TY - CHAP A1 - Heller, Andreas A1 - Horsthemke, Ludwig A1 - Glösekötter, Peter T1 - Design, Implementation, and Evaluation of a Real Time Localization System for the Optimization of Agitation Processes T2 - IESS, Friedrichshafen N2 - This work describes the setup of an ultrawideband (UWB) realtime localization system (RTLS) for tracking of particles.We describe how the RTLS obtains distances and positions through radio waves and the setup and evaluation of a real world system is stated in detail. In the proposed system the particles track a subtrates surface ow inside a biogas plant for veri� cation of agitation processes. KW - UWB - RTLS - Biogas plant optimization Y1 - 2019 ER - TY - JOUR A1 - Löchte, Andre A1 - Thranow, Jan-Ole A1 - Gebing, Marcel A1 - Horsthemke, Ludwig A1 - Glösekötter, Peter T1 - Forschungsprojekt Zink-Luft-Akkumulator an der FH Münster JF - VDI Ingenieur forum N2 - Die wachsenden Anteile fluktuierender rege­nerativer Energien in der Energieversorgung (bis 2020 sollen 30 % und 2050 sogar So % des Stroms aus regenerativen Energiequellen stammen) sowie die Steigerung der Elektro­mobilität machen deutlich: Das Thema der Zwischenspeicherung elektrischer Energie ist von höchster gesellschaftlicher Relevanz und verlangt zwingend nach einer Lösung. Neue Technologien, die umweltfreundlich, sicher, leistungsfähig und bezahlbar zugleich sind, müssen deshalb entwickelt werden. KW - Zink-Luft-Akkumulator Y1 - 2020 VL - H 45620 IS - 2/2020 SP - 50 EP - 51 ER - TY - CHAP A1 - Meyer, Christopher A1 - Somorovsky, Juraj A1 - Weiss, Eugen A1 - Schwenk, Jörg A1 - Schinzel, Sebastian A1 - Tews, Erik T1 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. T2 - 23rd USENIX Security Symposium (USENIX Security 14) Y1 - 2014 SN - ISBN 978-1-931971- SP - 733 EP - -748 PB - USENIX Association CY - San Diego, CA ER - TY - JOUR A1 - Beckschulze, E. A1 - Salewski, F. A1 - Kowalewski, S. T1 - A Comparison of Dual-Core Approaches for Safety-Critical Automotive Applications JF - SAE International Journal of Passenger Cars - Electronic and Electrical Systems Y1 - 2009 U6 - https://doi.org/10.4271/2009-01-0761 IS - 1 SP - 301 EP - 308 ER - TY - JOUR A1 - Dreibholz, T. A1 - Rüngeler, I. A1 - Seggelmann, R. A1 - Tüxen, M. A1 - Rathgeb, E. A1 - Stewart, R. T1 - Stream Control Transmission Protocol: Past, Current, and Future Standardization Activities JF - IEEE Communications Magazine Y1 - 2011 VL - 49 IS - 4 SP - 82 EP - 88 ER - TY - CHAP A1 - Hoffmann, F. A1 - Löchte, A. A1 - Rebel, G. A1 - Krimphove, C. A1 - Glösekötter, P. T1 - Degradation aware energy storage using hybrid capacitors T2 - 2nd IEEE Energycon Conference & Exhibition Y1 - 2012 SN - 978-1-4673-1452-7 CY - Florence, Italy ET - September 9-12 2012 ER - TY - GEN A1 - Estevez, Francisco A1 - Rebel, Gregor A1 - Jose, M. A1 - Castillo-Secilla, Jesús A1 - Gonzáles, Peter T1 - Cognitive Radio as solution for Saturation Problem in Wireless Sensor Networks: A survey of Cognitive Radio policies Y1 - 2014 ER - TY - CHAP A1 - Saatjohann, Christoph A1 - Ising, Fabian A1 - Gierlings, Matthias A1 - Noss, Dominik A1 - Schimmler, Sascha A1 - Klemm, Alexander A1 - Grundmann, Leif A1 - Frosch, Tilman A1 - Schinzel, Sebastian T1 - Sicherheit medizintechnischer Protokolle im Krankenhaus T2 - SICHERHEIT 2022. Hrsg. Christian Wressnegger, Delphine Reinhardt, Thomas Barber, Bernhard C. Witt, Daniel Arp, Zoltan Mann N2 - Medizinische Einrichtungen waren in den letzten Jahren immer wieder von Cyber-Angriffen betroffen. Auch wenn sich diese Angriffe derzeit auf die Office-IT-Infrastruktur der Einrichtungen konzentrieren, existiert mit medizinischen Systemen und Kommunikationsprotokollen eine weitere wenig beachtete Angriffsoberfläche. In diesem Beitrag analysieren wir die weit verbreiteten medizintechnischen Kommunikations-Protokolle DICOM und HL7 sowie Protokoll-Implementierungen auf ihre IT-Sicherheit. Dafür präsentieren wir die Ergebnisse der Sicherheitsanalyse der DICOM- und HL7-Standards, einen Fuzzer “MedFUZZ” für diese Protokolle sowie einen Schwachstellenscanner “MedVAS”, der Schwachstellen in medizintechnischen Produktivumgebungen auffinden kann. Y1 - 2022 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-150072 SN - 978-3-88579-717-3 SN - 1617-5468 PB - Gesellschaft für Informatik e.V. CY - Bonn ER - TY - JOUR A1 - Estévez, F. A1 - Rebel, G. A1 - González, J. A1 - Glösekötter, P. T1 - DARP: Dynamic and adaptive radio protocol for Wireless Sensor Networks JF - Electronics Letters Y1 - 2014 VL - 01/2014 ER - TY - CHAP A1 - Rebel, G. A1 - Estevez, F. A1 - Schulz, I. A1 - Glösekötter, P. T1 - Fast Constant Time Memory Allocator for inter Task Communication in Ultra Low Energy Embedded Systems T2 - 9th Conference on Ph.D. Research in Microelectonics & Electronics N2 - Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems Y1 - 2013 SN - 978-1-4673-4580-4 U6 - https://doi.org/10.25974/fhms-708 SP - 149 PB - IEEE ER - TY - GEN A1 - Glösekötter, P. T1 - From Transistors to Molecular and Quantum Devices?, invited TechTalk on Information Processing Technologies at Intel Corp. Braunschweig, Germany, September 18 Y1 - 2009 ER - TY - CHAP A1 - Mertens, K. T1 - "Do Photovoltaics make sense in countries like Germany?", Invited Paper zur 7th International Energy and Sustainability Confrerence, Cologne Institute for Renewable Energy CIRE der TH Köln, 17.05.2018, Köln Y1 - 2018 ER - TY - JOUR A1 - Pineres-Espitia, G. A1 - Cama-Pinto, A. A1 - De, D. A1 - rosa, la A1 - Morron, F. A1 - Estevez, D. T1 - Design of a low cost weather station for detecting environmental