TY - BOOK T1 - Konrad Mertens: Photovoltaik - Lehrbuch zu Grundlagen, Technologie und Praxis, 3., neu bearbeitete und aktualisierte Auflage Y1 - 2015 SN - 978-3-446-442 PB - Hanser CY - München ER - TY - GEN T1 - "Lohnt sich Solarstrom für mich als Hausbesitzer heute noch? - Chancen und Potentiale des Eigenverbrauchs", 1. Vortrag, Infoveranstaltung des Kreises Steinfurt, Emsdetten, 02.11.2015 Y1 - 2015 ER - TY - CHAP A1 - Adhari, H. A1 - Dreibholz, T. A1 - Becke, M. A1 - Rathgeb, E. P. A1 - Tüxen, M. T1 - Evaluation of Concurrent Multipath Transfer over Dissimilar Paths T2 - Proceedings of the 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011) Y1 - 2011 SN - 978-1-61284-829-7 SP - 708 EP - 714 CY - Singapore ER - TY - CHAP A1 - Albercht, C. A1 - Koch, R. A1 - Piontek, T. A1 - Glösekötter, P. T1 - Towards a Flexible Fault-Tolerant System-on-Chip T2 - 22nd Int. Conf. on Architecture of Computing Systems Y1 - 2009 SN - 978-3-642-00453-7 CY - Delft ET - March 10-13 ER - TY - GEN A1 - Alberecht, C. A1 - Glösekötter, P. T1 - SoC Reliability, published at Diskussionskreis Fehlertoleranz, http://dc.informatik.uni-essen.de/group/all/research/ft-kreis2.html, Essen, October 30-31 Y1 - 2009 ER - TY - RPRT A1 - Annas, Sven A1 - Jantzen, Hans-Arno A1 - Scholz, Jürgen A1 - Glösekötter, Peter A1 - Wetter, Christof T1 - Vorhabensbezeichnung: IngenieurNachwuchs2014: Ein neues Entwicklungswerkzeug für die Optimierung von Rührsystemen in Biogas-Fermentern unter Einsatz der Wireless Sensor Networks (WSN)-Technik in Kombination mit CFD : Schlussbericht : Berichtszeitraum: 01.11.2014 bis 31.12.2018 KW - Rührwerkoptimierung Y1 - 2019 UR - https://www.tib.eu/de/suchen/download/?tx_tibsearch_search%5Bdocid%5D=TIBKAT%3A1672326753&cHash=cc52271c2cd6579c95da17f00a67ad3c#download-mark U6 - http://dx.doi.org/10.2314/KXP:1672326753 ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems T2 - Proc. 11th International Conference on Information Technology (ICIT 2008) Y1 - 2008 U6 - http://dx.doi.org/10.1109/ICIT.2008.60 SP - 232 EP - 237 PB - IEEE CS ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test T2 - Proc. The 5th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), vol. 1 Y1 - 2008 U6 - http://dx.doi.org/10.1109/EUC.2008.102 SP - 484 EP - 491 PB - IEEE CS ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Effective Pattern Representation for Safety Critical Embedded Systems T2 - Proc. 2008 International Conference on Computer Science and Software Engineering, vol. 4 Y1 - 2008 U6 - http://dx.doi.org/10.1109/CSSE.2008.739 SP - 91 EP - 97 PB - IEEE CS ER - TY - JOUR A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Design Pattern Representation for Safety-Critical Embedded Systems JF - Journal of Software Engineering and Applications (JSEA) Y1 - 2009 U6 - http://dx.doi.org/10.4236/jsea.2009.21001 VL - 2 IS - 1 SP - 1 EP - 12 ER - TY - CHAP A1 - Atkinson, Colin A1 - Gerbig, Ralph A1 - Barth, Florian A1 - Freiling, Felix A1 - Schinzel, Sebastian A1 - Hadasch, Frank A1 - Maedche, Alexander A1 - Müller, Benjamin T1 - Reducing the Incidence of Unintended, Human-Caused Information Flows in Enterprise Systems T2 - Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2012 IEEE 16th International Y1 - 2012 U6 - http://dx.doi.org/10.1109/EDOCW.2012.12 SP - 11 EP - 18 ET - 3M4SE 2012 ER - TY - CHAP A1 - Aviram, Nimrod A1 - Schinzel, Sebastian A1 - Somorovsky, Juraj A1 - Heninger, Nadia A1 - Dankel, Maik A1 - Steube, Jens A1 - Valenta, Luke A1 - Adrian, David A1 - Halderman, J. Alex A1 - Dukhovni, Viktor A1 - Käsper, Emilia A1 - Cohney, Shaanan A1 - Engels, Susanne A1 - Paar, Christof A1 - Shavitt, Yuval T1 - DROWN: Breaking TLS Using SSLv2 T2 - 25th Usenix Security Symposium Y1 - 2016 SP - 689 EP - 706 PB - Usenix Association. CY - Austin, TX. ER - TY - JOUR A1 - Banos, Oresti A1 - Damas, Miguel A1 - Pomares, Hector A1 - Rojas, Ignacio A1 - Villalonga, Claudia A1 - Glösekötter, Peter T1 - PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring JF - Hindawi Publishing Corporation The Scientific World Journal Y1 - 2014 SP - 1 EP - 12 ER - TY - JOUR A1 - Bauer, Deckert A1 - Dürr, Hinrichs T1 - Global solutions to the electrodynamic two-body problem on a straight line JF - Journal of Applied Mathematics and Physics Y1 - 2017 SN - 0044-2275 VL - 68 ER - TY - CHAP A1 - Bauer, Johannes A1 - Schinzel, Sebastian A1 - Felix, C. A1 - Freiling, Andreas T1 - Information leakage behind the curtain: Abusing anti-EMI features for covert communication T2 - Hardware Oriented Security and Trust (HOST), 2016 IEEE International Symposium on Y1 - 2016 U6 - http://dx.doi.org/10.1109/HST.2016.7495570 SP - 130 EP - 134 ER - TY - JOUR A1 - Becke, Martin A1 - Rathgeb, Erwin A1 - Werner, Sebastian A1 - Rüngeler, Irene A1 - Tüxen, Michael A1 - Stewart, Randall T1 - Data channel considerations for RTCWeb JF - IEEE Communications Magazine Y1 - 2013 VL - 51 IS - 4 SP - 34 EP - 41 ER - TY - JOUR A1 - Beckschulze, E. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications JF - SAE International Journal of Passenger Cars - Electronic and Electrical Systems Y1 - 2009 U6 - http://dx.doi.org/10.4271/2009-01-0761 IS - 1 SP - 301 EP - 308 ER - TY - CHAP A1 - Beckschulze, E. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications T2 - Proc. Safety-Critical Systems, 2009 (SAE World Congress 2009), 2009, SAE International Y1 - 2009 SP - 209 EP - 216 ER - TY - CHAP A1 - Beckschulze, E. A1 - Salewski, F. A1 - Siegbert, T. A1 - Kowalewski, S. T1 - Fault Handling Approaches on Dual-Core Microcontrollers in Safety-Critical Automotive Applications T2 - Proc. Leveraging Applications of Formal Methods, Verification and Validation (ISoLA08), 2009, vol. 17 in Communications in Computer and Information Science Y1 - 2009 U6 - http://dx.doi.org/10.1007/978-3-540-88479-8_7 SP - 82 EP - 92 PB - Springer CY - Berlin, Heidelberg ER - TY - CHAP A1 - Benenson, Zinaida A1 - Dewald, Andreas A1 - Eßer, Hans-Jürgen A1 - Felix, C. A1 - Freiling, Tilo A1 - Müller, Christian A1 - Moch, Stefan A1 - Vomel, Sebastian A1 - Schinzel, Miachel A1 - Spreitzenbach, Ben T1 - Exploring the Landscape of Cybercrime T2 - SysSec Workshop (SysSec), 2011 First Y1 - 2011 U6 - http://dx.doi.org/10.1109/SysSec.2011.23 ER - TY - THES A1 - Borgmann, Frank A1 - Möllers, Michael T1 - Realisierung und Implementierung einer zentralen, funkgestützten Steuerung der Rollladen eines Einfamilienhauses N2 - Die hier vorliegende Diplomarbeit befasst sich mit dem Thema "Realisierung und Implementierung einer zentralen, funkgestützten Steuerung der Rollladen eines Einfamilienhauses". Die entworfene Schaltung ist kompatibel zu einem bestehenden Funkschaltsystem für Steckdosen und Dimmer. Ein weiterer Zielpunkt dieser Diplomarbeit war, dass die neue Schaltung günstiger herzustellen ist, als schon existierende Systeme. Die Funktionalität eine Rolllade per Taster oder durch eine Funkfernbedienung, auf 433MHz Basis, zu bedienen bzw. zu steuern ist auch gegeben. Durch eine Verkleinerung der Platine bzw. eine Optimierung der Programmierung ist eine Verbesserung der Schaltung möglich. Weitere Funktionen können durch Ergänzung der Hard- und Software hinzugefügt werden. KW - Rollladen KW - Einfamilienhaus Y1 - 2000 U6 - http://dx.doi.org/10.25974/fhms-7 PB - FH Münster ER - TY - JOUR A1 - Brinkmann, Marcus A1 - Dresen, Christian A1 - Merget, Robert A1 - Poddebniak, Damian A1 - Müller, Jens A1 - Somorovsky, Juraj A1 - Schwenk, Jörg A1 - Schinzel, Sebastian T1 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication JF - 30th USENIX Security Symposium Y1 - 2021 UR - https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann ER - TY - CHAP A1 - Brusamarello, L. A1 - Wirth, G. I. A1 - Camargo, V. A1 - da Silva, M. A1 - da Silva, R. A1 - Glösekötter, P. T1 - Numerical Method for Modeling Process Variations and NBTI T2 - 16th IFIP/IEEE VLSI-SOC Y1 - 2008 CY - Rhodes Island, Greece ET - Oct. 13-15 ER - TY - CHAP A1 - Burke, Bruno A1 - Weßeler, Peter A1 - te Vrugt, Jürgen ED - Pammer-Schindler, Viktoria ED - Pérez-Sanagustín, Mar ED - Drachsler, Hendrik ED - Elferink, Raymond ED - Scheffel, Maren T1 - A Programming Language Independent Platform for Algorithm Learning T2 - Lifelong Technology-Enhanced Learning, 13th European Conference on Technology Enhanced Learning. EC-TEL 2018 N2 - Teaching People to program is a crucial requirement for our society to deal with the complexity of 21st-century challenges. In many teaching systems, the student is required to use a particular programming language or development environment. This paper presents an intelligent tutoring system to support blended learning scenarios, where the students can choose their programming language and development environment. For that, the system provides an interface where the students request test data and submit results to unit test their algorithms. The submitted results are analyzed by a machine learning system that detects common errors and provides adaptive feedback to the student. With this system, we are focusing on teaching algorithms rather than specific programming language semantics. The technical evaluation tested with the implementation of Mean and Median algorithm shows that the system can distinguish between error cases with an error rate under 20%. A first survey, with a small group of students, shows that the system helps them detect common errors and arrive at a correct/valid solution. We are in the process of testing the system with a larger group of students for gathering statistically reliable data. KW - Language-independent programming KW - Tutoring system KW - Algorithm learning Y1 - 2018 UR - https://link.springer.com/chapter/10.1007%2F978-3-319-98572-5_66 SN - 978-3-319-98572-5 U6 - http://dx.doi.org/10.1007/978-3-319-98572-5_66 SP - 652 EP - 655 PB - Springer, Cham ER - TY - CHAP A1 - Camargo, V. A1 - da Silva, M. A1 - Brusamarello, L. A1 - Wirth, G. A1 - Glösekötter, P. T1 - Modeling the Impact of NBTI on the Reliability of Arithmetic Circuits T2 - Chip In The Pampa SBCCI Y1 - 2008 ET - September 1-4, SFORU ER - TY - CHAP A1 - Chen, X. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Concept and Prototyping of a Fault Management Framework for Automotive Safety Relevant Systems T2 - Proc. Moderne Elektronik im Kraftfahrzeug II Y1 - 2007 SP - 70 EP - 79 PB - expert-verlag ER - TY - CHAP A1 - Conrads, N. A1 - Mertens, K. T1 - Feldstudie zur tatsächlichen Leistung von Photovoltaikanlagen mittels Peakleistungsmessgert T2 - Symposium Photovoltaische Solarenergie Y1 - 2008 SN - 978-3-934681-67-5 SP - 323 EP - 328 PB - OTTI CY - Regensburg ET - 23 ER - TY - JOUR A1 - Dreibholz, T. A1 - Rüngeler, I. A1 - Seggelmann, R. A1 - Tüxen, M. A1 - Rathgeb, E. A1 - Stewart, R. T1 - Stream Control Transmission Protocol: Past, Current, and Future Standardization Activities JF - IEEE Communications Magazine Y1 - 2011 VL - 49 IS - 4 SP - 82 EP - 88 ER - TY - CHAP A1 - Dresen, Christian A1 - Ising, Fabian A1 - Poddebniak, Damian A1 - Kappert, Tobias A1 - Holz, Thorsten A1 - Schinzel, Sebastian ED - Zhou, Jianying T1 - CORSICA: Cross-Origin Web Service Identification T2 - The 15th ACM ASIA Conference on Computer and Communications Security N2 - Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques. Y1 - 2020 UR - https://asiaccs2020.cs.nthu.edu.tw/program/ ER - TY - CHAP A1 - Dülks, R. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Real-Time Test and Simulation Environment Based on Standard FPGA Hardware T2 - Proc. Testing: Academic and Industrial Conference - Practice and Research Techniques (TAIC Part 2009), Washington, DC, USA Y1 - 2009 U6 - http://dx.doi.org/10.1109/TAICPART.2009.24 SP - 197 EP - 204 PB - IEEE Computer Society ER - TY - CHAP A1 - Ebbers, Simon A1 - Ising, Fabian A1 - Saatjohann, Christoph A1 - Schinzel, Sebastian T1 - Grand Theft App: Digital Forensics of Vehicle Assistant Apps T2 - ARES 2021: The 16th International Conference on Availability, Reliability and Security N2 - Due to the increasing connectivity of modern vehicles, collected data is no longer only stored in the vehicle itself but also transmitted to car manufacturers and vehicle assistant apps. This development opens up new possibilities for digital forensics in criminal investigations involving modern vehicles. This paper deals with the digital forensic analysis of vehicle assistant apps of eight car manufacturers. We reconstruct the driver’s activities based on the data stored on the smartphones and in the manufacturer’s backend. For this purpose, data of the Android and iOS apps of the car manufacturers Audi, BMW, Ford, Mercedes, Opel, Seat, Tesla, and Volkswagen were extracted from the smartphone and examined using digital forensic methods following forensics guidelines. Additionally, manufacturer data was retrieved using Subject Access Requests. Using the extensive data gathered, we reconstruct trips and refueling processes, determine parking positions and duration, and track the locking and unlocking of the vehicle. Our findings show that the digital forensic investigation of smartphone applications is a useful addition to vehicle forensics and should therefore be taken into account in the strategic preparation of future digital forensic investigations. Y1 - 2021 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-139031 ER - TY - CHAP A1 - Ebinger, Peter A1 - Schinzel, Sebastian A1 - Schmuckler, Martin T1 - Security mechanisms of a legal peer-to-peer file sharing system T2 - IADIS International Conference Applied Computing Y1 - 2008 ER - TY - RPRT A1 - Effinger, Hans T1 - Implementation genetischer Algorithmen auf einem transputerbasierten Parallelrechner N2 - In dieser Arbeit sollen kurz die Vorgehensweise und erste Ergebnisse der Parallelisierung eines diskreten Optimierungsverfahrens, den sog. Genetischen Algorithmen, dargestellt werden. KW - Genetischer Algorithmus Y1 - 2000 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-40 PB - FH Münster ER - TY - BOOK A1 - Effinger, Hans A1 - Preuss, Wolfgang A1 - Wenisch, Günter T1 - Lehr- und Übungsbuch Mathematik für Elektro- und Automatisierungstechniker BT - Mit 177 Beispielen und 302 Aufgaben mit Lösungen Y1 - 1998 SN - 3-446-18978-5 PB - Fachbuchverl. Leipzig im Carl-Hanser-Verl. CY - München [u.a.] ET - 1. Aufl. ER - TY - CHAP A1 - Estevez, F. A1 - Castillo-Secilla, J. M. A1 - Gonzalez, J. A1 - Olivares, J. A1 - Glösekötter, P. T1 - mDARAL: A Multi-Radio Version for the DARAL Routing Algorithm Y1 - 2017 U6 - http://dx.doi.org/10.3390/s17020324 SP - 1 EP - 17 PB - Sensors CY - Basel