)
- Agrophotovoltaics (1)
- Algorithmus (1)
- Amazon Echo (1)
- Android (1)
- Angewandte Informatik (1)
- Angriff (1)
- Anomalieerkennung (1)
- Anomaly Detection (1)
- Antenna (1)
- Anwendungssoftware (1)
- Apertur (1)
- Artificial Intelligence (1)
- Audiometrie (1)
- Austria (1)
- Automation (1)
- Automatisierungstechnik (1)
- Außenhandel (1)
- Battery (1)
- Battery Managment System (1)
- Bedrohungsanalyse (1)
- Belgium (1)
- Bellman Ford algorithm (1)
- Bewegungsabläufe (1)
- Bienen (1)
- Biochar (1)
- Biogas (1)
- Biologika (1)
- Biomechanical (1)
- Biosimilars (1)
- BlueZ (1)
- Bluetooth (1)
- Bluetooth Low Energy (1)
- Bluetooth-Standard (1)
- Bodenradar (1)
- Bot Classification (1)
- Buchführung (1)
- Business Intelligence (1)
- CAD (1)
- CANopen (1)
- CCS (1)
- CNC (1)
- CNN (1)
- CO2-Bilanz (1)
- CSAF (1)
- Canada (1)
- Carbon Footprint (1)
- Carbon nanotube membran (1)
- Cell (1)
- Cellulasen (1)
- Cement Industry (1)
- Ceramic band pass filters (1)
- Chiffrierung (1)
- Client-side (1)
- Closed-form solution (1)
- Clustering (1)
- Comparison (1)
- Compressor (1)
- Computerspiel (1)
- Convolutional neural networks (1)
- Couplers (1)
- Couplings (1)
- Cross-platfom (1)
- Cyber Maturity Assessment Model (1)
- CyberDeception (1)
- Cybersecurity (1)
- Cytochrome (1)
- DTLS (1)
- DVRIP (1)
- Data Science (1)
- Data analysis (1)
- Datenanalyse (1)
- Datenqualität (1)
- Decarbonization (1)
- Decentralized applications (1)
- Dekarbonisierung (1)
- Denmark (1)
- Differential equations (1)
- Digital Twins (1)
- Digitaler Zwilling (1)
- Direct Aeroacoustic Simulation (1)
- Distributed Sensor Network (1)
- Distributed computing (1)
- Dünnschichtchromatographie (1)
- E-Commerce (1)
- ECA (1)
- ESP-IDF (1)
- ETL Data Pipeline (1)
- EU 933/2019 (1)
- Edge Computing (1)
- Education (1)
- Effizienz (1)
- Eingruppierung (1)
- Eisen- und Stahlindustrie (1)
- Electric Tractors (1)
- Electrochemical membrane (1)
- Electrochemical membrane reactor (1)
- Electromagnetic fields (1)
- Electromagnetic scattering (1)
- Electronic Commerce (1)
- Elektrizitätsnetz (1)
- Elektrofahrzeug (1)
- Elektromagnetische Reflexionsmethode (1)
- Elektromagnetismus (1)
- Energie (1)
- Energiespeicherung (1)
- Energieversorgung (1)
- Energy (1)
- Energy System Analysis (1)
- Energy System Model (1)
- Energy System Modelling (1)
- Energy Transition (1)
- Energy management (1)
- Energy storage (1)
- Energy-efficient vehicle (1)
- Entwicklung (1)
- Enzym (1)
- Enzyme assay (1)
- Equivalent circuits (1)
- Estonia (1)
- Evaluation (1)
- Event Tracing for Windows (1)
- Exportfinance (1)
- Express.js (1)
- FEM (1)
- FFI (1)
- Fermentation (1)
- Fertigungsautomatisierung (1)
- Filters (1)
- Finance (1)
- Finite-Differenzen-Methode (1)
- Finland (1)
- Foreign Direct Investment (1)
- Fotovoltaik (1)
- France (1)
- Friedländer-Bakterium (1)
- Full-Stack Development (1)
- Full-Stack JavaScript Development (1)
- Functional safety (1)
- Funktionale Sicherheit (1)
- Funktionssicherheit (1)
- Future Energy System (1)
- Fuzzing (1)
- Fußgängererkennung (1)
- GNSS (1)
- GPR (1)
- Game Development (1)
- Gebäudeleittechnik (1)
- German Electrical Grid (1)
- Glasfaser (1)
- Global Payroll (1)
- Go <Programmiersprache> (1)
- Golang (1)
- Gratings (1)
- Great Britain (1)
- Green House effect (1)
- Grooved Seal (1)
- Ground penetrating radar (1)
- Götz von Berlichingen (1)
- HTTP (1)
- Harness (1)
- Heat transfer (1)
- High Performance Computing (HPC) (1)
- High content measurement (1)
- Hocheffizienzfahrzeug (1)
- Hochleistungsrechnen , Informatik (1)
- Hole pattern seal (1)
- Homomorphe Kryptosysteme (1)
- Homomorphe Verschlüsselung (1)
- Homomorphic Encryption Schemes (1)
- Human Firewewall (1)
- Hybrid approach (1)
- Hydrokultur (1)
- Hydroponic Farming (1)
- Hydroxylierung (1)
- IDS (1)
- IPv6 (1)
- ISMS (1)
- IT-Security (1)
- Identity Management (1)
- Iinsektizide (1)
- Implementation (1)
- Implementierung (1)
- Industrial Sector (1)
- Informatik (1)
- Information Security (1)
- Informationssicherheit (1)
- International Business Consulting (1)
- Internet of Things (1)
- Intrusion Detection (1)
- IoT (1)
- Iron Hand (1)