changes Y1 - 2017 SN - 0798 1015 VL - Vol. 38 IS - Revista Espacios ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. T1 - Design of Arithmetic Circuits Using the RTBT T2 - ITG-Fachbericht 162, Mikroelektronik für die Informationstechnik Y1 - 2000 SN - 3-8007-2586-X SP - 147 EP - 150 ET - Nov. 20-21 ER - TY - CHAP A1 - Völker, Timo A1 - Tüxen, Michael T1 - Packet Too Big Detection and its Integration into QUIC T2 - 2023 16th International Conference on Signal Processing and Communication System (ICSPCS) N2 - A communication over an Internet Protocol (IP) based network fails if an endpoint sends packets that are too big to reach their destination and if the sender is unable to detect that. The node on the path that drops these packets should respond with a Packet Too Big (PTB) message. However, multiple scenarios exist in which the sender will not receive a PTB message. Even if it does, it refrains from using the information in case it suspects that a potential attacker forged the message. In particular, we are not aware of any implementation of the secure transport protocol QUIC (e.g., used by HTTP/3) that processes PTB messages. In this paper, we present a novel parameterizable PTB detection algorithm for reliable transport protocols that does not depend on PTB messages. We further describe how to integrate our algorithm into QUIC, present results from an evaluation using the algorithm within a QUIC simulation model and, based on these results, suggest concrete parameter values. KW - PMTUD KW - PTB KW - black hole KW - transport protocol KW - QUIC Y1 - 2023 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-174119 SN - 979-8-3503-3351-0 PB - IEEE CY - New York, NY, USA ER - TY - CHAP A1 - Jelinek, Moriz A1 - Johannes, G. A1 - Laven, Naveen A1 - Ganagona, Goud A1 - Job, Reinhart A1 - Schustereder, Werner A1 - Schulze, Hans-Joachim A1 - Rommel, Matthias A1 - Frey, Lothar T1 - Metastable Defects in Proton Implanted and Annealed Silicon T2 - P. Pichler (Editor): Gettering and Defect Engineering in Semiconductor Technology XVI (GADEST 2015) Y1 - 2016 SN - 978-3-03835-608-0 SP - 169 EP - 174 PB - Trans Tech Publications Ltd. CY - Zürich ER - TY - CHAP A1 - Glösekötter, P. A1 - Pacha, C. A1 - Goser, K. F. A1 - Wirth, G. I. A1 - Prost, W. A1 - Auer, U. A1 - Agethen, M. A1 - Tegude, F. J. T1 - Digital Circuit Design Based on the Resonant-Tunneling-Hetero-Junction-Bipolar-Transistor T2 - SBCCI Y1 - 2000 CY - Manaus, Brasil ET - Sept. 18-24 ER - TY - CHAP A1 - Rebel, G. A1 - Estevez, F. A1 - Schulz, I. A1 - Glösekötter, P. T1 - Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems T2 - 9th Conferrence on Ph.D. Research in Microelectronics & Electronics Y1 - 2013 SN - 978-1-4673-4580-4 U6 - https://doi.org/10.1109 SP - 149 EP - 152 PB - Villach, Austria ET - 24th - 27th June 201 ER - TY - JOUR A1 - Estévez, F. A1 - García, J. M. A1 - Secilla-Castillo, J. M. A1 - González, J. A1 - Glösekötter, P. T1 - Enabling validation of the IEEE 802.15.4 performance through a new dual-radio OMNeT++ model JF - Elektronika IR Electrotechnika Date: Accepted - Pending of Publication Y1 - 2016 SN - 1392-1215 VL - Vol. 22, No 3 IS - Impact Factor: 0.561 ER - TY - GEN A1 - Mertens, Konrad T1 - ,,Photovoltaik: Wie kommt die Sonne in die Steckdose?", Vortrag VDI Schülerforum, Münster, 13.9.2006. Y1 - 2006 ER - TY - CHAP A1 - Ising, Fabian A1 - Poddebniak, Damian A1 - Kappert, Tobias A1 - Saatjohann, Christoph A1 - Schinzel, Sebastian T1 - Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption T2 - 32nd USENIX Security Symposium (USENIX Security 23) N2 - S/MIME and OpenPGP use cryptographic constructions repeatedly shown to be vulnerable to format oracle attacks in protocols like TLS, SSH, or IKE. However, format oracle attacks in the End-to-End Encryption (E2EE) email setting are considered impractical as victims would need to open many attacker-modified emails and communicate the decryption result to the attacker. But is this really the case? In this paper, we survey how an attacker may remotely learn the decryption state in email E2EE. We analyze the interplay of MIME and IMAP and describe side-channels emerging from network patterns that leak the decryption status in Mail User Agents (MUAs). Concretely, we introduce specific MIME trees that produce decryption-dependent network patterns when opened in a victim’s email client. We survey 19 OpenPGP- and S/MIME-enabled email clients and four cryptographic libraries and uncover a side-channel leaking the decryption status of S/MIME messages in one client. Further, we discuss why the exploitation in the other clients is impractical and show that it is due to missing feature support and implementation quirks. These unintended defenses create an unfortunate conflict between usability and security. We present more rigid countermeasures for MUA developers and the standards to prevent exploitation. Y1 - 2023 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-183333 UR - https://www.usenix.org/conference/usenixsecurity23/presentation/ising SN - 978-1-939133-37-3 PB - USENIX Association ER - TY - CHAP A1 - Puschner, Endres A1 - Saatjohann, Christoph A1 - Willing, Markus A1 - Dresen, Christian A1 - Köbe, Julia A1 - Rath, Benjamin A1 - Paar, Christof A1 - Eckardt, Lars A1 - Haverkamp, Uwe A1 - Schinzel, Sebastian T1 - Listen to Your Heart: Evaluation of the Cardiologic Ecosystem T2 - ARES 2021: The 16th International Conference on Availability, Reliability and Security N2 - Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients’ health. This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices. Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients’ rights and companies’ obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem. Y1 - 2021 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-139012 ER - TY - THES A1 - Schleifnig, Rüdiger T1 - Ein firewall-geschützter Internet-Server unter Windows NT N2 - Immer mehr Menschen nutzen das Internet für private oder geschäftliche Zwecke. Immer mehr Firmen und Behörden wissen die Vorteile des Intranets zu schätzen. An vielen Stellen werden heutzutage die Vorteile von beiden Netzen verknüpft, um möglichst effektives Arbeiten zu ermöglichen; Stichworte sind E-Mail, Online-Shopping, Online-Banking, Internet-Surfing, Datenkonsistenz, verteilte Systeme und Client-Server-Architekturen. Immer weniger Menschen sind jedoch in der Lage, die komplexen Strukturen, die diese neuen Techniken mit sich bringen oder durch die sie erst möglich werden, zu durchschauen. Auf der Gegenseite der vielen Vorteile, die diese nahezu grenzenlosen Kommunikationsmöglichkeiten bieten, stehen viele nicht zu unterschätzende Sicherheitsrisiken. Anders als bei den positiven Seiten dieser Entwicklung wissen aber viele Benutzer nichts von den Risiken oder unterschätzen und ignorieren diese. In dieser Diplomarbeit können aufgrund der knapp bemessenen Zeit, vorgesehen für die Diplomarbeit an der Fachhochschule sind etwa drei Monate, keine eigenständigen Untersuchungen über Viren oder andere Bedrohungen von Computersystemen durchgeführt werden. Diese Untersuchungen werden durch eine systematische Recherche, vor allem im Internet, ersetzt. Die Diplomarbeit soll zeigen, dass es sowohl im homogenen wie auch in einem heterogenen Umfeld - der Windows NT Server steht in einem UNIX-dominierten Netzwerk - möglich ist, mit geringem finanziellen und personellen Aufwand einen "relativ" sicheren Netzwerkserver mit Internetanbindung aufzubauen, welcher sowohl Angriffen von innen als auch von außen in einem gewissen Rahmen widerstehen kann. Vollkommene Sicherheit gibt es nicht und maximale Sicherheit wird man in diesem Zeit- und Kostenrahmen nicht erreichen können. Zu erreichen ist aber ein wesentlich höherer Sicherheits-Level als ihn Windows NT standardmäßig mit sich bringt. KW - firewall; Internet-Server Y1 - 1999 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-20 PB - FH Münster ER - TY - GEN A1 - Richert, Peter T1 - Grundlagen der Elektrotechnik N2 - Diese Vorlesung „Grundlagen der Elektrotechnik“ im Studiengang Physikalische Technik beruht im wesentlichen auf den Büchern [MP92], [CW92] und [FB82]. [MP92] Anfängern, besser Fachfremden ist ein Studium von [MP92] empfohlen, das für Studenten des Fachbereiches Wirtschaft ausgelegt ist. [CW92] Bei vorhandenen Grundkenntnissen bietet sich [CW92] an, das über den Stoff der Vorlesung hinaus die Elektrotechnik theoretisch erläutert. [FB82] Aus dem Bereich Maschinenbau kommt [FB82], das für den Teil der elektrischen Maschinen als Vorlage diente. Es kann aber auch Fachfremden für ein allgemeines Verständnis empfolen werden. KW - Elektrotechnik KW - Grundlagen Y1 - 2000 U6 - https://doi.org/10.25974/fhms-5 PB - FH Münster ER - TY - JOUR A1 - Khademi, Naeem A1 - Ros, David A1 - Welzl, Michael A1 - Bozakov, Zdravko A1 - Brunstrom, Anna A1 - Fairhurst, Gorry A1 - Grinnemo, Karl-Johan A1 - Hayes, David A. A1 - Hurtig, Per A1 - Jones, Tom A1 - Mangiante, Simone A1 - Tüxen, Michael A1 - Weinrank, Felix T1 - NEAT: A Platform- and Protocol-Independent Internet Transport API JF - IEEE Communications Magazine Y1 - 2017 SN - 0163-6804 VL - 55 IS - 6 SP - 46 EP - 54 ER - TY - CHAP A1 - Horbelt, Renate A1 - Herguth, Axel A1 - Hahn, Giso A1 - Job, Reinhart A1 - Terheiden, Barbara T1 - Temperature Dependence of Void Formation in PERC Cells and their Spatially Resolved Detection by Combining Scanning Acoustic Microscopy and Electroluminescence Measurements T2 - Proceedings of the 29th European Photovoltaic Solar Energy Conference and Exhibition Y1 - 2014 SP - 427 EP - 432 ER - TY - CHAP A1 - Salewski, F. A1 - Kowalewski, S. T1 - The Effect of Hardware Platform Selection on Safety-Critical Software in Embedded Systems: Empirical Evaluations T2 - Proc. IEEE Symposium on Industrial Embedded Systems (SIES 07) Y1 - 2007 U6 - https://doi.org/10.1109/SIES.2007.4297320 SP - 78 EP - 85 PB - IEEE ER - TY - CHAP A1 - Salewski, F. A1 - Taylor, A. T1 - Fault Handling in FPGAs and Microcontrollers in Safety-Critical Embedded Applications: A Comparative Survey T2 - Proc. 10th Euromicro Conference on Digital System Design (DSD 07) Y1 - 2007 U6 - https://doi.org/10.1109/DSD.2007.4341459 SP - 124 EP - 131 PB - IEEE ER - TY - CHAP A1 - Salewski, F. A1 - Kowalewski, S. T1 - Exploring the Differences of FPGAs and Microcontrollers for their Use in Safety-Critical Embedded Applications T2 - Proc. IEEE Symposium on Industrial Embedded Systems (IES 06) Y1 - 2006 U6 - https://doi.org/10.1109/IES.2006.357483 SP - 1 EP - 4 PB - IEEE ER - TY - THES A1 - Borgmann, Frank A1 - Möllers, Michael T1 - Realisierung und Implementierung einer zentralen, funkgestützten Steuerung der Rollladen eines Einfamilienhauses N2 - Die hier vorliegende Diplomarbeit befasst sich mit dem Thema "Realisierung und Implementierung einer zentralen, funkgestützten Steuerung der Rollladen eines Einfamilienhauses". Die entworfene Schaltung ist kompatibel zu einem bestehenden Funkschaltsystem für Steckdosen und Dimmer. Ein weiterer Zielpunkt dieser Diplomarbeit war, dass die neue Schaltung günstiger herzustellen ist, als schon existierende Systeme. Die Funktionalität eine