Refine
Year of publication
Document Type
- Master's Thesis (66)
- Bachelor Thesis (29)
- Study Thesis (13)
- Conference Proceeding (8)
- Article (reviewed) (6)
- Book (1)
- Other (1)
Conference Type
- Konferenzartikel (4)
- Konferenzband (4)
Language
- English (124) (remove)
Is part of the Bibliography
- no (124) (remove)
Keywords
- COVID-19 (13)
- Government Measures (13)
- Corona (9)
- Crisis (8)
- IT-Sicherheit (8)
- Export (7)
- Maschinelles Lernen (5)
- Deep learning (4)
- Communication Systems (3)
- Computersicherheit (3)
Institute
- Fakultät Medien (M) (ab 22.04.2021) (31)
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (28)
- Fakultät Wirtschaft (W) (24)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (16)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (15)
- IfTI - Institute for Trade and Innovation (13)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (11)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (4)
- INES - Institut für nachhaltige Energiesysteme (2)
- IUAS - Institute for Unmanned Aerial Systems (1)
Open Access
- Closed (52)
- Closed Access (41)
- Open Access (31)
- Diamond (5)
- Gold (1)
The embedding of microwave devices is treated by applying the finite-difference method to three-dimensional shielded structures. A program package was developed to evaluate electromagnetic fields inside arbitrary transmission-line connecting structures and to compute the scattering matrix. The air bridge, the transition through a wall, and the bond wire are examined as interconnecting structures. Detailed results are given and discussed regarding the fundamental behavior of embedding.
Structures for interconnecting active microwave semiconductor-devices, e.g. FET's and MIC's, with the electrical surrounding or with each other have to be designed more and more carefully when increasing the desired upper frequency limit. Therefore, several connecting structures for device embedding have been examined. Mainly, their applicability for the frequency range from 10 GHz to 100 GHz was considered. Additionally, different equivalent circuits were developed to approximately describe their behaviour for CAD-applications.
It is demonstrated that microwave structures incorporating dielectric resonators (DR) are accurately characterised by means of a 3-dimensional finite-difference CAD package. All major assumptions made so far have been dropped, offering the possibility of a rigorous analysis of the embedding of dielectric resonators into microwave structures. In particular, a finite thickness for the microstrip conductor has been taken into account. The coupling of the DR to a microstrip placed in a metallic housing has been theoretically and experimentally investigated. Theoretical and experimental results are in good agreement and give new insight into DR coupling to microstrip circuits.
The advantages of the coupling-of-modes (COM) formalism and the transmission-matrix approach are combined to create exact and computationally efficient analysis and synthesis CAD tools for the design of SAW-resonator filters. The models for the filter components, especially gratings, interdigital transducers (IDTs). and multistrip couplers (MSCs), are based on the COM approach, which delivers closed-form expressions. In order to determine the relevant COM parameters, the integrated COM differential equations are compared with analytically derived expressions from the transmission-matrix approach. The most important second-order effects such as energy storage, propagation loss and mechanical and electrical loading are fully taken into account. As an example, the authors investigate a two-pole, acoustically coupled resonator filter at 914.5 MHz on AT quartz. Excellent agreement between theory and measurement is found.
The advantages of the coupled-mode (COM) formalism and the transmission-matrix approach are combined in order to create exact and computationally efficient analysis and synthesis tools for the design of coupled surface acoustic wave resonator filters. The models for the filter components, in particular gratings, interdigital transducers (IDTs) and multistrip couplers (MSCs), are based on the COM approach that delivers closed-form expressions. To determine the pertinent COM parameters, the COM differential equations are solved and the solution is compared with analytically derived expressions from the transmission-matrix approach and the Green's function method. The most important second-order effects, such as energy storage, propagation loss, and mechanical and electrical loading, are fully taken into account. As an example, a two-pole, acoustically coupled resonator filter at 914.5 MHz on AT quartz is investigated. Excellent agreement between theory and measurement is found.
