Refine
Year of publication
Document Type
- Conference Proceeding (934)
- Article (reviewed) (558)
- Article (unreviewed) (124)
- Part of a Book (65)
- Master's Thesis (63)
- Contribution to a Periodical (58)
- Book (30)
- Bachelor Thesis (29)
- Patent (29)
- Letter to Editor (28)
Conference Type
- Konferenzartikel (734)
- Konferenz-Abstract (134)
- Sonstiges (34)
- Konferenz-Poster (22)
- Konferenzband (12)
Language
- English (1976) (remove)
Keywords
- RoboCup (32)
- Dünnschichtchromatographie (27)
- COVID-19 (23)
- Export (22)
- Machine Learning (19)
- Gamification (17)
- Kommunikation (15)
- Finite-Elemente-Methode (13)
- Government Measures (13)
- TRIZ (13)
Institute
- Fakultät Maschinenbau und Verfahrenstechnik (M+V) (589)
- Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019) (501)
- Fakultät Elektrotechnik, Medizintechnik und Informatik (EMI) (ab 04/2019) (373)
- Fakultät Wirtschaft (W) (279)
- INES - Institut für nachhaltige Energiesysteme (167)
- Fakultät Medien und Informationswesen (M+I) (bis 21.04.2021) (157)
- ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik (146)
- Fakultät Medien (M) (ab 22.04.2021) (80)
- IMLA - Institute for Machine Learning and Analytics (71)
- ACI - Affective and Cognitive Institute (58)
Open Access
- Open Access (830)
- Closed Access (666)
- Closed (290)
- Bronze (136)
- Gold (75)
- Diamond (67)
- Hybrid (44)
- Grün (12)
Communication protocols enable information exchange between different information systems. If protocol descriptions for these systems are not available, they can be reverse-engineered for interoperability or security reasons. This master thesis describes the analysis of such a proprietary binary protocol, named the DVRIP or Dahua private protocol from Dahua Technology. The analysis contains the identification of the DVRIP protocol header format, security mechanisms and vulnerabilities inside the protocol implementation. With the revealing insights of the protocol, an increase of the overall security is achieved. This thesis builds the foundation for further targeted security analyses.
Well-designed and informative product presentations can support consumers in making purchase decisions. There are plenty of facts and details about a product of interest. However, also emotions are an important aspect for the purchase decision. The unique visualization opportunities of virtual reality (VR) can give users of VR applications the feeling of being there (telepresence). The applications can intensely engage them in a flow experience, comprising the four dimensions of enjoyment, curiosity, focused attention and control. In this work, we claim that VR product presentations can create subjective product experiences for consumers and motivate them to reuse this innovative type of product presentation in the future, by immersing them in a virtual world and causing them to interact with it. To verify the conceptual model a study was conducted with 551 participants who explored a VR hotel application. The results indicate that VR product presentations evoke positive emotions among consumers. The virtual experience made potential customers focus their attention on the virtual world and aroused their curiosity about getting more information about the product in an enjoyable way. In contrast to the theoretical assumption, control did not influence the users’ behavioral intentions to reuse VR product presentation. We conclude that VR product presentations create a feeling of telepresence, which leads to a flow experience that contributes to the behavioral intention of users to reuse VR product presentations in the future.
In this entry, the 3D CAD reconstructions and 3D multi-material polymer replica printings of knight Götz von Berlichingen´s first „Iron Hand,“ which were developed in the last few years at Offenburg University, are presented. Even by today's standards, the first “Iron Hand”–as could be shown in the replicas–demonstrates sophisticated mechanics and well thought-out functionality and still offers inspiration and food for discussion when it comes to the question of an artificial prosthetic replacement for a hand.
Dementia is a clinical diagnosis reflecting many possible underlying pathologies, for example, vascular dementia and neurodegenerative disorders such as frontotemporal dementia, Lewy body-type disorder or Alzheimer’s disease (AD). The breakthrough of 99mtechnetium-labelled perfusion tracers in the 1990s resulted in many SPECT studies of flow changes in AD. In the first decade of 2000, the role of perfusion SPECT was shifted from diagnosis towards differential diagnosis, parallel to the growing attention for diagnosing early stages of dementia. Previously a diagnosis based largely on a process of exclusion, new guidelines have emerged increasingly employing positive criteria to establish the diagnosis, including neuroimaging biomarkers. Nowadays, FDG PET has largely limited the role of perfusion SPECT, although it is still considered a valuable and cost-effective alternative when PET is not available.