Rolllade per Taster oder durch eine Funkfernbedienung, auf 433MHz Basis, zu bedienen bzw. zu steuern ist auch gegeben. Durch eine Verkleinerung der Platine bzw. eine Optimierung der Programmierung ist eine Verbesserung der Schaltung möglich. Weitere Funktionen können durch Ergänzung der Hard- und Software hinzugefügt werden. KW - Rollladen KW - Einfamilienhaus Y1 - 2000 U6 - https://doi.org/10.25974/fhms-7 PB - FH Münster ER - TY - GEN A1 - Richert, Peter A1 - Furchert, Peter A1 - Göbel, Wolfgang T1 - Praktikum Grundlagen der Elektrotechnik N2 - Zu den Versuchen existieren Versuchsanleitungen, die die Grundlage zum Versuchsthema, die Geräteliste, die Versuchsschaltungen, die Meßaufgaben und die Fragen zur Auswertungen enthalten. Von den Praktikumsteilnehmern sind die theoretischen Grundlagen der einzelnen Versuche anhand der Versuchsanleitungen und ggf. weitergehender Fachliteratur jeweils vor dem Versuch selbständig zu erarbeiten. Stellt der Praktikumsleiter bei der Versuchsbesprechung fest, daß die Teilnehmer einer Gruppe die Grundlagen des aktuellen Versuches nicht beherrschen, so wird diese Gruppe i.a. von der momentanen Durchführung des Versuches ausgeschlossen und muß diesen Versuch an einem Nachholtermin durchführen. KW - Elektrotechnik Y1 - 2000 U6 - https://doi.org/10.25974/fhms-9 PB - FH Münster ER - TY - CHAP A1 - Mertens, Konrad A1 - Lindenbaum, Josef T1 - Universeller Messadapter für die Soundkarte T2 - Rahman Jamal, Ronald Heinze Virtuelle Instrumente in der Praxis 2010 Y1 - 2010 SN - 978-3-8007-3235-7 SP - 493 EP - 499 PB - Huethig GmbH CY - Berlin ET - 1 ER - TY - CHAP A1 - Glösekötter, P. A1 - Kanstein, A. A1 - Jung, S. A1 - Goser, K. F. T1 - Implementation of a RBF Network Based on Possibilistic Reasoning, ISSN 1089-6503 T2 - Proceedings of the 24th EUROMICRO conference Y1 - 1998 SN - 0-8186-8646-4 SP - 677 EP - 682 CY - Västeras, Sweden ET - August 25-27 ER - TY - BOOK A1 - Effinger, Hans A1 - Preuss, Wolfgang A1 - Wenisch, Günter T1 - Lehr- und Übungsbuch Mathematik für Elektro- und Automatisierungstechniker BT - Mit 177 Beispielen und 302 Aufgaben mit Lösungen Y1 - 1998 SN - 3-446-18978-5 PB - Fachbuchverl. Leipzig im Carl-Hanser-Verl. CY - München [u.a.] ET - 1. Aufl. ER - TY - BOOK A1 - Fischer, Dirk A1 - Thoms-Meyer, Dirk T1 - HGB-Jahresabschluss : Erstellung mit Plausibilitätsbeurteilung 2005/06 BT - Mittelständische Unternehmen. Erläuterungen, Checklisten und Materialien unter Berücksichtigung von § 18 KWG Y1 - 2006 SN - 3-08-363106-5 PB - Stollfuss CY - Bonn ET - 2. Aufl. ER - TY - CHAP A1 - Adhari, H. A1 - Dreibholz, T. A1 - Becke, M. A1 - Rathgeb, E. P. A1 - Tüxen, M. T1 - Evaluation of Concurrent Multipath Transfer over Dissimilar Paths T2 - Proceedings of the 1st International Workshop on Protocols and Applications with Multi-Homing Support (PAMS 2011) Y1 - 2011 SN - 978-1-61284-829-7 SP - 708 EP - 714 CY - Singapore ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Effective Pattern Representation for Safety Critical Embedded Systems T2 - Proc. 2008 International Conference on Computer Science and Software Engineering, vol. 4 Y1 - 2008 U6 - https://doi.org/10.1109/CSSE.2008.739 SP - 91 EP - 97 PB - IEEE CS ER - TY - CHAP A1 - Armoush, A. A1 - Salewski, F. A1 - Kowalewski, S. T1 - Recovery Block with Backup Voting: A New Pattern with Extended Representation for Safety Critical Embedded Systems T2 - Proc. 11th International Conference on Information Technology (ICIT 2008) Y1 - 2008 U6 - https://doi.org/10.1109/ICIT.2008.60 SP - 232 EP - 237 PB - IEEE CS ER - TY - GEN A1 - Mertens, Konrad T1 - „Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?“, Solarkampagne des Kreises Steinfurt, Lengerich, 19.09.2018 KW - Photovoltaik, Solarstrom, Speicher Y1 - 2018 ER - TY - GEN A1 - Job, Reinhart A1 - Ungru, Kathrin T1 - Teaching Electrochemical Energy Storage for Undergraduate Electrical Engineers, Workshop, 7.3.2017, Instituto Federal Rio Grande do Norte (IFRN), Natal, Brasilien Y1 - 2017 ER - TY - GEN A1 - Mertens, Konrad T1 - „Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?“, Solarkampagne des Kreises Steinfurt, Ladbergen, 10.10.2018 KW - Photovoltaik, Solarstrom, Speicher Y1 - 2018 ER - TY - GEN A1 - Richert, Peter T1 - Praktikum Grundlagen der Elektrotechnik N2 - Die vorliegende Praktikumsanleitung ist in wesentlichen Teilen in Inhalt und Layout überarbeitet worden. Dazu haben neben Kollegen auch Studenten beigetragen, deren Ergebnisse Sie nun nutzen können. Um die Qualität weiter zu sichern und den Nutzen zu steigern, bitten wir Sie um folgende Mitarbeit: Sollten Sie bei der Vorbereitung Ihres 1. Versuches inhaltliche Fehler oder Rechtschreib- und Grammatikfehler feststellen, so teilen Sie uns diese bitte mit. Sollten Sie nach Abschluß des Praktikums Wünsche oder Anregungen haben, so teilen Sie uns diese bitte ebenfalls mit. KW - Elektrotechnik Y1 - 2000 U6 - https://doi.org/10.25974/fhms-6 PB - FH Münster ER - TY - GEN T1 - "Lohnt sich Solarstrom für mich als Hausbesitzer heute noch? - Chancen und Potentiale des Eigenverbrauchs", 1. Vortrag, Infoveranstaltung des Kreises Steinfurt, Emsdetten, 02.11.2015 Y1 - 2015 ER - TY - BOOK A1 - Mertens, Konrad T1 - Photovoltaik - Lehrbuch zu Grundlagen, Technologie und Praxis Y1 - 2011 SN - 978-3-446-42172-1 PB - Carl Hanser Verlag CY - München ET - 1 ER - TY - JOUR A1 - Brinkmann, Marcus A1 - Dresen, Christian A1 - Merget, Robert A1 - Poddebniak, Damian A1 - Müller, Jens A1 - Somorovsky, Juraj A1 - Schwenk, Jörg A1 - Schinzel, Sebastian T1 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication JF - 