This Master's Thesis discusses intelligent sensor networks considering autonomous sensor placement strategies and system health management. Sensor networks for an intelligent system design process have been researched recently. These networks consist of a distributed collective of sensing units, each with the abilities of individual sensing and computation. Such systems can be capable of self-deployment and must be scalable, long-lived and robust. With distributed sensor networks, intelligent sensor placement for system design and online system health management are attractive areas of research. Distributed sensor networks also cause optimization problems, such as decentralized control, system robustness and maximization of coverage in a distributed system. This also includes the discovery and analysis of points of interest within an environment. The purpose of this study was to investigate a method to control sensor placement in a world with several sources and multiple types of information autonomously. This includes both controlling the movement of sensor units and filtering of the gathered information depending on individual properties to increase system performance, defined as a good coverage. Additionally, online system health management was examined in this study regarding the case of agent failures and autonomous policy reconfiguration if sensors are added to or removed from the system. Two different solution strategies were devised, one where the environment was fully observable, and one with only partial observability. Both strategies use evolutionary algorithms based on artificial neural networks for developing control policies. For performance measurement and policy evaluation, different multiagent objective functions were investigated. The results of the study show that in the case of a world with multiple types of information, individual control strategies performed best because of their abilities to control the movement of a sensor entity and to filter the sensed information. This also includes system robustness in case of sensor failures where other sensing units must recover system performance. Additionally, autonomous policy reconfiguration after adding or removing of sensor agents was successful. This highlights that intelligent sensor agents are able to adapt their individual control policies considering new circumstances.
The objective of this thesis is the quantification and qualification of neonicotinoid insecticides using thin-layer chromatography (TLC). Neonicotinoids are a relatively new form of pesticides, which have been proven to be extremely lethal to the honey bee, Apis mellifera. In this paper six forms of neonicotinoid insecticides (i.e. Acetamiprid, Thiacloprid, Imidacloprid, Clothianidin, Thaimethoxam, and Nitenpyram) are analysed. The initial steps are to first find a suitable mobile phase eluent, followed by the search for a reagent causing a luminescence effect of the neonicotinoids on a TLC plate. Subsequently, a calibration method is then used to find the detection limit of this TLC experiment. The aim is, therefore, to achieve a standard method of quantifying and qualifying neonicotinoids via TLC. Whilst a suitable mobile phase has been established, an optimal fluorescent reagent has yet to be found and more research on the subject must be carried out.
Researchers are developing new GNSS receivers and antennas based on an innovative signal-processing scheme to significantly improve GNSS tracking reliability and accuracy under degraded signal conditions. It is based on the principles of synthetic-aperture radar. Like in a multi-antenna phased array receiver, GNSS signals from different spatial locations are combined coherently forming an optimized synthetic antenna-gain pattern. The method is implemented in a real-time PC-based software receiver and works with GPS, GLONASS, and Galileo signals. Multiple frequencies are generally supported. The idea of synthetic-aperture processing is realized as a coherent summation of correlation values of each satellite over the so-called beamforming interval. Each correlation value is multiplied with a phase factor. For example, the phase factor can be chosen to compensate for the relative antenna motion over the beam-forming interval and the resulting sum of the scaled correlation values represents a coherent correlation value maximizing the line of sight signal power.
G.R.E.C is a adventure game, set in an dystopien industrial world, where you are a scavenger for hire. Explore the village of Vankhart Valley and grab everything valuable you can get your hands on.
Your trusty old jump boots will help you avoiding the nasty and deadly spores that changed the world of G.R.E.C forever.
This thesis deals with the implementation of character controls and combat system of the Action Adventure 'Scout 3D'. The game development was realized with the game engine Unity 3D. In the first part, the architecture of a typical game engine is explained. The single components are describes step by step. Then, five well-known game engines are compared and evaluated. In the next chapter, a short overview about design and architecture patterns is worked out. The features of Unity, that are used for the implementation, and Unity's animation system 'Mecanim, are described finally. The second part includes the requirement definitions for the game 'Scout COD' which define player input, different conditions that allow or disallow several activities and the behaviour of enemies. With the help of patterns the architecture of the game is designed. Then, the implementation is explained by means of code snippets.
The objective of this thesis is the conceptual design of a battery management system for the first prototype of the UWC (University of the Western Cape) Modular Battery System. The battery system is a lithium-ion battery that aims to be used in renewable energy systems and for niche electric vehicles such as golf carts.
The concept that is introduced in this thesis comprises the parameter monitoring, the safety management and has its main focus on an accurate state of charge estimation.
Another battery system that was already implemented is used as base for the parameter monitoring and the safety management for the new battery management system. In contrast to that, the concept for the state of charge estimation must be developed completely.
Different methods for the state of charge estimation which are based on the measured voltage, current and temperature are discussed, evaluated and the chosen method is conceived in this thesis. The method used for the state of charge estimation is different for the time when the battery is active than when it is inactive. During charge and discharge Coulomb counting is used and when the cell is inactive voltage versus state of charge lookup tables are used to update the estimation.