ET - 17(2) ER - TY - CHAP A1 - Estevez, F. A1 - García, A. A1 - Glösekötter, P. T1 - An application of people's sentiment from social media to smart cities Y1 - 2016 PB - El Profesional de la Informacion ET - Vol. 25, Nr. 6 ER - TY - CHAP A1 - Estevez, F. A1 - Glösekötter, P. A1 - González, J. T1 - DARAL: A Dynamic and Adaptive Routing Algorithm for Wireless Sensor Networks Y1 - 2016 U6 - http://dx.doi.org/10.3390/s16070960 PB - Sensors CY - Basel ER - TY - CHAP A1 - Estevez, F. A1 - Gonzales, J. A1 - Glösekötter, P. A1 - Valenzuela, O. A1 - Rojas, I. T1 - Statistical Analysis of the Main Configuration Parameters of the Network Dynamic and Adaptive Radio Protocol (DARP) Y1 - 2017 U6 - http://dx.doi.org/10.3390/s17071502 PB - Sensors CY - Basel ET - 17(7) ER - TY - CHAP A1 - Estevez, F. A1 - González, J. A1 - Glösekötter, P. A1 - Rojas, I. T1 - Fine-Tuning the DARP Wireless Sensor Routing Protocol T2 - Ubiquitous Computing & Ambient Intelligence: 10th International Conference, UCAmI 2016 Y1 - 2016 U6 - http://dx.doi.org/10.1007/978-3-319-48799-1_23 SP - 193 EP - 204 PB - Springer International Publishing AG CY - San Bartolomé de Tirajana, Gran Canaria ER - TY - CHAP A1 - Estevez, F. A1 - Rebel, G. A1 - González, J. A1 - Palomares, J. M. A1 - Glösekötter, P. T1 - Body energy harvesting for WSN. State of art and examples T2 - Jornadas de Computación Empotrada de Espana (JCE) Y1 - 2013 ET - 09/2013 ER - TY - CHAP A1 - Estevez, F. A1 - Rebel, G. A1 - González, J. A1 - Palomares, J.M. A1 - Glösekötter, P. T1 - Body energy harvesting for WSN. State of art and examples T2 - Proceedings JCE 09/2013 N2 - Body energy harvesting for WSN. State of art and examples Y1 - 2013 U6 - http://dx.doi.org/10.25974/fhms-707 PB - JCE ER - TY - JOUR A1 - Estevez, Francisco A1 - Rebel, G. A1 - González, J. A1 - Gloesekoetter, P. T1 - DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks JF - Electronics letters N2 - DARP is a new protocol proposal with some interesting features like dynamic roles and the use of virtual sub-networks. This article discusses about the wireless sensor network state of art and presents some desirable features in order to adapt these networks to new scenarios. These necessities are quite important to expand the applicability of wireless sensor networks and for this reason, here DARP is proposed. Y1 - 2015 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-8243 VL - 50 IS - 2 SP - 122 EP - 123 ER - TY - GEN A1 - Estevez, Francisco A1 - Rebel, Gregor A1 - Jose, M. A1 - Castillo-Secilla, Jesús A1 - Gonzáles, Peter T1 - Cognitive Radio as solution for Saturation Problem in Wireless Sensor Networks: A survey of Cognitive Radio policies Y1 - 2014 ER - TY - JOUR A1 - Estévez, F. A1 - García, J. M. A1 - Secilla-Castillo, J. M. A1 - González, J. A1 - Glösekötter, P. T1 - Enabling validation of the IEEE 802.15.4 performance through a new dual-radio OMNeT++ model JF - Elektronika IR Electrotechnika Date: Accepted - Pending of Publication Y1 - 2016 SN - 1392-1215 VL - Vol. 22, No 3 IS - Impact Factor: 0.561 ER - TY - JOUR A1 - Estévez, F. J. A1 - Castillo-Secilla, J. M. A1 - Gonzáles, J. A1 - Olivares, J. A1 - Glösekötter, P. T1 - mDARAL: A Multi-Radio Version for the DARAL Routing Algorithm JF - Sesors (Basel) Y1 - 2017 U6 - http://dx.doi.org/10.3390/s17020324 VL - Vol. 17 (2) ER - TY - JOUR A1 - Estévez, F. A1 - Rebel, G. A1 - González, J. A1 - Glösekötter, P. T1 - DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks JF - Electronics Letters Y1 - 2014 VL - 01/2014 ER - TY - GEN A1 - Fairhurst, Gorry A1 - Jones, Tom A1 - Tüxen, Michael A1 - Rüngeler, Irene A1 - Völker, Timo T1 - Packetization Layer Path MTU Discovery for Datagram Transports Y1 - 2020 UR - https://www.rfc-editor.org/info/rfc8899 U6 - http://dx.doi.org/10.17487/RFC8899 PB - IETF ER - TY - GEN A1 - Fehn, Heinz-Georg T1 - Bildverarbeitung : Verarbeitung von Bildern N2 - Das Tutorial erläutert die Elemente von Bildverarbeitungssystemen. Es befaßt sich mit den Prinzipen der Beleuchtung, Optik, Kamerasystemen und Bilderfassungskarten (Framegrabber) als Komponenten der Bildgebung und -erfassung. Weiterhin stellt sich die Bildverarbeitung als ein Gebiet der zweidimensionalen digitalen Signalverarbeitung dar. Im Verlauf des Tutorials wird daher auch auf die Grundlagen der Bilddigitalisierung und Bilddarstellung im Rechner und ihr Einfluß auf die Bildauswertung eingegangen. So kann die Verarbeitung von Bildern durch den Rechner mittels ikonischer Bildverarbeitung, also die Handhabung Bilddaten als Repräsentation von Helligkeitsinformationen, durchgeführt werden. Die Verfahren basierend auf Punktoperationen, lokale Operationen und globale Operationen z.B. zur Kontrastverbesserung, zur Rauschbefreiung oder Strukturfindung sind Methoden der ikonischen Bildanalyse. Im Rahmen des Tutorials werden die Grundlagen und