PET and SPECT in Neurology
(2021)
This book provides a comprehensive overview of the use of PET and SPECT in not only classic neurodegenerative disorders but also cerebrovascular disorders, brain tumors, epilepsy, head trauma, coma, sleeping disorders, and inflammatory and infectious diseases of the CNS. The new edition has been revised and updated to reflect recent advances and includes additional chapters, for example on the use of artificial intelligence and machine learning in imaging data analysis, the study of brain connectivity using PET and SPECT images, and the role of PET imaging in modulation of brain functioning by deep brain stimulation. The authors are renowned experts whose dedication to the investigation of neurological disorders through nuclear medicine technology has achieved international recognition. Most chapters are written jointly by a clinical neurologist and a nuclear medicine specialist to ensure a multidisciplinary approach. This state of the art compendium will be invaluable for neurologists and radiologists/nuclear medicine specialists and will also be informative for interested general practitioners and geriatricians. Companion volumes on PET and SPECT in psychiatry and in neurobiological systems complete a trilogy.
Annotated training data is essential for supervised learning methods. Human annotation is costly and laborsome especially if a dataset consists of hundreds of thousands of samples and annotators need to be hired. Crowdsourcing emerged as a solution that makes it easier to get access to large amounts of human annotators. Introducing paid external annotators however introduces malevolent annotations, both intentional and unintentional. Both forms of malevolent annotations have negative effects on further usage of the data and can be summarized as spam. This work explores different approaches to post-hoc detection of spamming users and which kinds of spam can be detected by them. A manual annotation checking process resulted in the creation of a small user spam dataset which is used in this thesis. Finally an outlook for future improvements of these approaches will be made.
The status quo of PROFINET, a commonly used industrial Ethernet standard, provides no inherent security in its communication protocols. In this thesis an approach for protecting real-time PROFINET RTC messages against spoofing, tampering and optionally information disclosure is specified and implemented into a real-world prototype setup. Therefor authenticated encryption is used, which relies on symmetric cipher schemes. In addition a procedure to update the used symmetric encryption key in a bumpless manner, e.g. without interrupting the real-time communication, is introduced and realized.
The concept for protecting the PROFINET RTC messages was developed in collaboration with a task group within the security working group of PROFINET International. The author of this thesis has also been part of that task group. This thesis contributes by proofing the practicability of the concept in a real-world prototype setup, which consists of three FPGA-based development boards that communicate with each other to showcase bumpless key updates.
To enable a bumpless key update without disturbing the deterministic real-time traffic by dedicated messages, the key update annunciation and status is embedded into the header. By provisioning two key slots, of which only one is in used, while the other is being prepared, a well-synchronized coordinated switch between the receiver and the sender performs the key update.
The developed prototype setup allows to test the concept and builds the foundation for further research and implementation activities, e.g. the impact of cryptographic operations onto the processing time.
In the field of network security, the detection of intrusions is an important task to prevent and analyse attacks.
In recent years, an increasing number of works have been published on this subject, which perform this detection based on machine learning techniques.
Thereby not only the well-studied detection of intrusions, but also the real-time capability must be considered.
This thesis addresses the real-time functionality of machine learning based network intrusion detection.
For this purpose we introduce the network feature generator library PyNetFlowGen, which is designed to allow real-time processing of network data.
This library generates 83 statistical features based on reassembled data flows.
The introduced performant Cython implementation allows processing individual packets within 4.58 microseconds.
Based on the generated features, machine learning models were examined with regard to their runtime and real-time capabilities.
The selected Decision-Tree-Classifier model created in Python was further optimised by transpiling it into C-Code, what reduced the prediction time of a single sample to 3.96 microseconds on average.
Based on the feature generator and the machine learning model, an basic IDS system was implemented, which allows a data throughput between 63.7 Mbit/s and 2.5 Gbit/s.
Knight Götz von Berlichingen (1480–1562) lost his right hand distal to the wrist due to a cannon ball splinter injury in 1504 in the Landshut War of Succession at the age of 24. Early on, Götz commissioned a gunsmith to build the first “Iron Hand,” in which the artificial thumb and two finger blocks could be moved in their basic joints by a spring mechanism and released by a push button. Some years later, probably around 1530, a second “Iron Hand” was built, in which the fingers could be moved passively in all joints. In this review, the 3D computer-aided design (CAD) reconstructions and 3D multi-material polymer replica printings of the first “Iron hand“, which were developed in the last few years at Offenburg University, are presented. Even by today’s standards, the first “Iron Hand”—as could be shown in the replicas—demonstrates sophisticated mechanics and well thought-out functionality and still offers inspiration and food for discussion when it comes to the question of an artificial prosthetic replacement for a hand. It is also outlined how some of the ideas of this mechanical passive prosthesis can be translated into a modern motorized active prosthetic hand by using simple, commercially available electronic components.