- Italy (1)
- JavaScript Technologies (1)
- Javascript (1)
- Joining Processes (1)
- Joining processes (1)
- Klebsiella pneumoniae (1)
- Konfigurationen (1)
- Kosten (1)
- Kostenrechnung (1)
- Kostensenkung (1)
- Kryptologie (1)
- Laboratory Exercises (1)
- Lattice Boltzmann Method (1)
- Lean Accounting (1)
- Lean Accounting Transformation (1)
- Lean Management (1)
- Leckage (1)
- Leistungsbedarf (1)
- Linux (1)
- Lithium-Ion (1)
- LoRaWAN (1)
- Logging (1)
- Lohnbuchführung (1)
- Low Carbon network (1)
- MEAN (1)
- MERN (1)
- MEVN (1)
- Machine Firewall (1)
- Machine learning (1)
- Markerless (1)
- Markerlos (1)
- Marktübersicht (1)
- Marokko (1)
- Maschinelles Sehen (1)
- Mass spectrometry (1)
- Massenspektrometrie (1)
- Material Flow (1)
- Maturity Model (1)
- Medizinische Testung (1)
- Microwave integrated circuits (1)
- Microwave integrated circuits Equivalent circuits (1)
- Microwave theory and techniques (1)
- Mikrofon (1)
- MinION-sequencing (1)
- Mobilfunk (1)
- Mobilitätstest (1)
- Morocco (1)
- Motion Capture System (1)
- Multidrug-Resistenz (1)
- NADPH (1)
- Nachhaltigkeit (1)
- Negative Emission Technology (1)
- Neonicotinoiden (1)
- Network-Intrusion-Detection (1)
- Netzintegration (1)
- Netzwerk (1)
- Neuro-Evolution (1)
- Neuronales Netz (1)
- Node.js (1)
- Node.js security (1)
- Non-Reflecting Boundary Conditions (1)
- OSINT (1)
- Open Source (1)
- Open Source Intelligence (1)
- Optical Fiber Network (1)
- Optical Network (1)
- Outsourcing (1)
- Oxford Nanopore Technology (1)
- Oxyfuel (1)
- P450 Cytochrome (1)
- PROFINET (1)
- PandaPower (1)
- Peer-to-peer trading (1)
- Phagetherapy (1)
- Phising detection (1)
- Power Consumption (1)
- Power Quality (1)
- Privacy and Security (1)
- Programmierung (1)
- Progressive Web App (1)
- Projektmanagement (1)
- Proof of Concept (1)
- Propagation losses (1)
- Proteine (1)
- Python Programming (1)
- QCM-D Array (1)
- REST-API (1)
- Ransomware (1)
- Rechnungswesen (1)
- Reinforcement (1)
- Risikomanagement (1)
- Risk Management (1)
- Robotik (1)
- Rotordynamik (1)
- S-parameters (1)
- SMEs (1)
- SOC (1)
- SPC waiver (1)
- STRIDE (1)
- Scientific workflow (1)
- Security Advisories (1)
- Security Operation Center (1)
- Security Operation Centers (1)
- Security Operations Center (1)
- Sequenzanalyse (1)
- Sicherheit (1)
- Signaltechnik (1)
- Slovakia (1)
- Smart Home (1)
- Smart Load Management (1)
- Software Architecture (1)
- Sound (1)
- Spain (1)
- Spiel (1)
- Spiel-Engine (1)
- Sportwissenschaft (1)
- Stack (1)
- Stand Alone (1)
- Start-up Companies (1)
- State of Charge (1)
- Steroid hormone micropollutant (1)
- Steroidhormon (1)
- Strom (1)
- Substrate and product specificity (1)
- Supervised Learning (1)
- Supply Chain Risk Management (1)
- Surveillance (1)
- Suspension (1)
- Sustainability (1)
- TCO (1)
- TLC (1)
- TLV (1)
- TQM (1)
- Technology Stack (1)
- Telemetry (1)
- Temperature control (1)
- Temperature measurement (1)
- Temperaturregelung (1)
- Terminal (1)
- Test-driven development (1)
- Testentwicklung (1)
- Thermal model (1)
- Thread (1)
- Threat Modeling (1)
- Timing Attacks (1)
- Tor (1)
- Total Cost of Ownership (1)
- Total Quality Management (1)
- Trade (1)
- Transducers (1)
- Transmission (1)
- Transmission line matrix methods (1)
- Transmission lines (1)
- Trichoderma reesei (1)
- Ultrafiltration (1)
- Unity3D (1)
- Unsupervised Learning (1)
- Unternehmensgründung (1)
- Unternehmensorganisation (1)
- Unüberwachtes Lernen (1)
- Urformen (1)
- Verdichter (1)
- Verfahrenstechnik (1)
- Vergleich (1)
- Verteiltes System (1)
- Videogame (1)
- Videospiel (1)
- Volkswirtschaft (1)
- Vulnerabilities (1)
- Vulnerability Management (1)
- Vulnerability Tracking (1)
- Vulnerability identification (1)
- Wars (1)
- Wasseraufbereitung (1)
- Water treatment (1)
- Web-Entwicklung (1)
- Webassembly (1)
- Windows (1)
- Wireless Technology (1)
- Wishbone (1)
- Wärmeübertragung (1)
- Xamarin (1)
- Zement (1)
- Zugriffskontrolle (1)
- Zugriffsverwaltung (1)
- access management (1)
- ambiguity (1)
- analysis (1)
- android-security (1)
- artificial neural networks (1)
- audio (1)
- audiometry (1)
- binary (1)