Methoden der ikonischen Bildverarbeitung am Beispiel industrieller Aufgabenstellungen und Anwendungen erläutert. Die symbolische Bildverarbeitung basiert hingegen auf extrahierten Bildmerkmalen, wie z.B. Umfang, Schwerpunkt, Form etc. Ein Merkmalsvektor, gebildet aus solchen Kenngrößen stellt eine symbolische Beschreibung von Bildinhalten dar und kann z.B. zur Objektklassifikation verwendet werden. KW - Bildverarbeitung Y1 - 2000 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-101 PB - FH Münster ER - TY - JOUR A1 - Feldmeier, A. A1 - Glösekötter, P. T1 - Thermostatventil 2.0 - Energieautarke funkgesteuerte Stellantriebe und dadurch mögliche neuartige Regelkonzepte JF - TAB Technik am Bau Y1 - 2010 SN - 0341-2032 SP - 70 EP - 73 ET - 10 ER - TY - BOOK A1 - Fischer, Dirk A1 - Thoms-Meyer, Dirk T1 - HGB-Jahresabschluss : Erstellung mit Plausibilitätsbeurteilung 2005/06 BT - Mittelständische Unternehmen. Erläuterungen, Checklisten und Materialien unter Berücksichtigung von § 18 KWG Y1 - 2006 SN - 3-08-363106-5 PB - Stollfuss CY - Bonn ET - 2. Aufl. ER - TY - BOOK A1 - Fischer, Dirk A1 - Thoms-Meyer, Dirk T1 - HGB-Jahresabschluss : Erstellung und Prüfung 2005/06 BT - Mittelständische Unternehmen. Erläuterungen, Checklisten und Materialien für umfassende Prüfungshandlungen Y1 - 2006 SN - 3-08-363206-1 PB - Stollfuss CY - Bonn ET - 2. Aufl. ER - TY - JOUR A1 - Flick, T. A1 - Glitza, K.-W. A1 - Kappen, G. C. A1 - Mättig, P. A1 - Möller, J. A1 - Sanny, B. T1 - Gbit/s data transmission on carbon fibres JF - Journal of Instrumentation Y1 - 2016 U6 - http://dx.doi.org/10.1088/1748-0221/11/03/P03012 SN - 1748-0221 IS - 11 SP - 1 EP - 11 ER - TY - JOUR A1 - Franscisco, M A1 - Ortuno, Carolina A1 - Torres, Ignacio A1 - Rojas, Peter T1 - New trends in biomedical engineering and bioinformatics applied to biomedicine - special issue of IWBBIO 2014 JF - BioMedical Engineering OnLine Y1 - 2014 U6 - http://dx.doi.org/10.1186/1475-925X-14-S2-I1 ER - TY - CHAP A1 - Freiling, Felix A1 - Schinzel, Sebastian T1 - Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications T2 - IFIP sec2011 - Future Challenges in Security and Privacy for Academia and Industry Y1 - 2011 SN - 978-3-642-21423-3 U6 - http://dx.doi.org/10.1007/978-3-642-21424-0_4 SP - 41 EP - 55 PB - Springer, Berlin, Heidelberg ET - Volume 354 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Becker, H.-W. A1 - Rogalla, D. A1 - Singer, F. A1 - Brinkmann, N. A1 - Fritz, S A1 - Hammud, Adnan A1 - Keller, P. A1 - Skorka, D. A1 - Sommer, D. A1 - Weiß, C. A1 - Flege, S. A1 - Hahn, Giso A1 - Job, Reinhard A1 - Terheiden, Barbara T1 - Influence of post hydrogenation upon electrical, optical and structural properties of hydrogen less sputter deposited amorphous silicon JF - Thin Solid Films Y1 - 2016 U6 - http://dx.doi.org/10.1016/j.tsf.2015.11.063 VL - 598 SP - 161 EP - 169 ER - TY - CHAP A1 - Gerke, Sebastian A1 - Becker, Hans-Werner A1 - Rogalla, Detlef A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Investigation of Hydrogen Dependent Long-Time Thermal Characteristics of PECV-Deposited Intrinsic Amorphous Layers of Different Morphologies T2 - Proceedings of the 28th European Photovoltaic Solar Energy Conference and Exhibition Y1 - 2014 SP - 9 EP - 12 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Becker, Hans-Werner A1 - Rogalla, Detlef A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Morphology and Hydrogen in Passivating Amorphous Silicon Layers JF - Energy Procedia Y1 - 2015 U6 - http://dx.doi.org/10.1016/j.egypro.2015.07.112 VL - 77 SP - 791 EP - 798 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Becker, Hans-Werner A1 - Rogalla, Detlef A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - About Nuclear Resonant Reaction Analysis for Hydrogen Investigations in Amorphous Silicon Layers JF - Energy Proceedia Y1 - 2015 U6 - http://dx.doi.org/10.1016/j.egypro.2015.12.301 VL - 84 SP - 99 EP - 104 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Becker, Hans-Werner A1 - Rogalla, Detlef A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Model based prediction of the trap limited diffusion of hydrogen in post-hydrogenated amorphous silicon JF - Physika Status Solidi (RRL) Y1 - 2016 U6 - http://dx.doi.org/10.1002/pssr.201600303 SP - 1 EP - 5 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Bias-plasma for RF magnetron sputter deposition of passivating amorphous silicon layers JF - Energy Procedia Y1 - 2015 U6 - http://dx.doi.org/10.1016/j.egypro.2015.12.302 VL - 77 SP - 75 EP - 82 ER - TY - CHAP A1 - Gerke, Sebastian A1 - Herguth, Axel A1 - Brinkmann, Nils A1 - Hahn, Giso A1 - Job, Reinhart T1 - Evaluation of Capacitance-Voltage Spectroscopy by Correlation with Minority Carrier Lifetime Measurements of PECV-Deposited Intrinsic Amorphous Layers T2 - Proceedings of the 28th European Photovoltaic