To have an accurate estimation when the cell is inactive only for a short time, a model of the voltage relaxation is used to predict the voltage when the cells are in equilibrium. This allows the algorithm to reset the state of charge that is estimated by Coulomb counting – which tends to have a growing error over time – frequently.
To evaluate the accuracy of the voltage prediction, cell tests were executed where the voltage relaxation was sampled. The recursive least square method to predict the end voltage was tested with a MATLAB programme. With the help of voltage versus state of charge lookup tables it was possible to determine the state of charge accuracy with the accuracy of the voltage prediction.
Distributed Flow Control and Intelligent Data Transfer in High Performance Computing Networks
(2015)
This document contains my master thesis report, including problem definition, requirements, problem analysis, review of current state of the art, proposed solution,
designed prototype, discussions and conclusion.
During this work we propose a collaborative solution to run different types of operations in a broker-less network without relying on a central orchestrator.
Based on our requirements, we define and analyze a number of scenarios. Then we design a solution to address those scenarios using a distributed workflow management approach. We explain how we break a complicated operation into simpler parts and how we manage it in a non-blocking and distributed way. Then we show how we asynchronously launch them on the network and how we collect and aggregate results. Later on we introduce our prototype which demonstrates the proposed design.
Quarz crystal microbalances allow the monitoring of the adsorption process of mass from a liquid to their surface. The adsorbed mass can be analysed regarding to its protein content using mass spectromety. To ensure the protein identification the results of several measurements can be combined. A high content QCM-D array was developed to allow up to ten measurements parallel. The samples can be routed inside the array distributing one sample to several chips. The fluidic parts were prototyped using 3D printing. The assembled array was tight and the sample routing function could be demonstrated. A temperature controller was developed and implemented. The parameters for the PID controller were determined and the controller was shown to be able to keep the temperature constant over long time with high accuracy.
Android is the most popular mobile operating system. Its omnipresence leads to the fact that it is also the most popular target amongst malware developers and other computer criminals. Hence, this thesis shows the security-relevant structures of Android’s system and application architecture. Furthermore, it provides laboratory exercises on various security-related issues to understand them not only theoretically but also deal with them in a practical way. In order to provide infrastructure-independent education, the exercises are based on Android Virtual Devices (AVDs).
Die Vision vom "Internet der Dinge" prägt seit Jahren Forschung und Entwicklung, wenn es um smarte Technologien und die Vernetzung von Geräten geht. In der Zukunft wird die reale Welt zunehmend mit dem Internet verknüpft, wodurch zahlreiche Gegenstände (Dinge) des normalen Alltags dazu befähigt werden, zu interagieren und sowohl online als auch autark zu kommunizieren. Viele Branchen wie Medizin, Automobilbau, Energieversorgung und Unterhaltungselektronik sind gleichermaßen betroffen, wodurch trotz Risiken auch neues wirtschaftliches Potential entsteht. Im Bereich "Connected Home" sind bereits Lösungen vorhanden, mittels intelligenter Vernetzung von Haushaltsgeräten und Sensoren, die Lebensqualität in den eigenen vier Wänden zu erhöhen. Diese Arbeit beschäftigt sich mit dem Thread Protokoll; einer neuen Technologie zur Integration mehrerer Kommunikationsschnittstellen innerhalb eines Netzwerks. Darüber hinaus wird die Implementierung auf Netzwerkebene (Network Layer) vorgestellt, sowie aufbereitete Informationen bezüglich verwendeter Technologien dargestellt.
Singapore’s success in transforming itself from a poor, vulnerable economy to one of the richest countries in the world (IMF, 2016) is nothing short of inspirational to many small economies around the globe. Given its lack of resources, Singapore relied upon foreign investors to fuel its growth not only through cash injection into the economy in the form of Foreign Direct Investments (FDI) but also to help upgrade its skills and technological stock. This study looks at how Singapore inspired many Multi-National Corporations (MNCs) into pouring a large sum of investments into this small ailing citystate and if this idea can be generalized to apply it in other economies, especially in Oman.
In a bid to explain the large flow of Capital into an economy, this study moves on further to review most prominent literature in the field since Macdougall (1958) first laid the groundwork for the subsequent theories on FDI. Based on the review of several previous studies, the most significant determinants of FDI were found to be government policy and political stability, inflation rate as a proxy for economic stability, quality of infrastructure and institutions, market size of the host country, openness to trade, tax policies and access to low cost factors of production.