- biochar (1)
- biogas (1)
- cellulase (1)
- certificate management (1)
- circuit CAD (1)
- classification (1)
- climate-neutral (1)
- clothianidon (1)
- cloud business impacts (1)
- community (1)
- computer vision (1)
- confidentiality (1)
- coupled-mode formalism (1)
- cyber attack (1)
- dahua (1)
- data quality (1)
- determinats of FDI (1)
- dielectric resonators (1)
- economic (1)
- economic potential Web development (1)
- electronic engineering computing (1)
- enzymatic pretreatment (1)
- eurocity persons (1)
- fermentation (1)
- financial impacts (1)
- fingerprinting (1)
- front chassis (1)
- hand prosthesis (1)
- high-efficiency vehicle (1)
- hip stem (1)
- honey bee (1)
- honeycomb seal (1)
- identity management (1)
- industrial communication (1)
- lightweight vehicle (1)
- lignocellulosic material (1)
- machine learning (1)
- microphone (1)
- microwave circuits (1)
- mitigations (1)
- moving to cloud (1)
- neonicotinoid (1)
- network layer (1)
- neuroprosthetics (1)
- ns-3 (1)
- pedestrian detection (1)
- permissions (1)
- pharmaceuticals (1)
- privacy (1)
- protocol (1)
- real-time (1)
- replica (1)
- routing (1)
- routing locator (1)
- smooth seal (1)
- sound (1)
- steel industry (1)
- strip line components (1)
- thickness estimation (1)
- thin-layer chromatographie (1)
- throughput (1)
- transmission-matrix approach (1)
- water treatment (1)
- web application security (1)
- zweite "Eiserne Hand" (1)
- Überwachtes Lernen (1)
Institute
- Fakultät Medien (M) (ab 22.04.2021) (29)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (27)
- Fakultät Wirtschaft (W) (24)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (16)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (15)
- IfTI - Institute for Trade and Innovation (13)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (11)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (4)
- INES - Institut für nachhaltige Energiesysteme (2)
- IUAS - Institute for Unmanned Aerial Systems (1)
Open Access
- Closed (49)
- Closed Access (41)
- Open Access (31)
- Diamond (5)
- Gold (1)
Steroid hormones (SHs) are a rising concern due to their high bioactivity, ubiquitous nature, and prolonged existence as a micropollutants in water, they pose a potential risk to both human health and the environment, even at low concentrations. Estrogens, progesterone, and testosterone are the three important types of steroids essential for human development and maintaining multiorgan balance, are focus to this concern. These steroid hormones originate
from various sources, including human and livestock excretions, veterinary medications, agricultural runoff, and pharmaceuticals, contributing to their presence in the environment. According to the recommendation of WHO, the guidance value for estradiol (E2) is 1 ng/L. There are several methods been attempted to remove the SH micropollutant by conventional water and wastewater technologies which are still under research. Among the various methods, electrochemical membrane reactor (EMR) is one of the emerging technologies that can address the challenge of insufficient SHs removal from the aquatic environment by conventional treatment. The degradation of SHs can be significantly influenced by various factors when treated with EMR.
In this project, the removal of SH and the important mechanism for the removal using carbon nanotube CNT-EMR is studied and the efficiency of CNT-EMR in treating the SH micropollutant is identified. By varying different parameters this experiment is carried out with the (PES-CNTs) ultrafiltration membrane. The study is carried out depending upon the SH removal based on the limiting factor such as cell voltage, flux, temperature, concentration, and type of the SH.
This thesis focuses on the development and implementation of a Datagram Transport Layer Security (DTLS) communication framework within the ns-3 network simulator, specifically targeting the LoRaWAN model network. The primary aim is to analyse the behaviour and performance of DTLS protocols across different network conditions within a LoRaWAN context. The key aspects of this work include the following.