Solar Energy Conference and Exhibition Y1 - 2013 SN - 3-936338-33-7 SP - 2600 EP - 2603 ER - TY - JOUR A1 - Gerke, Sebastian A1 - Micard, Gabriel A1 - Job, Reinhart A1 - Hahn, Giso A1 - Terheiden, Barbara T1 - Capacitance-voltage spectroscopy and analysis of dielectric intrinsic amorphous silicon thin films JF - Physica Status Solidi (c) Y1 - 2016 U6 - http://dx.doi.org/10.1002/pssc.201600019 SP - 1 EP - 5 ER - TY - CHAP A1 - Gierling, Markus A1 - Dresen, Christian A1 - Eich, Hans A1 - Mittman, Karin A1 - Schinzel, Sebastian A1 - Haverkamp, Uwe T1 - Analysis and consequences of an imaging process concerning the cyber security of a networked computer tomography scanner T2 - STRAHLENTHERAPIE UND ONKOLOGIE KW - Cyber Security KW - networked computer tomography scanner Y1 - 2018 SP - 185 EP - 186 ER - TY - JOUR A1 - Gierling, Markus A1 - Saatjohann, Christoph A1 - Dresen, Christian A1 - Köbe, Julia A1 - Rath, Benjamin A1 - Eckardt, Lars A1 - Schinzel, Sebastian T1 - Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk JF - 86. Jahrestagung und Herztage 2020 der DGK N2 - Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks. Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible). Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks. Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices. KW - Cyber Security KW - Cardiac Implantable Devices Y1 - 2020 U6 - http://dx.doi.org/10.1007/s00392-020-01621-0 VL - Band 109, Supplement 1, April 2020 SP - 1 EP - 2 ER - TY - GEN A1 - Glösekötter, P. T1 - Wireless Sensor N2 - Wireless Sensor Y1 - 2013 U6 - http://dx.doi.org/10.25974/fhms-712 PB - FH Münster ER - TY - GEN A1 - Glösekötter, P. T1 - Embedded Systems N2 - Embedded Systems Y1 - 2013 U6 - http://dx.doi.org/10.25974/fhms-711 PB - FH Münster ER - TY - GEN A1 - Glösekötter, P. T1 - Ultimas tendencias en sistemas empotrados N2 - Ultimas tendencias en sistemas empotrados Y1 - 2013 U6 - http://dx.doi.org/10.25974/fhms-710 PB - FH Münster ER - TY - GEN A1 - Glösekötter, P. T1 - Wireless Sensor Networks N2 - Wireless Sensor Networks Y1 - 2013 U6 - http://dx.doi.org/10.25974/fhms-709 PB - FH Münster ER - TY - GEN A1 - Glösekötter, P. T1 - On the Way to Nanoelectronics, Institute of Computer Engineering, University Lübeck, Germany, April 27 Y1 - 2007 ER - TY - GEN A1 - Glösekötter, P. T1 - From Transistors to Molecular and Quantum Devices?, invited TechTalk on Information Processing Technologies at Intel Corp. Braunschweig, Germany, September 18 Y1 - 2009 ER - TY - GEN A1 - Glösekötter, P. T1 - Silicon nanoelectronics and mobile broadband wireless technologies, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, March Y1 - 2005 ER - TY - GEN A1 - Glösekötter, P. T1 - Information processing Technologies: From Transistors to Molecular and Quantum Devices, EMicro 2007, May 5 - 9, UFRGS, Porto Alegre, RS, Brazil Y1 - 2007 ER - TY - BOOK A1 - Glösekötter, P. T1 - Resonanz-Tunneldioden und Heterobipolartransistoren in dynamischen Digitalschaltungen hoher Funktionsdichte Y1 - 2002 CY - University of Dortmund ET - Dissertation ER - TY - GEN A1 - Glösekötter, P. T1 - Aspects of Micro- and Nanosystems for Wireless Health Monitoring Applicaitons, Departamento de Arquitectura Tecnologa de Computadores, Universidad de Granada, Spain, September Y1 - 2010 ER - TY - CHAP A1 - Glösekötter, P. A1 - Berekovic, M. A1 - Wirth, G. I. T1 - NBTI Degradation and Resilient Circuit Design T2 - Workshop on Impact of Process Variability on Design and Test, held at Design, Automation and Test in Europe Conference Y1 - 2008 CY - Munich ET - March 10-14 ER - TY - CHAP A1 - Glösekötter, P. A1 - Greveler, U. A1 - Wirth, G. I. T1 - Device Degradation and Resilient Computing T2 - IEEE International Symposium on Circuits and Systems Y1 - 2008 CY - Seattle, USA ET - May 18-21 ER - TY - CHAP A1 - Glösekötter, P. A1 - Kanstein, A. A1 - Jung, S. A1 - Goser, K. F. T1 - Implementation of a RBF Network Based on Possibilistic Reasoning, ISSN 1089-6503 T2 - Proceedings of the 24th EUROMICRO conference Y1 - 1998 SN - 0-8186-8646-4 SP - 677 EP - 682 CY - Västeras, Sweden ET - August 25-27 ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Associative Matrix for Nano-scale Integratd Circuits T2 - 7th International Conference on Microelectronics for Neural, Fuzzy and Bio-Inspired Systems (MicroNeuro) Y1 - 1999 SP - 352 EP - 358 PB - IEEE Computer Society Press, Los Alamitos, CA CY - Granada, Spain ET - March ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Design of Arithmetic Circuits Using the RTBT T2 - ITG-Fachbericht 162, Mikroelektronik für die Informationstechnik Y1 - 2000 SN - 3-8007-2586-X SP - 147 EP - 150 ET - Nov. 20-21 ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Threshold Logic Circuit Design using the RTBT T2 - Kleinheubacher Berichte Y1 - 2000 ET - Sept. 25-29 ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. A1 - Wirth, G. I. A1 - Prost, W. A1 - Auer, U. A1 - Agethen, M. A1 - Tegude, F. J. T1 - Digital Circuit Design Based on the Resonant-Tunneling-Hetero-Junction-Bipolar-Transistor T2 - SBCCI Y1 - 2000 CY - Manaus, Brasil ET - Sept. 18-24 ER - TY - CHAP A1 - Glösekötter, P. A1 - Prost, W. A1 - Pacha, C. A1 - Kim, S. O. A1 - van Husen, H. A1 - Reimann, T. A1 - Tegude, F.