Through a case study method with the inductive approach, this study finds that Singapore excels in all of the determinants of FDI except for the market size of the host country and access to low-cost factors of production. However, it more than compensates for these shortcomings with its strategic geographical location and numerous bilateral and regional trade agreements that give it access to markets around the region. Oman like Singapore ranks well in many of these determinants that make it a potential destination for investment. However, the sultanate could gain more interest from the MNC’s to help its growth by optimizing its policies to lower existing barriers, easing immigration laws to meet the short term skill shortage, allowing for 100 percent foreign ownership, allowing for more liberal property rights, working to improve corruption perception and opting for more trade agreements to give it easy access to larger markets. Moreover, the economy’s heavy reliance on hydrocarbon exports is seen as a major risk by investors as it creates an economic vulnerability which could potentially overshadow many other benefits of investing in the sultanate. Besides the aforementioned determinants, a lot also depends on the success of Oman’s diversification plans.
How can manufacturers or service companies provide better services with connected products, without having acquired a powerful IT infrastructure nor the competences for software development?
Today companies can appeal to a relocated-IT-infrastructure provider, which is called Cloud.
Consequently, they do not have to manage and take care of the safety/security aspect, the updates and the breakdown of the infrastructure internally, as those are all managed by the provider.
It is possible to outsource the development of the software of the connected product to an external company. However, the question now is how fast this company can juggle from one Cloud to another in order to fulfil their clients wishes?
neverMind offers a solution based on a multi-protocols-platform linking the different connected products to a multitude of Clouds without having to redesign the whole communication stack/building block for each change in the Cloud-solution. This is the object of my thesis.
The development follows the V-Model, the first steps to understand the complexity of the project were the realisation of the product technical and architectural specifications. The last step before the Implementation was to design in details the progress and the process of every parts of the platform.
The outcome of the requirements analysis led me to divide the project in two parts:
• a “General Interface” acting as a gateway between the Client-application and “Cloud-modules”
• the “Cloud-modules” themselves.
So far, the specifications are drown up; the General Interface and a client example are coded, as well as a first Cloud-module template.
The core logging and tracing facility in Windows operating system is called Event Tracing for Windows (ETW).
Data sources providing events for ETW are instrumented all over the operating system.
That means most hard- and software assets in a Windows system are instrumented with ETW and so are able to contribute low-level information.
ETW can be used by developers and administrators to get low-level information about operating system's activity.
We describe existing tools to interact with the ETW faciltity and evaluate them based on defined criteria.
Based on relevant application scenarios, we show the richness of informational content for debugging or detecting security incidents with ETW.
The widely used instrumentation of ETW in the operating system and its application results also in security risks according to confidentiality.
Based on common ETW providers we show the impact to confidentiality what ETW offers an adversary.
At the end we evaluate solutions and approaches for a customizable telemetry infrastructure using ETW in large-scale environments.
The development of secure software systems is of ever-increasing importance. While software companies often invest large amounts of resources into the upkeeping and general security properties of large-scale applications when in production, they appear to neglect utilizing threat modeling in the earlier stages of the software development lifecycle. When applied during the design phase of development, and continuously during development iterations, threat modeling can help in following a “Security by Design” approach. This approach allows issues relating to IT security to be found early during development, reducing the need for later improvement – and thus saving resources in the long term. In this thesis the current state of threat modeling is investigated. Based on this analysis, requirements for a new tool are derived. These requirements are then used to develop a new tool, called OVVL, which utilizes all main components of current threat modeling methodologies, as well as functionality not available in existing solutions. After documenting the development process and OVVL in general, this newly developed tool is used to conduct two case studies in the field of e-commerce and IoT.
This paper describes a project absolved to increase the material flow through the LTCC production of the Bosch Anderson Plant in South Carolina, USA. To archive this goal the regarded value stream is introduced first. The bottleneck, which is limiting the material flow is found and eliminated in order to increase the output of the machine and consequently improve the material flow through the whole value stream. The completed projects made for this purpose result in a 13% increase. To control the material flow the inventory sizes are determined. The inventories, from which the size is desired to be determined, include climatization processes to dry the pastes that are applied in the previous process steps. Therefore, a separation of the parts in the production process climatization and the buffer is necessary first. After that the buffer can be eliminated and the inventory areas minimized. The results are smaller and controlled buffer sizes that make part of the floor space unnecessary. A welcomed side effect is the solution to a production problem of warped parts because of too long climatization times. Observations over time show that the results of the buffer limitations are just right to improve the material flow through the LTCC production.