Utilization of ns-3: This thesis leverages ns-3’s capabilities as a powerful discrete event network simulator. This platform enables the emulation of diverse network environments, characterized by varying levels of latency, packet loss, and bandwidth constraints.
Emulation of Network Challenges: The framework specifically addresses unique challenges posed by certain network configurations, such as duty cycle limitations. These constraints, which limit the time allocated for data transmission by each device, are crucial in understanding the real-world performance of DTLS protocols.
Testing in Multi-client-server Scenarios: A significant feature of this framework is its ability to test DTLS performance in complex scenarios involving multiple clients and servers. This is vital for assessing the behaviour of a protocol under realistic network conditions.
Realistic Environment Simulation: By simulating challenging network conditions, such as congestion, limited bandwidth, and resource constraints, the framework provides a realistic environment for thorough evaluation. This allows for a comprehensive analysis of DTLS in terms of security, performance, and scalability.
Overall, this thesis contributes to a deeper understanding of DTLS protocols by providing a robust tool for their evaluation under various and challenging network conditions.
Global energy demand is still on an increase during the last decade, with a lot of impact on the climate change due to the intensive use of conventional fossil-based fuels power plants to cover this demand. Most recently, leaders of the globe met in 2015 to come out with the Paris Agreement, stating that the countries will start to take a more responsible and effective behaviour toward the global warming and climate change issues. Many studies have discussed how the future energy system will look like with respecting the countries’ targets and limits of greenhouse gases and their CO2 emissions. However, these studies rarely discussed the industry sector in detail even though it is one of the major role players in the energy sector. Moreover, many studies have simulated and modelled the energy system with huge jumps of intervals in terms of years and environmental goals. In the first part of this study, a model will be developed for the German electrical grid with high spatial and temporal resolutions and different scenarios of it will be analysed meticulously on shorter periods (annual optimization), with different flexibilities and used technologies and degrees of innovations within each scenario. Moreover, the challenge in this research is to adequately map the diverse and different characteristics of the medium-sized industrial sector. In order to be able to take a first step in assessing the relevance of the industrial sector in Germany for climate protection goals, the industrial sector will be mapped in PyPSA-Eur (an open-source model data set of the European energy system at the level of the transmission network) by detailing the demand for different types of industry and assigning flexibilities to the industrial types. Synthetically generated load profiles of various industrial types are available. Flexibilities in the industrial sector are described by the project partner Fraunhofer IPA in the GaIN project and can be used. Using a scenario analysis, the development of the industrial sector and the use of flexibilities are then to be assessed quantitatively.
Linux and Linux-based operating systems have been gaining more popularity among the general users and among developers. Many big enterprises and large companies are using Linux for servers that host their websites, some even require their developers to have knowledge about Linux OS. Even in embedded systems one can find many Linux-based OS that run them. With its increasing popularity, one can deduce the need to secure such a system that many personnel rely on, be it to protect the data that it stores or to protect the integrity of the system itself, or even to protect the availability of the services it offers. Many researchers and Linux enthusiasts have been coming up with various ways to secure Linux OS, however new vulnerabilities and new bugs are always found, by malicious attackers, with every update or change, which calls for the need of more ways to secure these systems.
This Thesis explores the possibility and feasibility of another way to secure Linux OS, specifically securing the terminal of such OS, by altering the commands of the terminal, getting in the way of attackers that have gained terminal access and delaying, giving more time for the response teams and for forensics to stop the attack, minimize the damage, restore operations, and to identify collect and store evidence of the cyber-attack. This research will discuss the advantages and disadvantages of various security measures and compare and contrast with the method suggested in this research.
This research is significant because it paints a better picture of what the state of the art of Linux and Linux-based operating systems security looks like, and it addresses the concerns of security enthusiasts, while exploring new uncharted area of security that have been looked at as a not so significant part of protecting the OSes out of concern of the various limitations and problems it entails. This research will address these concerns while exploring few ways to solve them, as well as addressing the ideal areas and situations in which the proposed method can be used, and when would such method be more of a burden than help if used.
AI-based Ground Penetrating Radar Signal Processing for Thickness Estimation of Subsurface Layers
(2023)
This thesis focuses on the estimation of subsurface layer thickness using Ground Penetrating Radar (GPR) A-scan and B-scan data through the application of neural networks. The objective is to develop accurate models capable of estimating the thickness of up to two subsurface layers.
Two different approaches are explored for processing the A-scan data. In the first approach, A-scans are compressed using Principal Component Analysis (PCA), and a regression feedforward neural network is employed to estimate the layers’ thicknesses. The second approach utilizes a regression one-dimensional Convolutional Neural Network (1-D CNN) for the same purpose. Comparative analysis reveals that the second approach yields superior results in terms of accuracy.
Subsequently, the proposed 1-D CNN architecture is adapted and evaluated for Step Frequency Continuous Wave (SFCW) radar, expanding its applicability to this type of radar system. The effectiveness of the proposed network in estimating subsurface layer thickness for SFCW radar is demonstrated.