30th USENIX Security Symposium Y1 - 2021 UR - https://www.usenix.org/conference/usenixsecurity21/presentation/brinkmann ER - TY - JOUR A1 - Banos, Oresti A1 - Damas, Miguel A1 - Pomares, Hector A1 - Rojas, Ignacio A1 - Villalonga, Claudia A1 - Glösekötter, Peter T1 - PhysioDroid: Combining Wearable Health Sensors and Mobile Devices for a Ubiquitous, Continuous, and Personal Monitoring JF - Hindawi Publishing Corporation The Scientific World Journal Y1 - 2014 SP - 1 EP - 12 ER - TY - CHAP A1 - Poddebniak, Damian A1 - Ising, Fabian A1 - Böck, Hanno A1 - Schinzel, Sebastian T1 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS in the Email Context T2 - Proceedings of the 30th USENIX Security Symposium, August 11–13, 2021 N2 - TLS is one of today's most widely used and best-analyzed encryption technologies. However, for historical reasons, TLS for email protocols is often not used directly but negotiated via STARTTLS. This additional negotiation adds complexity and was prone to security vulnerabilities such as naive STARTTLS stripping or command injection attacks in the past. We perform the first structured analysis of STARTTLS in SMTP, POP3, and IMAP and introduce EAST, a semi-automatic testing toolkit with more than 100 test cases covering a wide range of variants of STARTTLS stripping, command and response injections, tampering attacks, and UI spoofing attacks for email protocols. Our analysis focuses on the confidentiality and integrity of email submission (email client to SMTP server) and email retrieval (email client to POP3 or IMAP server). While some of our findings are also relevant for email transport (from one SMTP server to another), the security implications in email submission and retrieval are more critical because these connections involve not only individual email messages but also user credentials that allow access to a user's email archive. We used EAST to analyze 28 email clients and 23 servers. In total, we reported over 40 STARTTLS issues, some of which allow mailbox spoofing, credential stealing, and even the hosting of HTTPS with a cross-protocol attack on IMAP. We conducted an Internet-wide scan for the particularly dangerous command injection attack and found that 320.000 email servers (2% of all email servers) are affected. Surprisingly, several clients were vulnerable to STARTTLS stripping attacks. In total, only 3 out of 28 clients did not show any STARTTLS-specific security issues. Even though the command injection attack received multiple CVEs in the past, EAST detected eight new instances of this problem. In total, only 7 out of 23 tested servers were never affected by this issue. We conclude that STARTTLS is error-prone to implement, under-specified in the standards, and should be avoided. Y1 - 2021 UR - https://www.usenix.org/conference/usenixsecurity21/presentation/poddebniak SN - 978-1-939133-24-3 VL - 2021 ER - TY - JOUR A1 - Löchte, Andre A1 - Rojas Ruiz, Ignacio A1 - Glösekötter, Peter T1 - Battery State Estimation with ANN and SVR Evaluating Electrochemical Impedance Spectra Generalizing DC Currents JF - Applied Sciences N2 - The demand for energy storage is increasing massively due to the electrification of transport and the expansion of renewable energies. Current battery technologies cannot satisfy this growing demand as they are difficult to recycle, as the necessary raw materials are mined under precarious conditions, and as the energy density is insufficient. Metal–air batteries offer a high energy density as there is only one active mass inside the cell and the cathodic reaction uses the ambient air. Various metals can be used, but zinc is very promising due to its disposability and non-toxic behavior, and as operation as a secondary cell is possible. Typical characteristics of zinc–air batteries are flat charge and discharge curves. On the one hand, this is an advantage for the subsequent power electronics, which can be optimized for smaller and constant voltage ranges. On the other hand, the state determination of the system becomes more complex, as the voltage level is not sufficient to determine the state of the battery. In this context, electrochemical impedance spectroscopy is a promising candidate as the resulting impedance spectra depend on the state of charge, working point, state of aging, and temperature. Previous approaches require a fixed operating state of the cell while impedance measurements are being performed. In this publication, electrochemical impedance spectroscopy is therefore combined with various machine learning techniques to also determine successfully the state of charge during charging of the cell at non-fixed charging currents. Keywords: electrochemical impedance spectroscopy; artificial neural networks; support vector regression; zinc-air battery; state estimation; state of charge KW - Battery State Estimation Y1 - 2021 SN - 978-84-1117-173-1 U6 - https://doi.org/10.3390/app12010274 VL - 12 IS - 1 SP - 275 ER - TY - JOUR A1 - Löchte, Andre A1 - Heming, Daniel A1 - Gebert, Ole A1 - Horsthemke, Ludwig A1 - Glösekötter, Peter T1 - Oxygen consumption of zinc-air batteries and theirperformance at low oxygen concentration levels JF - 2018 16th Biennial Baltic Electronics Conference (BEC) N2 - Already existing primary Zinc-air batteries providea high energy density. Due to new secondary cells, its tech-nology can become an alternative for energy storage. Sincethese applications require a big amount of storable energy, theoxygen consumption has to be taken into account. This articledetermines the oxygen consumption of