Webassembly is a new technology to create application in a new way. Webassembly is being developed since 2017 by the worldwide web consortium (w3c). The primary task of webassembly is to improve web applications.
Today, more and more applications are being created as web applications. Web applications have some advantages - they are platform independent and even mobile platforms can run them, and no installation is needed apart from a modern web browser.
Currently, web applications are being developed in JavaScript (JS), hypertext mark-up language 5 (HTML 5), and cascading style sheets (CSS).
These technologies are not made for huge web applications, but they should not be replaced by webassembly; rather, webassembly is an extension to the currently existing technology.
The purpose of webassembly is to fix or improve the problems in web application development.
This master’s thesis reviews all of the aspects and checks whether the promises of webassembly are kept and where problems still exist.
The COVID-19 pandemic has led to an economic downturn in the Slovak Republic. To bridge corporate liquidity problems the Slovakian Government has introduced several support measures. The investigation discusses the effectiveness of the measures imposed. Based on theoretical foundations, the research question is empirically examined by using a qualitative expert survey. As the automotive industry plays a leading role in Slovakia, the research conducted is oriented towards the financing phases, a typical automotive exporter is undergoing. As a result of the research, bridging loans and government grants were identified as the most important measures. Additionally, tendencies towards political recommendations for action were identified. The research explored, that the Slovakian Government should focus on meeting the short-term liquidity needs, boosting exports and promoting innovation as well as considering a support package for the automotive industry.
The coronavirus affects the strongly export-oriented Swiss economy in a situation where political and economic developments are already making the cross-border exchange of goods and services difficult. For this reason, the question arises of how Switzerland can maintain or strengthen its position in global competition in the export business during an unprecedented period of crisis such as the current one.
In order to find an answer to this question, this paper critically examines the existing government support measures for Swiss exporters in times of COVID-19. The fact that Switzerland has so far not taken any specific support measures for exporters raises the actual research question of whether there is a specific necessity and demand for a special export promotion. To answer this research question, various expert opinions are compared and overall conclusions are drawn. By rapidly introducing and adapting the already existing instruments – liquidity assistance and an expansion of short-time work benefits – the federal government was able to ensure the survival of many companies. According to the authors of this paper, this focus of government support in times of crisis is just right for a small national economy in the short term and therefore preferable to a specific support of exporters. Nevertheless, given the high relative importance of foreign trade for Switzerland’s overall economic performance, there can be no recovery of national economy without a recovery of foreign trade.
Annotated training data is essential for supervised learning methods. Human annotation is costly and laborsome especially if a dataset consists of hundreds of thousands of samples and annotators need to be hired. Crowdsourcing emerged as a solution that makes it easier to get access to large amounts of human annotators. Introducing paid external annotators however introduces malevolent annotations, both intentional and unintentional. Both forms of malevolent annotations have negative effects on further usage of the data and can be summarized as spam. This work explores different approaches to post-hoc detection of spamming users and which kinds of spam can be detected by them. A manual annotation checking process resulted in the creation of a small user spam dataset which is used in this thesis. Finally an outlook for future improvements of these approaches will be made.
This seminar paper examines government measures to support export-oriented companies in Belgium. After a short overview of the Belgian economy and the impact of the Covid-19 crisis, the paper introduces the available government measures for exporters. In particular, the role of Credendo as a Belgian export-credit insurance company will be discussed, and its measures will be examined in more detail. In addition, federal measures of the Belgian government will be identified, and a summary of the most important regional measures will be provided. The entirety of government measures available to export-oriented companies will be reviewed and options for the future activities of export-oriented companies will be pointed out.
Communication protocols enable information exchange between different information systems. If protocol descriptions for these systems are not available, they can be reverse-engineered for interoperability or security reasons. This master thesis describes the analysis of such a proprietary binary protocol, named the DVRIP or Dahua private protocol from Dahua Technology. The analysis contains the identification of the DVRIP protocol header format, security mechanisms and vulnerabilities inside the protocol implementation. With the revealing insights of the protocol, an increase of the overall security is achieved. This thesis builds the foundation for further targeted security analyses.