Furthermore, the thesis investigates the utilization of GPR B-scan images as input data for subsurface layer thickness estimation. A regression CNN is employed for this purpose, although the results achieved are not as promising as those obtained with the 1-D CNN using A-scan data. This disparity is attributed to the limited availability of B-scan data, as B-scan generation is a resource-intensive process.
One of the main problematics of the seals tests is the time and money consuming they are. Up to now, there are few tries to do a digitalisation of a test where the seals behaviour can be known.
This work aims to digitally reproduce a seal test to extract their behaviour when working under different operation conditions to see their impact on the pimp’s efficiency. In this thesis, due to the Lomaking effect, the leakage and the forces applied on the stator will be the base of analysis.
First of all, among all the literature available for very different kind of seals and inner patterns, it has been chosen the most appropriate and precise data. The data chosen is “Test results for liquid Damper Seals using a Round-Hole Roughness Pattern for the Stator” from Fayolle, P. and “Static and Rotordynamic Characteristics of Liquid Annular Seals with Circumferentially/Grooved Stator and Smooth Rotor using three levels of circumferential Inlet-Fluid” from Torres J.M.
From the literature, dimensions of the test rig and the seals will be extracted to model them into a 3D CAD software. With the 3D CAD digitalisation, the fluid volumes for a rotor-centred position, meaning without eccentricity, will be extracted, and used. The following components have been modelled:
- Smooth Annular Liquid Seal (Grooved Rotor)
- Grooved Annular Liquid Seal (Smooth Rotor)
- Round-Hole Pattern Annular Liquid Seal (𝐻𝑑=2 𝑚𝑚) (Smooth Rotor)
- Straight Honeycomb Annular Liquid Seal (Smooth Rotor)
- Convergent Honeycomb Annular Liquid Seal (Smooth Rotor)
- Smooth Rotor / Smooth Annular Liquid Seal (Smooth Rotor)
As there is just one test rig, all the components have been adapted to the different dimensions of the seals by referencing some measures. This allows to test any seal with the same test rig.
Afterwards a CFD simulation that will be used to obtain leakage and stator forces. The parameters that will be changed are the rotational velocity of the fluid (2000 rpm, 4000 rpm, and 6000 rpm) and the pressure drop (2,068 bar, 4,137 bar, 6,205 bar, and 8,274 bar).
Those results will be compared to the literature ones, and they will determine if digitalisation can be validated or not. Even though the relative error is higher than 5% but the tendency is the same and it is thought that by changing some parameters the test results can be even closer to the literature ones.
On a regular basis, we hear of well-known online services that have been abused or compromised as a result of data theft. Because insecure applications jeopardize users' privacy as well as the reputation of corporations and organizations, they must be effectively secured from the outset of the development process. The limited expertise and experience of involved parties, such as web developers, is frequently cited as a cause of risky programs. Consequently, they rarely have a full picture of the security-related decisions that must be made, nor do they understand how these decisions affect implementation accurately.
The selection of tools and procedures that can best assist a certain situation in order to protect an application against vulnerabilities is a critical decision. Regardless of the level of security that results from adhering to security standards, these factors inadvertently result in web applications that are insufficiently secured. JavaScript is a language that is heavily relied on as a mainstream programming language for web applications with several new JavaScript frameworks being released every year.
JavaScript is used on both the server-side in web applications development and the client-side in web browsers as well.
However, JavaScript web programming is based on a programming style in which the application developer can, and frequently must, automatically integrate various bits of code from third parties. This potent combination has resulted in a situation today where security issues are frequently exploited. These vulnerabilities can compromise an entire server if left unchecked. Even though there are numerous ad hoc security solutions for web browsers, client-side attacks are also popular. The issue is significantly worse on the server side because the security technologies available for server-side JavaScript application frameworks are nearly non-existent.
Consequently, this thesis focuses on the server-side aspect of JavaScript; the development and evaluation of robust server-side security technologies for JavaScript web applications. There is a clear need for robust security technologies and security best practices in server-side JavaScript that allow fine-grained security.
However, more than ever, there is this requirement of reducing the associated risks without hindering the web application in its functionality.
This is the problem that will be tackled in this thesis: the development of secure security practices and robust security technologies for JavaScript web applications, specifically, on the server-side, that offer adequate security guarantees without putting too many constraints on their functionality.
The present document is aimed to propose a suitable thermal model for the cooling down process of a one piston air cooled reciprocating compressor. In order to achieve this, a thermographic camera is used to record the temperature of different measuring points throughout different operating conditions. This data is later analyzed, with statistical tools and graphical visualization. The thermal phenomena present in the thermal process is characterized according to the compressors' geometry. Finally, using the analysis and taking into consideration the thermal phenomena the optimal thermal model is selected. This paper belongs to a bigger project and the last step is to simulate the compressor and the accuracy of the proposed model.