zinc-air batteries duringdischarging. Furthermore the performance of zinc-air batteries atlow oxygen concentrations is analyzed. Both aspects are validatedby practical experiments. Y1 - 2018 U6 - https://doi.org/10.1109/BEC.2018.8600972 SP - 1 EP - 4 ER - TY - CHAP A1 - Romero, Adrian A1 - Estevez, Francisco A1 - Rebel, Gregor A1 - Glösekötter, Peter A1 - Conzáles, Jesús T1 - Distance Estimate with Ultra Wide Band in Interior Environments T2 - Proceedings of Jornadas de Computación Empotrada de Espana (JCE) Y1 - 2015 CY - Cordoba (Spain) ER - TY - CHAP A1 - Rebel, Gregor A1 - Estevez, Francisco A1 - Glösekötter, Peter T1 - Energy Efficiency Study of representative Microcontrollers for Wearable Electonics T2 - International Work-Conference on Bioinformatics and Biomedical Engineering Y1 - 2015 SP - 65 EP - 76 PB - Springer International Publishing Switzerland CY - Granada (Spain) ER - TY - CHAP A1 - Willing, Markus A1 - Saatjohann, Christoph A1 - Rath, Benjamin A1 - Schinzel, Sebastian A1 - Eckardt, Lars A1 - Köbe, Julia T1 - Experiences with General Data Protection Regulations and Remote Monitoring of Implantable Rhythm Devices T2 - 87. Jahrestagung der Deutsche Gesellschaft für Kardiologie – Herz‑ und Kreislauforschung e.V Y1 - 2021 U6 - https://doi.org/10.1007/s00392-021-01843-w PB - Springer-Verlag GmbH ER - TY - JOUR A1 - Löchte, Andre A1 - Gebert, Ole A1 - Heming, Daniel A1 - Sanders, Tilmann A1 - Glösekötter, Peter T1 - State of Charge estimation of zinc air batteries using electrochemical impedance spectroscopy JF - Neural Computing and Applications Y1 - 2018 VL - 2018 SP - 1 EP - 9 PB - Springer ER - TY - JOUR A1 - Weiss, Robin A1 - Glösekötter, Peter A1 - Prestes, Edson A1 - Kolberg, Mariana ED - Springer, T1 - Hybridisation of Sequential Monte Carlo Simulation with Non-linear Bounded-error State Estimation Applied to Global Localisation of Mobile Robots JF - Journal of Intelligent & Robotic Systems N2 - Accurate self-localisation is a fundamental ability of any mobile robot. In Monte Carlo localisation, a probability distribution over a space of possible hypotheses accommodates the inherent uncertainty in the position estimate, whereas bounded-error localisation provides a region that is guaranteed to contain the robot. However, this guarantee is accompanied by a constant probability over the confined region and therefore the information yield may not be sufficient for certain practical applications. Four hybrid localisation algorithms are proposed, combining probabilistic filtering with non-linear bounded-error state estimation based on interval analysis. A forward-backward contractor and the Set Inverter via Interval Analysis are hybridised with a bootstrap filter and an unscented particle filter, respectively. The four algorithms are applied to global localisation of an underwater robot, using simulated distance measurements to distinguishable landmarks. As opposed to previous hybrid methods found in the literature, the bounded-error state estimate is not maintained throughout the whole estimation process. Instead, it is only computed once in the beginning, when solving the wake-up robot problem, and after kidnapping of the robot, which drastically reduces the computational cost when compared to the existing algorithms. It is shown that the novel algorithms can solve the wake-up robot problem as well as the kidnapped robot problem more accurately than the two conventional probabilistic filters. KW - Interval analysis · Particle filtering · Kalman filtering · Bayesian filtering · Sequential Monte Carlo simulation · Bounded-error estimation Y1 - 2019 U6 - https://doi.org/10.1007/s10846-019-01118-7 SP - 1 EP - 23 ER - TY - JOUR A1 - Gierling, Markus A1 - Saatjohann, Christoph A1 - Dresen, Christian A1 - Köbe, Julia A1 - Rath, Benjamin A1 - Eckardt, Lars A1 - Schinzel, Sebastian T1 - Reviewing Cyber Security Research of Implantable Medical Rhythm Devices regarding Patients’ Risk JF - 86. Jahrestagung und Herztage 2020 der DGK N2 - Introduction: The recent publication of several critical cyber security issues in cardiac implantable devices and the resulting press coverage upsets affected users and their trust in medical device producers. Reviewing the published security vulnerabilities regarding networked medical devices, it raises the question, if the reporting media, the responsible security researchers, and the producers handle security vulnerabilities appropriately. Are the media reports of security vulnerabilities in medical devices meaningful in a way that patients can assess their respective risk for an attack via the security vulnerability? The collaboration between IT-security experts and clinicians aims at reviewing published security vulnerabilities of rhythm devices, and evaluate overall patients risks. Methodology: We performed a literature review on security vulnerabilities in implantable medical devices with a focus on cardiac devices. We analyzed (Fig. 1) the (1) requirements for an attacker and the (2) technical feasibility and clustered them in three different scenarios: The first scenario requires that the attacker physically approaches a victim with a programming device. The second scenario requires proximity to the victim, e.g., within a few meters. The third and strongest attacker scenario is a remote attack that doesn’t require any physical proximity to the victim. We then compare the attacker scenarios and (3) the overall patients’ risks with the press coverage (overhyped, adequate, underhyped). (4) The resulting overall patients’ risk was rated by