The COVID-19 pandemic has been spreading rapidly across the globe and has seriously affected global trade. In order to reduce the pandemic’s impact on their economy, the French government released a support plan referring to the COVID-19 crisis. Since mid-tier companies play a leading role in France’s export, this paper deals with the measures taken by the French government to support especially French mid-tier export companies. Based on empirical literature and recent publications, the research question is analyzed by conducting interviews with experts, such as market participants, governmental institutions and an expert for trade and innovation. As a result of the research, the emergency measures taken by the French government, such as the CAP Francexport reinsurance scheme, the extension of cover for export guarantees, additional information and assistance, and the deferral of tax and social security contributions have mitigated the effects at first instance.
This paper gives an overview of the impact that the corona pandemic has on the export industry in Canada and analyzes the different Canadian government measures for exporters. In addition, the measures are subsequently evaluated in order to identify if the support measures can help Canadian exporters to overcome the crisis. The basis of this paper are semi-structured expert interviews with experts from the financial sector, scientific literature and studies. The results have shown that the COVID-19 pandemic has a major impact on Canada’s export economy and it’s GDP. Trade is only possible to a limited extent, as many borders are closed. The Canadian government reacted with an economic response plan to support Canadian individuals and businesses. This paper depicts and assesses the most eligible measures for export companies.
This thesis deals with the creation of a cross-platform application using Xamarin.Forms. The cross-platform application will cover three different platforms android, iOS, and UWP.
The application is the first concept of a possible feature for a companion application for LS telcom. There, the user can identify cell antennas using a map-view and a camera-view making the application an augmented reality application. Thus, the user can search for a specific cell and access various information that he would not be able to see with his eyes like for example the frequency of the transmitting cells.
The cell data is generated from three different sources, Cartoradio, OpenCelliD, and the LS telcom databrowser. Eventually, the decision was taken, that the main source should be the LS telcom databrowser which has multiple advantages over the other cell sources.
The cells on the map-view are placed using the extracted coordinates from the source data. However, the cells on the camera-view are placed with complex calculations using different formulas like the Haversine formula to calculate the distance between the cell and the user and the bearing to calculate the angle between the cell and the user. Various settings will allow the user to personalize the application according to his wishes.
The aim of this essay is to analyse and evaluate the Italian government measures for exporters in response to COVID-19. The unexpected, rapid and hardly predictable consequences of the pandemic paralyzed the entire globe. For a long time, Italy was the epicentre of the virus, which caused severe damage in the Italian export economy dropping temporarily more than 40%. The Italian government reacted exemplary fast and took multiple countermeasures of high extent especially through the Italian export credit agency SACE. On the one hand, the internationally compared broad structure of SACE was a huge advantage, which allowed to release quickly numerous measures. On the other hand, there is room for improvement regarding the accessibility of measure-related information, which has been partially only available in Italian. Furthermore, there is a remarkable risk resulting from the combination of the high monetary effort to enable the numerous measures, the difficult financial situation of the Italian government and the unpredictability of the COVID-19 consequences.
British Government long-term Measures for Exporters in the Manufacturing Sector in Times of COVID-19
(2020)
The authors of this paper have addressed the question of what measures have been taken by the British government to support exporters in the manufacturing sector in the era of COVID-19. A classification of the manufacturing export industry in the British economy as a whole and the impending economic impact of COVID-19 were also examined. It should be noted that the United Kingdom is facing major structural changes as a result of the Corona pandemic and its withdrawal from the European Union, which are examined more in detail in this paper. The UKEF, in cooperation with other institutions, provides a number of finance facilities for exporters already before Corona crisis. The access to get this support has been facilitated for the COVID-19 affected exporters, but no additional measures were made available.
This essay is about Estonia’s measures to help its exporters responding to COVID-19. The purpose is to analyse the companies’ need for help measures and the governmental objectives behind the measures and finally to analyse the possible effects. We used the two latest surveys dealing with the entrepreneurship situation and conducted two inter-views with governmental representatives exposing their objectives. The outcomes show that more than half of Estonian companies are asking for governmental help mainly as a consequence of a drop of demand. Limiting the increase of unemployment and bankrupt-cies as well as strengthening the economic recovery were identified as the main govern-mental objectives while restraining fiscal costs is a subordinated objective but becomes more important the more money will be spent. The help measures offered by KredEx are in line with these objectives. After the crisis the implications of the established measures should be analysed so that others can learn from the Estonian Government’s approach.