The progress in machine learning has led to advanced deep neural networks. These networks are widely used in computer vision tasks and safety-critical applications. The automotive industry, in particular, has experienced a significant transformation with the integration of deep learning techniques and neural networks. This integration contributes to the realization of autonomous driving systems. Object detection is a crucial element in autonomous driving. It contributes to vehicular safety and operational efficiency. This technology allows vehicles to perceive and identify their surroundings. It detects objects like pedestrians, vehicles, road signs, and obstacles. Object detection has evolved from being a conceptual necessity to an integral part of advanced driver assistance systems (ADAS) and the foundation of autonomous driving technologies. These advancements enable vehicles to make real-time decisions based on their understanding of the environment, improving safety and driving experiences. However, the increasing reliance on deep neural networks for object detection and autonomous driving has brought attention to potential vulnerabilities within these systems. Recent research has highlighted the susceptibility of these systems to adversarial attacks. Adversarial attacks are well-designed inputs that exploit weaknesses in the deep learning models underlying object detection. Successful attacks can cause misclassifications and critical errors, posing a significant threat to the functionality and safety of autonomous vehicles. With the rapid development of object detection systems, the vulnerability to adversarial attacks has become a major concern. These attacks manipulate inputs to deceive the target system, significantly compromising the reliability and safety of autonomous vehicles. In this study, we focus on analyzing adversarial attacks on state-of-the-art object detection models. We create adversarial examples to test the models’ robustness. We also check if the attacks work on a different object detection model meant for similar tasks. Additionally, we extensively evaluate recent defense mechanisms to see how effective they are in protecting deep neural networks (DNNs) from adversarial attacks and provide a comprehensive overview of the most commonly used defense strategies against adversarial attacks, highlighting how they can be implemented practically in real-world situations.
Much of the research in the field of audio-based machine learning has focused on recreating human speech via feature extraction and imitation, known as deepfakes. The current state of affairs has prompted a look into other areas, such as the recognition of recording devices, and potentially speakers, by only analysing sound files. Segregation and feature extraction are at the core of this approach.
This research focuses on determining whether a recorded sound can reveal the recording device with which it was captured. Each specific microphone manufacturer and model, among other characteristics and imperfections, can have subtle but compounding effects on the results, whether it be differences in noise, or the recording tempo and sensitivity of the microphone while recording. By studying these slight perturbations, it was found to be possible to distinguish between microphones based on the sounds they recorded.
After the recording, pre-processing, and feature extraction phases we completed, the prepared data was fed into several different machine learning algorithms, with results ranging from 70% to 100% accuracy, showing Multi-Layer Perceptron and Logistic Regression to be the most effective for this type of task.
This was further extended to be able to tell the difference between two microphones of the same make and model. Achieving the identification of identical models of a microphone suggests that the small deviations in their manufacturing process are enough of a factor to uniquely distinguish them and potentially target individuals using them. This however does not take into account any form of compression applied to the sound files, as that may alter or degrade some or most of the distinguishing features that are necessary for this experiment.
Building on top of prior research in the area, such as by Das et al. in in which different acoustic features were explored and assessed on their ability to be used to uniquely fingerprint smartphones, more concrete results along with the methodology by which they were achieved are published in this project’s publicly accessible code repository.
Total Cost of Ownership (TCO) is a key tool to have a complete understanding of the costs associated with an investment, as it allows to analyze not only the initial acquisition costs, but also the long-term costs related to operation, maintenance, depreciation, and other factors. In the context of the cement industry, TCO is especially important due to the complexity of the production processes and the wide variety of components and machinery involved in the process.
For this reason, a TCO analysis for the cement industry has been conducted in this study, with the objective of showing the different components of the cost of production. This analysis will allow the reader to gain knowledge about these costs, in the industrial model will be to make informed decisions on the adoption of technologies and practices that will allow them to reduce costs in the long run and improve their operational efficiency.
In particular, this study pursues to give visibility to technologies and practices that enable the reduction of carbon emissions in cement production, thus contributing to the sustainability of industry and the protection of the environment. By being at the forefront of sustainability issues, the cement industry can contribute to the achievement of environmentally friendly technologies and enable the development of people and industry.
The Oxyfuel technology has been selected as a carbon capture solution for the cement industry due to its practical application, low costs, and practical adaptation to non-capture processes. The adoption of this technology allows for a significant reduction in CO2 emissions, which is a crucial factor in achieving sustainability in the cement manufacturing process.
Carbon capture storage technologies represent a high investment, although these technologies increase the cost of production, the application of Oxyfuel technology is one of the most economically viable as the cheapest technology per capture according to the comparison. However, this price increase is a technical advantage as the carbon capture efficiency of this technology reaches 90%. This level of efficiency leads to a decrease in taxes for the generation of CO2 emissions, making the cement manufacturing process sustainable.
Schluckspecht project
(2022)
The objective of this thesis is the conceptual design of a battery management system for the first prototype of the UWC (University of the Western Cape) Modular Battery System. The battery system is a lithium-ion battery that aims to be used in renewable energy systems and for niche electric vehicles such as golf carts.
The concept that is introduced in this thesis comprises the parameter monitoring, the safety management and has its main focus on an accurate state of charge estimation.