- J. A1 - Goser, K. F. T1 - Design and Simulation of Pseudo Dynamic Logic Circuits Based on RTBTs T2 - 13th Workshop on Physical Simulation of Semiconductor Devices Y1 - 2001 CY - Ilkley, West Yorkshire, UK ET - March 25-26 ER - TY - JOUR A1 - Glösekötter, P. A1 - Prost, W. A1 - Pacha, C. A1 - Kim, S. O. A1 - van Husen, H. A1 - Reimann, T. A1 - Tegude, F.- J. A1 - Goser, K. F. T1 - Circuit and Application Asepects of Tunneling Devices in a MOBILE configuration JF - Special Issue of the International Journal of Circuit Theory and Applications "Nanoelectronic Circuit", 31:83-103 (invited paper) Y1 - 2003 ER - TY - CHAP A1 - Glösekötter, P. A1 - Prost, W. A1 - Pacha, C. A1 - Kim, S. O. A1 - van Husen, H. A1 - Reimann, T. A1 - Tegude, F.- J. A1 - Goser, K. F. T1 - Asynchronous Circuit Design Based on the RTBT Monostable-Bistable-Logic-Transiton-Element (MOBILE) T2 - 15th Symposium on Integrated Circuits and System Design, Chip in the Pampa Y1 - 2002 CY - Porto Alegre, RS, Brazil ET - Sept. 9-14 ER - TY - CHAP A1 - Glösekötter, P. A1 - Prost, W. A1 - Pacha, C. A1 - Kim, S. O. A1 - van Husen, H. A1 - Reimann, T. A1 - Tegude, F.- J. A1 - Goser, K. F. T1 - Pseudo Dynamic Gate Design based on the Resonant-Tunneling-Bipolar-Transistor (RTBT) T2 - 32nd European Solid-State Device Research Conference (ESSDERC) Y1 - 2002 CY - Florence, Italy ET - Sept. 24-26 ER - TY - CHAP A1 - Glösekötter, Peter T1 - Hochintegrierte Mikro- und Nanosystem T2 - Workshop Nanotechnologie-Verbund NRW e.V. N2 - Die Beiträge, der Konferenz: • Nanotechnologie –Von Wunder-Materialien und solchen die es werden wollen • Mikrotechnik –to improve the qualityof live • Quantum Sensing for Industrial Applications • Geordnete Defekte in Graphit: Ein Fahrplan in Richtung Raumtemperatur Supraleitung • Funktionale mikro-und nanostrukturierte Folien als Bestandteil hochintegrierter Systeme KW - Hochintegrierte Mikro- und Nanosysteme Y1 - 2019 ER - TY - CHAP A1 - Gonzalez, Jesús A1 - Penalver, Miguel T1 - Vi Edición De Las Jornadas De Computacion Empotrada (JCE 2015) Y1 - 2015 SN - 978-84-16017-54-6 PB - Pedro del Río Obejo (Copisterías Don Folio) ER - TY - CHAP A1 - Goser, K. A1 - Glösekötter, P. A1 - Dienstuhl, J. T1 - Nanoelektronik und Nanosysteme: Von Transistoren zu Molekular und Quanten- bauelementen, Chinesische Ausgabe Y1 - 2006 SN - 7-5605-2178-9 PB - Xi'an Jiaotong University Press ER - TY - CHAP A1 - Goser, K. A1 - Glösekötter, P. A1 - Dienstuhl, J. T1 - Nanoelectronics and Nanosystems - From Transistors to Molecular and Quantum Devices Y1 - 2004 SN - 3-540-40443-0 PB - Springer CY - Berlin, Heidelberg, New York ER - TY - CHAP A1 - Gómez Zuluaga, Mauricio Andrés A1 - Ordikhani, Ahmad A1 - Bauer, Christoph A1 - Glösekötter, Peter T1 - Development and implementation of a neural network-based abnormal state prediction system for a piston pump T2 - IWANN2021 N2 - Piston pumps play a key role in factory automation and their availability is very critical for the smooth running of production processes. Modern installations, such as production plants and machines, are becoming increasingly complex. Therefore, the probability of a complete system failure due to a single critical component also increases. Maintenance processes with intelligent devices are therefore very important to achieve maximum economic efficiency and safety. Periodic or continuous monitoring of system components provides key information about the current physical state of the system, enabling early detection of emerging failures. Knowledge of future failures makes it possible to move from the concept of preventive maintenance to intelligent predictive maintenance. In this way, consequential damage and complete system failure can be avoided, maximizing system availability and safety. This paper reflects the development and implementation of a neural network system for abnormal state prediction of piston pumps. After a short introduction into piston pumps and their potential abnormal states, statistical and periodical analysis are presented. Then the design and implementation of suitable neural networks are discussed. Finally, a conclusion is drawn and the observed accuracies as well as potential next steps are discussed. KW - Development and implementation Y1 - 2021 SN - 978-3-030-85029-6 U6 - http://dx.doi.org/10.1007/978-3-030-85030-2_24 PB - Springer Nature Switzerland AG 2021 ER - TY - CHAP A1 - Götzfried, J. A1 - Eckert, M. A1 - Müller, T. A1 - Schinzel, S. T1 - Cache Attacks on Intel SGX T2 - EuroSec'17 Y1 - 2017 SN - 978-1-4503-4935-2/ U6 - http://dx.doi.org/10.1145/3065913.3065915 PB - ACM CY - Belgrade, Serbia ER - TY - CHAP A1 - Heller, Andreas A1 - Horsthemke, Ludwig A1 - Gebing, Marcel A1 - Kappen, Götz A1 - Glösekötter, Peter T1 - GNSS based Automatic Anchor Positioning in Real Time Localization Systems T2 - Proceedings ITISE-2019. Granada, 25th-27th September 2019 N2 - This work describes the setup of an ultrawideband (UWB) realtime localization system (RTLS) in which the determination of anchor coordinates is automated by assistance of global navigation satellite systems (GNSS). KW - GNSS Y1 - 2019 SN - 978-84-17970-78-9 SP - 1068 EP - 1073 CY - Granada (Spain) ER - TY - CHAP A1 - Heller, Andreas A1 - Horsthemke, Ludwig A1 - Glösekötter, Peter T1 - Design, Implementation, and Evaluation of a Real Time Localization System for the Optimization of Agitation Processes T2 - IESS, Friedrichshafen N2 - This work describes the setup of an ultrawideband (UWB) realtime localization system (RTLS) for tracking of particles.We describe how the RTLS obtains distances and positions through radio waves and the setup and evaluation of a real world system is stated in detail. In the proposed system the particles track a subtrates surface ow inside a biogas plant for veri� cation of agitation processes. KW - UWB - RTLS - Biogas plant optimization Y1 - 2019 ER - TY - JOUR A1 - Herguth, Axel A1 - Horbelt, Renate A1 - Wilking, Svenja A1 - Job, Reinhart A1 - Hahn, Giso T1 - Comparison of BO Regeneration dynamics in PERC and Al-BSF solar cells JF - Energy Procedia Y1 - 2015 U6 - http://dx.doi.org/10.1016/j.egypro.2015.07.012 VL - 77 SP - 75 EP - 82 ER - TY - CHAP A1 - Hoffmann, F. A1 - Löchte, A. A1 - Rebel, G. A1 - Krimphove, C. A1 - Glösekötter, P. T1 - Degradation aware energy storage using hybrid capacitors T2 - 2nd IEEE Energycon Conference & Exhibition Y1 - 2012 SN - 978-1-4673-1452-7 CY - Florence, Italy ET - September 9-12 2012 ER - TY - JOUR A1 - Homrighausen, Jonas A1 - Horsthemke, Ludwig A1 - Pogorzelski, Jens A1 - Trinschek, Sarah A1 - Glösekötter, Peter A1 - Gregor, Markus T1 - Edge-Machine-Learning-Assisted Robust Magnetometer Based on Randomly Oriented NV-Ensembles in Diamond JF - Sensors N2 - Quantum magnetometry based on optically detected magnetic resonance (ODMR) of nitrogen vacancy centers in nano- or micro-diamonds is a promising technology for precise magnetic-field sensors. Here, we propose a new, low-cost and stand-alone sensor setup that employs machine learning on an embedded device, so-called edge machine learning. We train an artificial neural network with data acquired from a continuous-wave ODMR setup and subsequently use this pre-trained network on the sensor device to deduce the magnitude of the magnetic field from recorded ODMR spectra. In our proposed sensor setup, a low-cost and low-power ESP32 microcontroller development board is employed to control data recording and perform inference of the network. In a proof-of-concept study, we show that the setup is capable of measuring magnetic fields with high precision and has the potential to enable robust and accessible sensor applications with a wide measuring range. Y1 - 2023 UR - https://www.mdpi.com/1424-8220/23/3/1119 U6 - http://dx.doi.org/10.3390/s23031119 VL - 23 IS - 3 ER - TY - JOUR A1 - Horbelt, Renate A1 - Ebert, Stefanie A1 - Ulbikaite, Vaidvile A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Al-density variation as one driving force for void formationin PERC solar cells JF - Physica Status Solidi (RRL) Y1 - 2016 U6 - http://dx.doi.org/10.1002/pssr.201600078 VL - 10 IS - 7 SP - 515 EP - 519 ER - TY - JOUR A1 - Horbelt, Renate A1 - Giso, Hahn A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Void formation in PERC solar cells and their impact on the electrical cell parameters verified by luminescence and scanning acoustic microscope measurements JF - Energy Proceedia Y1 - 2015 U6 - http://dx.doi.org/10.1016/j.egypro.2015.12.294 VL - 84 SP - 47 EP - 55 ER - TY - CHAP A1 - Horbelt, Renate A1 - Herguth, Axel A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Temperature Dependence of Void Formation in PERC Cells and their Spatially Resolved Detection by Combining Scanning Acoustic Microscopy and Electroluminescence Measurements T2 - Proceedings of the 29th European Photovoltaic Solar Energy Conference and Exhibition Y1 - 2014 SP - 427 EP - 432 ER - TY - JOUR A1 - Horbelt, Renate A1 - Micard, Gabriel A1 - Keller, Phillip A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Characterization of local Al-contacts by light beam induced current measurements and their verification by 2D simulation using flexPDE JF - Physica Status Solidi (a) Y1 - 2016 U6 - http://dx.doi.org/10.1002/pssa.201532753 VL - 213 IS - 5 SP - 1317 EP - 1323 ER -