The research paper provides important findings about the development, difficulties and perception of the support measures for exporters introduced by the Austrian government in times of COVID-19 crisis. Based on a literature review using secondary data, eight qualitative interviews were conducted with experts from the Austrian economy and government, among them the Austrian ECA ‘Oesterreichische Kontrollbank AG’. To balance the effects of the COVID-19 pandemic on the Austrian economy, a broad coverage with financing instruments for a wide range of target groups was established. Although the support measures have been well received by companies, insolvencies cannot completely be prevented. Nevertheless, the actual effects are not yet predictable and need to be assessed in further research at a later point in time.
This essay deals with the Spanish economy and especially with the Spanish governmental measures for SME exporters in times of COVID-19. The focus was set on SMEs, as they are an essential part of trade for the government and are particularly affected by the pandemic. Since the financial crisis, the Spanish economy has become highly diversified, with a greater focus on exports. Competitiveness, productivity and efficiency have increased significantly. The Spanish government measures largely affect the areas liquidity and financing, taxes and protection of the employment. One of the most important measures is the 100-billion-euro credit line and the policies on unemployment. The Spanish government is dependent on further aid packages and is criticized for the measures.
In this work, the authors have dealt with the question of what measures have been taken by the Danish government to support exporters during the time of COVID-19. The analysis first looks at Denmark's general economic situation. In the following, Denmark's governmental and financial measures to support exporters are briefly explained. In addition to the economic and financial effects, the issue of green energy has also become a major focus of political attention in times of crisis. Denmark is a pioneer in the wind energy sector and accounts for a large share of exports. For this reason, the impact and possible future developments for the wind sector in connection with the pandemic are also being investigated.
The COVID-19 pandemic has the global economy under control. This paper deals with the economic consequences in Germany and shows the measures taken by the German government to support especially small and medium-sized export companies. The structure of the German economy and foreign trade promotion are explained as a basis. After considering the government's support measures, an evaluation of country comparisons shows that there is still potential for further measures, especially in direct lending and debt moratorium. The analysis is based on quantitative data from surveys and qualitative results from interviews with relevant ministries and market participants as well as recent publications.
The status quo of PROFINET, a commonly used industrial Ethernet standard, provides no inherent security in its communication protocols. In this thesis an approach for protecting real-time PROFINET RTC messages against spoofing, tampering and optionally information disclosure is specified and implemented into a real-world prototype setup. Therefor authenticated encryption is used, which relies on symmetric cipher schemes. In addition a procedure to update the used symmetric encryption key in a bumpless manner, e.g. without interrupting the real-time communication, is introduced and realized.
The concept for protecting the PROFINET RTC messages was developed in collaboration with a task group within the security working group of PROFINET International. The author of this thesis has also been part of that task group. This thesis contributes by proofing the practicability of the concept in a real-world prototype setup, which consists of three FPGA-based development boards that communicate with each other to showcase bumpless key updates.
To enable a bumpless key update without disturbing the deterministic real-time traffic by dedicated messages, the key update annunciation and status is embedded into the header. By provisioning two key slots, of which only one is in used, while the other is being prepared, a well-synchronized coordinated switch between the receiver and the sender performs the key update.
The developed prototype setup allows to test the concept and builds the foundation for further research and implementation activities, e.g. the impact of cryptographic operations onto the processing time.
In the field of network security, the detection of intrusions is an important task to prevent and analyse attacks.
In recent years, an increasing number of works have been published on this subject, which perform this detection based on machine learning techniques.
Thereby not only the well-studied detection of intrusions, but also the real-time capability must be considered.
This thesis addresses the real-time functionality of machine learning based network intrusion detection.
For this purpose we introduce the network feature generator library PyNetFlowGen, which is designed to allow real-time processing of network data.
This library generates 83 statistical features based on reassembled data flows.
The introduced performant Cython implementation allows processing individual packets within 4.58 microseconds.
Based on the generated features, machine learning models were examined with regard to their runtime and real-time capabilities.
The selected Decision-Tree-Classifier model created in Python was further optimised by transpiling it into C-Code, what reduced the prediction time of a single sample to 3.96 microseconds on average.
Based on the feature generator and the machine learning model, an basic IDS system was implemented, which allows a data throughput between 63.7 Mbit/s and 2.5 Gbit/s.
If the current situation could be described in one word, it would be ‘uncertainty’. In times of global crisis, it is important to support the economy to keep businesses alive. Therefore, this paper shows the Finnish government measures and how exporters can benefit from them. Looking in particular at the maritime sector, the research pointed out that there were not that many specific measures for exporters and shipbuilders. This essay detected that the provided measures are suitable for the needs of the affected companies and are an effective instrument by the government to stabilise the industry. This is proved by the number of companies taking advantage of these loans, grants and guarantees. Due to the already mentioned uncertainty, it remains unclear how measures have to be adjusted in the future.