Another battery system that was already implemented is used as base for the parameter monitoring and the safety management for the new battery management system. In contrast to that, the concept for the state of charge estimation must be developed completely.
Different methods for the state of charge estimation which are based on the measured voltage, current and temperature are discussed, evaluated and the chosen method is conceived in this thesis. The method used for the state of charge estimation is different for the time when the battery is active than when it is inactive. During charge and discharge Coulomb counting is used and when the cell is inactive voltage versus state of charge lookup tables are used to update the estimation.
To have an accurate estimation when the cell is inactive only for a short time, a model of the voltage relaxation is used to predict the voltage when the cells are in equilibrium. This allows the algorithm to reset the state of charge that is estimated by Coulomb counting – which tends to have a growing error over time – frequently.
To evaluate the accuracy of the voltage prediction, cell tests were executed where the voltage relaxation was sampled. The recursive least square method to predict the end voltage was tested with a MATLAB programme. With the help of voltage versus state of charge lookup tables it was possible to determine the state of charge accuracy with the accuracy of the voltage prediction.
To date, many experiments have been performed to study how the internal geometrical shapes of the annular liquid seal can reduce internal leakage and increase pump efficiency. These can be time-consuming and expensive as all rotordynamic coefficients must be determined in each case.
Nowadays, accurate simulation methods to calculate rotordynamic coefficients of annular seals are still rare. Therefore, new numerical methods must be designed and validated for annular seals.
The present study aims to contribute to this labour by providing a summary of the available test rig and seals dimensions and experimental results obtained in the following experiments:
− Kaneko, S et al., Experimental Study on Static and Dynamic Characteristics of Liquid Annular Convergent-Tapered Seals with Honeycomb Roughness Pattern (2003) [1] − J. Alex Moreland, Influence of pre-swirl and eccentricity in smooth stator/grooved rotor liquid annular seals, static and rotordynamic characteristics (2016) [2]
A 3D CAD simulation with Siemens NX Software of the test rig used in J. Alex Moreland’s experiment has been made. The following annular liquid seals have also been 3D modelled, as well as their fluid volume:
− Smooth Annular Liquid Seal (SS/GR) (J. Alex Moreland experiment)
− Grooved Annular Liquid Seal (GS/SR)
− Round-Hole Pattern Annular Liquid Seal (𝐻𝑑=2 mm) (GS/SR)
− Straight Honeycomb Annular Liquid Seal (GS/SR)
− Convergent Honeycomb Annular Liquid Seal (No. 3) (GS/SR)
− Smooth Annular Liquid Seal (SS/SR) (S. Kaneko experiment)
In the case of the seals used in S. Kaneko’s experiments, the test rig has been adapted to each seal, defining interpart expressions which can be easily modified.
Afterwards, it has been done a CFD simulation of the Smooth Annular Liquid Seal using Ansys CFX Software. To do so, the fluid volume geometry has been simplified to do a first approximation. Results have been compared for an eccentricity 𝜀0=0.00 for the following ranges of rotor speeds and differential of pressure:
− Δ𝑃= 2.07, 4.14, 6.21, and 8.27 bar,
− 𝜔= 2, 4, 6 and 8 krpm.
Even results obtained have the same trend as the one proportionated by the literature, they cannot be validated as the error is above 5%. It is also observed that as the pressure drop increases, the relative error decreases considerably.
The COVID-19 pandemic has led to an economic downturn in the Slovak Republic. To bridge corporate liquidity problems the Slovakian Government has introduced several support measures. The investigation discusses the effectiveness of the measures imposed. Based on theoretical foundations, the research question is empirically examined by using a qualitative expert survey. As the automotive industry plays a leading role in Slovakia, the research conducted is oriented towards the financing phases, a typical automotive exporter is undergoing. As a result of the research, bridging loans and government grants were identified as the most important measures. Additionally, tendencies towards political recommendations for action were identified. The research explored, that the Slovakian Government should focus on meeting the short-term liquidity needs, boosting exports and promoting innovation as well as considering a support package for the automotive industry.
How can manufacturers or service companies provide better services with connected products, without having acquired a powerful IT infrastructure nor the competences for software development?
Today companies can appeal to a relocated-IT-infrastructure provider, which is called Cloud.
Consequently, they do not have to manage and take care of the safety/security aspect, the updates and the breakdown of the infrastructure internally, as those are all managed by the provider.
It is possible to outsource the development of the software of the connected product to an external company. However, the question now is how fast this company can juggle from one Cloud to another in order to fulfil their clients wishes?
neverMind offers a solution based on a multi-protocols-platform linking the different connected products to a multitude of Clouds without having to redesign the whole communication stack/building block for each change in the Cloud-solution. This is the object of my thesis.
The development follows the V-Model, the first steps to understand the complexity of the project were the realisation of the product technical and architectural specifications. The last step before the Implementation was to design in details the progress and the process of every parts of the platform.
The outcome of the requirements analysis led me to divide the project in two parts:
• a “General Interface” acting as a gateway between the Client-application and “Cloud-modules”
• the “Cloud-modules” themselves.
So far, the specifications are drown up; the General Interface and a client example are coded, as well as a first Cloud-module template.
The objective of this thesis is the quantification and qualification of neonicotinoid insecticides using thin-layer chromatography (TLC). Neonicotinoids are a relatively new form of pesticides, which have been proven to be extremely lethal to the honey bee, Apis mellifera. In this paper six forms of neonicotinoid insecticides (i.e. Acetamiprid, Thiacloprid, Imidacloprid, Clothianidin, Thaimethoxam, and Nitenpyram) are analysed. The initial steps are to first find a suitable mobile phase eluent, followed by the search for a reagent causing a luminescence effect of the neonicotinoids on a TLC plate. Subsequently, a calibration method is then used to find the detection limit of this TLC experiment. The aim is, therefore, to achieve a standard method of quantifying and qualifying neonicotinoids via TLC. Whilst a suitable mobile phase has been established, an optimal fluorescent reagent has yet to be found and more research on the subject must be carried out.
In the field of network security, the detection of intrusions is an important task to prevent and analyse attacks.
In recent years, an increasing number of works have been published on this subject, which perform this detection based on machine learning techniques.
Thereby not only the well-studied detection of intrusions, but also the real-time capability must be considered.
This thesis addresses the real-time functionality of machine learning based network intrusion detection.
For this purpose we introduce the network feature generator library PyNetFlowGen, which is designed to allow real-time processing of network data.
This library generates 83 statistical features based on reassembled data flows.
The introduced performant Cython implementation allows processing individual packets within 4.58 microseconds.
Based on the generated features, machine learning models were examined with regard to their runtime and real-time capabilities.
The selected Decision-Tree-Classifier model created in Python was further optimised by transpiling it into C-Code, what reduced the prediction time of a single sample to 3.96 microseconds on average.
Based on the feature generator and the machine learning model, an basic IDS system was implemented, which allows a data throughput between 63.7 Mbit/s and 2.5 Gbit/s.
The identification of vulnerabilities is an important element of the software development process to ensure the security of software. Vulnerability identification based on the source code is a well studied field. To find vulnerabilities on the basis of a binary executable without the corresponding source code is more challenging. Recent research has shown how such detection can be performed statically and thus runtime efficiently by using deep learning methods for certain types of vulnerabilities.
This thesis aims to examine to what extent this identification can be applied sufficiently for a variety of vulnerabilities. Therefore, a supervised deep learning approach using recurrent neural networks for the application of vulnerability detection based on binary executables is used. For this purpose, a dataset with 50,651 samples of 23 different vulnerabilities in the form of a standardised LLVM Intermediate Representation was prepared. The vectorised features of a Word2Vec model were then used to train different variations of three basic architectures of recurrent neural networks (GRU, LSTM, SRNN). For this purpose, a binary classification was trained for the presence of an arbitrary vulnerability, and a multi-class model was trained for the identification of the exact vulnerability, which achieved an out-of-sample accuracy of 88% and 77%, respectively. Differences in the detection of different vulnerabilities were also observed, with non-vulnerable samples being detected with a particularly high precision of over 98%. Thus, the methodology presented allows an accurate detection of vulnerabilities, as well as a strong limitation of the analysis scope for further analysis steps.
Cloud computing is a combination of technologies, including grid computing and distributed computing, that use the Internet as a network for service delivery. Organizations can select the price and service models that best accommodate their demands and financial restrictions. Cloud service providers choose the pricing model for their cloud services, taking the size, usage, user, infrastructure, and service size into account. Thus, cloud computing’s economic and business advantages are driving firms to shift more applications to the cloud, boosting future development. It enlarges the possibilities of current IT systems.
Over the past several years, the ”cloud computing” industry has exploded in popularity, going from a promising business concept to one of the fastest expanding areas of the IT sector. Most enterprises are hosting or installing web services in a cloud architecture for management simplicity and improved availability. Virtual environments are applied to accomplish multi-tenancy in the cloud. A vulnerability in a cloud computing environment poses a direct threat to the users’ privacy and security. In our digital age, the user has many identities. At all levels, access rights and digital identities must be regulated and controlled.
Identity and access management(IAM) are the process of managing identities and regulating access privileges. It is considered as a front-line soldier of IT security. It is the goal of identity and access management systems to protect an organization’s assets by limiting access to just those who need it and in the appropriate cases. It is required for all businesses with thousands of users and is the best practice for ensuring user access control. It identifies, authenticates, and authorizes people to access an organization’s resources. This, in turn, enhances access management efficiency. Authentication, authorization, data protection, and accountability are just a few of the areas in which cloud-based web services have security issues. These features come under identity and access management.
The implementation of identity and access management(IAM) is essential for any business. It’s becoming more and more business-centric, so we need more than technical know-how to succeed. Organizations may save money on identity management and, more crucially, become much nimbler in their support of new business initiatives if they have developed sophisticated IAM capabilities. We used these features of identity and access management to validate the robustness of the cloud computing environment with a comparison of traditional identity and access management.