The Timed-Up-and-Go (TUG) test aims to assess mobility, balance, walking ability, and fall risk during walking. The instrumentalization of the TUG is already described in the literature and is beginning to be implemented in the industry. The products proposed by Zhortech and Digitsole, namely connected insoles, as well as additional sensors placed on the sternum and the right and eventually left femur allow the instrumentalization of the test.
An algorithm of detection and evaluation of the TUG has been developed in two versions. The first one (V1) aiming simply to calculate the total duration of the test. A second version is an improvement of V1, allowing to segment the TUG in three sub-phases: Sit-Stand, walking, Stand-Sit. These algorithms have been declined in a variant with the five sensors mentioned, and one without the sensor of the left femur.
The performance of the algorithms was compared to manual labeling performed on video. The comparison includes a bland-Altman plot and a correlation for the total test duration, but also for the sub-phase’s duration according to the two variants.
The TUG duration shows very good results regarding the limits of agreements (lLoA = -0.33 s and uLoA+0.6 s). The bias of 0.13 s indicated that the algorithm overrates the duration of the TUG. The results of the TUG subphases are less accurate. Although the correlation coefficient is between 0.76 and 0.96 for the different subphases, the limits of agreements are still very high, between -0.71 s and -0.5 s for the lLoA and +0.39 s and +0.58 s for the uLoA. These limits of agreements indicated that the Sit-Stand and Stand-Sit transition are not accurate enough yet. The dispersion is high for a transition that could last between about one and six seconds. The two variants, with and without a sensor on the left femur, present similar results.
The Project "Schluckspecht" of the University of Offenburg consists of participating in the European marathon called "Shell Eco-Marathon"(SEM) which consists of designing and building from the beginning a vehicle with the greatest possible energy efficiency. The University of Offenburg has participated in this project since 1998.
The team that forms the Schluckspecht project is made up of around 30 students from the faculties of mechanical engineering, process engineering, electrical engineering, medical technology and computer science, as well as the degree in Audiovisual Communication. The team was founded in 1998 and since then students have been developing and building high efficiency vehicles to participate in the European marathon Shell Eco.
In this project, students can put into practice all the theoretical knowledge obtained during their studies. Also can be learned how to work interdisciplinarity as a team, a skill that for now, many companies or require or seek.
The following topics are discussed in the Schluckspecht project, which are also ideal for the work of students:
-Conception construction and production of high efficiency vehicles.
-Computational design and manufacture of lightweight components and sets.
-Development of lightweight components and sets from renewable raw materials.
-Construction and development of special test benches, for example: motor test bench.
-Implementation and optimization of control strategies for autonomous driving
-Mechanical and electrical integration of sensors for autonomous driving
-Ergonomic studies and optimization of the driver's cabin.
The objective of the project is to develop and manufacture research vehicles that make individual mobility as efficient as possible from an energy point of view. To achieve this, current and future issues of the industry are discussed. In this project, both the theoretical and practical part of the light construction of vehicles and the reduction of friction, the variety of propulsion concepts (electric thrusters, fuel cells, diesel/petrol engines, Stirling engines) and autonomous driving are investigated. The services of the University of Offenburg together with some external partners are grouped together to make this wonderful project work.
Among the billions of smartphone users in the world, Android still holds more than 80% of the market share. The applications which the users install have a specific set of features that need access to some device functionalities and sensors that may hold sensitive information about the user. Therefore, Android releases have set permission standards to let the user know what information is being disclosed to the application. Along with other security and privacy improvements, significant changes to the permission scheme are introduced with the Android 6.0 version (API level 23). In this master thesis, the Android permission scheme is tested on two devices from different eras. The evolution of Android over the years is examined in terms of confidentiality. For each device, two applications are built; one focused on extracting every piece of information within the confidentiality scope with every permission declared and/or requested, and the other app focused on getting this type of information without user notification. The resulting analysis illustrates whether how and in what way the Android permission scheme declined or improved over time.
Die Arbeit beschäftigt sich mit dem Thema der Progressive Web App, dabei wird auf die Entwicklung und das Wirtschaftliche Potential eingegangen. Die Arbeit kann als Hilfestellung bei der Entscheidung, ob eine Progressive Web App in einem Unternehmen eingesetzt werden soll, dienen.