clinicians (security vulnerability of patients’ data, dangerous programming possible). Results: Out of the three analyzed incidents, we found one to be underhyped, one to be overhyped, and one was appropriate compared to the medial coverage (Fig. 2). The most occurring technical issues were based on the absence of basic security primitives. The patient damage for all of the analyzed incidents was fatal in the worst-case scenario. Further, the patient damage and the overall patient risks are disjunct due to the missing capability of performing large scale attacks. Conclusion: The resulting overall patients’ risks may not adequately reflect the patient damage in the considered cases. Often, the overall patient risk is not as severe as the necessary attacker capabilities are high and it would require strongly motivated attackers to perform the attack. Therefore, most of the reviewed cases are considered with a smaller overall patient risk than implied by press reports. Reviewing the ongoing IT-Security trends regarding implantable medical devices shows an increasing focus on researching in the field of medical device security. Therefore, further findings in the near future are to be expected. To deal with this fact in a responsible way, proper proactive knowledge management is mandatory. We recommend medical staff to critically reflect reports in mass media due to possible sensationalism. Therefore, we propose a joint approach in combining the technical expertise of cyber security experts with clinical aspects of medical experts, to ensure a solid understanding of a newly published vulnerability. The combination of both communities promises to result in better predictions for patients’ risks from security vulnerabilities in implanted cardiac devices. KW - Cyber Security KW - Cardiac Implantable Devices Y1 - 2020 U6 - https://doi.org/10.1007/s00392-020-01621-0 VL - Band 109, Supplement 1, April 2020 SP - 1 EP - 2 ER - TY - CHAP A1 - Dresen, Christian A1 - Ising, Fabian A1 - Poddebniak, Damian A1 - Kappert, Tobias A1 - Holz, Thorsten A1 - Schinzel, Sebastian ED - Zhou, Jianying T1 - CORSICA: Cross-Origin Web Service Identification T2 - The 15th ACM ASIA Conference on Computer and Communications Security N2 - Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques. Y1 - 2020 UR - https://asiaccs2020.cs.nthu.edu.tw/program/ ER - TY - THES A1 - Janke, Thorsten A1 - Koppers, Markus T1 - Optimierung und Implementierung eines Systems zur Unterdrückung von Werbeblöcken bei Aufzeichnungen mit dem Videorecorder N2 - Diese Diplomarbeit befaßt sich mit den Möglichkeiten Fernsehsendungen ohne Werbung mit dem Videorecorder aufzuzeichnen. Zur Erkennung von Werbeblöcken werden verschiedene Algorithmen, die auf einer optischen Detektion des Logos basieren, vorgestellt, in einer Softwarelösung implementiert, getestet und bewertet. KW - Werbeblöcke KW - Videorecorder Y1 - 1999 U6 - https://doi.org/10.25974/fhms-8 PB - FH Münster ER - TY - CHAP A1 - Estevez, F. A1 - Rebel, G. A1 - González, J. A1 - Palomares, J.M. A1 - Glösekötter, P. T1 - Body energy harvesting for WSN. State of art and examples T2 - Proceedings JCE 09/2013 N2 - Body energy harvesting for WSN. State of art and examples Y1 - 2013 U6 - https://doi.org/10.25974/fhms-707 PB - JCE ER - TY - JOUR A1 - Seuter, Pfeiffer A1 - Bauer, Zentgraf T1 - Running with Technology: Evaluating the Impact of Interacting with Wearable Devices on Running Movement JF - Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies Y1 - 2017 SN - 2474-9567 VL - 1 IS - 3 ER - TY - GEN A1 - Stewart, R. A1 - Tüxen, M. A1 - Loreto, S. A1 - Seggelmann, R. T1 - Stream Schedulers and User Message Interleaving for the Stream Control Transmission Protocol BT - November 2017 Y1 - 2017 U6 - https://doi.org/10.17487/RFC8260 SN - 2070-1721 N1 - RFC 8260 ER - TY - JOUR A1 - Torres, C. A1 - Glösekötter, P. T1 - Reliable and energy optimized WSN design for a train application JF - Journal of Systems Architecture Emerging Applications of Embedded Systems Research Response Time and Energy Consumption of Timing Critical Wireless Sensor Networks Y1 - 2011 U6 - https://doi.org/10.1016 IS - Volume 57, Issue 10 SP - 896 EP - 904 ER - TY - CHAP A1 - Saatjohann, Christoph A1 - Ising, Fabian A1 - Schinzel, Sebastian ED - Wendzel, Steffen T1 - KIM: Kaos In der Medizin T2 - SICHERHEIT 2024. Sicherheit, Schutz und Zuverlässigkeit N2 - Die sichere E-Mail-Infrastruktur für Ärzt*innen, Apotheker*innen, Krankenversicherungen und Kliniken in Deutschland, KIM - Kommunikation im Gesundheitswesen - ist mit über 200 Millionen E-Mails in den vergangenen zwei Jahren eine der am meisten genutzten Anwendungen in der Telematikinfrastruktur. Mit dem Ausgeben von S/MIME-Zertifikaten für alle medizinische Beteiligten in Deutschland verspricht KIM sichere Ende-zu-Ende-Verschlüsselung von E-Mails zwischen Heilberufler*innen in ganz Deutschland. In diesem Paper analysieren wir die KIM-Spezifikation sowie eine beispielhafte KIM-Installation in einer deutschen Zahnarztpraxis. Wir zeigen, dass KIM kryptografisch ein sehr hohes Sicherheitslevel erfüllt, doch in der Verarbeitung der E-Mails bei den Clients eine schwerwiegende Sicherheitslücke besteht. Weiterhin zeigen wir zwei Sicherheitslücken in dem KIM-Verarbeitungsmodul eines großen deutschen Unternehmens für medizinische Software. Diese Defizite zeigen außerdem Mängel in dem verpflichtenden Zulassungsprozess der KIM-Komponenten auf. Y1 - 2024 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-183325 PB - Gesellschaft für Informatik ER - TY - CHAP A1 - Ebbers, Simon A1 - Ising, Fabian A1 - Saatjohann, Christoph A1 - Schinzel, Sebastian T1 - Grand Theft App: Digital Forensics of Vehicle Assistant Apps T2 - ARES 2021: The 16th International Conference on Availability, Reliability and Security N2 - Due to the increasing connectivity of modern vehicles, collected data is no longer only stored in the vehicle itself but also transmitted to car manufacturers and vehicle assistant apps. This development opens up new possibilities for digital forensics in criminal investigations involving modern vehicles. This paper deals with the digital forensic analysis of vehicle assistant apps of eight car manufacturers. We reconstruct the driver’s activities based on the data stored on the smartphones and in the manufacturer’s backend. For this purpose, data of the Android and iOS apps of the car manufacturers Audi, BMW, Ford, Mercedes, Opel, Seat, Tesla, and Volkswagen were extracted from the smartphone and examined using digital forensic methods following forensics guidelines. Additionally, manufacturer data was retrieved using Subject Access Requests. Using the extensive data gathered, we reconstruct trips and refueling processes, determine parking positions and duration, and track the locking and unlocking of the vehicle. Our findings show that the digital forensic investigation of smartphone applications is a useful addition to vehicle forensics and should therefore be taken into account in the strategic preparation of future digital forensic investigations. Y1 - 2021 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-139031 ER - TY - GEN A1 - Schulze, Hans-Joachim A1 - Niedernostheide, Franz-Josef A1 - Job, Reinhart T1 - Semiconductor body with strained region, Chinesisches Patent BT - Apr. 11 Y1 - 2012 N1 - CN102412259A ER - TY - CHAP A1 - Saatjohann, Christoph A1 - Ising, Fabian A1 - Krings, Luise A1 - Schinzel, Sebastian T1 - STALK: security analysis of smartwatches for kids T2 - ARES 2020: The 15th International Conference on Availability, Reliability and Security / Editors: Melanie Volkamer, Christian Wressnegger N2 - Smart wearable devices become more and more prevalent in the age of the Internet of Things. While people wear them as fitness trackers or full-fledged smartphones, they also come in unique versions as smartwatches for children. These watches allow parents to track the location of their children in real-time and offer a communication channel between parent and child. In this paper, we analyzed six smartwatches for children and the corresponding backend platforms and applications for security and privacy concerns. We structure our analysis in distinct attacker scenarios and collect and describe related literature outside academic publications. Using a cellular network Man-in-the-Middle setup, reverse engineering, and dynamic analysis, we found several severe security issues, allowing for sensitive data disclosure, complete watch takeover, and illegal remote monitoring functionality. KW - Security KW - Privacy Y1 - 2020 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-123548 SN - 978-1-4503-8833-7 SP - 1 EP - 10 ER - TY - CHAP A1 - Völker, Timo A1 - Volodina, Ekaterina A1 - Tüxen, Michael A1 - Rathgeb, Erwin Paul T1 - A QUIC Simulation Model for INET and its Application to the Acknowledgment Ratio Issue T2 - 2020 IFIP Networking Conference N2 - Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite. In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue. KW - QUIC KW - INET OMNeT++ KW - Protocol Simulation KW - Transport Protocol KW - Ack Ratio Y1 - 2020 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:hbz:836-opus-149662 UR - https://ieeexplore.ieee.org/document/9142723 SN - 978-3-903176-28-7 SP - 737 EP - 742 PB - IEEE CY - New York, NY, USA ER - TY - CHAP A1 - Schreiber-Prillwitz, Wolfgang A1 - Job, Reinhart T1 - Designing MEMS Pressure Sensors with Integrated Circuitry on Silicon for Miscellaneous Applications T2 - 2013 IEEE Fourth Latin American Symposium on Circuits and Systems (LASCAS) Y1 - 2013 U6 - https://doi.org/10.1109/LASCAS.2013.6519006 SP - 1 EP - 4 ER - TY - CHAP A1 - Rubio, G. A1 - Guillén, A. A1 - Pomares, H. A1 - Rojas, I. A1 - Paechter, B. A1 - Glösekötter, P. A1 - Torres-Ceballos, C. I. T1 - Parallelization of the Nearest-Neighbour Search and the Cross-Validation Error Evaluation for the Kernel Weighted k-nn Algorithm Applied to Large Data Sets in Matlab T2 - High Performance Computing & Simulation (HPCS'09) Conference Y1 - 2009 CY - Leipzig, Germany ET - June ER - TY - GEN A1 - Rebel, Gregor A1 - Estevez, Francisco A1 - Tsekoura, Ioanna A1 - Schulz, Ingo A1 - Glösekötter, P. T1 - Interrupt aware Queue Implementation for Energy Efficient Multitasking Systems based on Cortex-M3 Architecture Y1 - 2014 ER - TY - GEN A1 - Poppe, Martin A1 - Obdrzálek, Jan T1 - IEC 25/545/DC: Simplification of Electrical Engineering BT - 1.8. Y1 - 2015 N1 - IEC 25/545/DC ER - TY - CHAP A1 - Papastergiou, G. A1 - Grinnemo, K.-J. A1 - Bruntrom, A. A1 - Ros, D. A1 - Tüxen, M. A1 - Khademi, N. A1 - Hurtig, P. T1 - On the Cost of Using Happy Eyeballs for Transport Selection T2 - Proceedings of the Applied Networking Research Workshop 2016 (https://irtf.org/anrw/2016/program.html) Y1 - 2016 CY - Berlin ER - TY - CHAP A1 - Otten, W. A1 - Glösekötter, P. A1 - Velling, P. A1 - Brennemann, A. A1 - Prost, W. A1 - Goser, K. F. A1 - Tegude, F.- J. T1 - InP-Based Monolithic Integrated RTD/HBT MOBILE FOR Logic Circuits T2 - InP and Related Materials Conference Y1 - 2001 CY - Nara ET - May ER - TY - JOUR A1 - Pacha, C. A1 - Auer, U. A1 - Burwick, C. A1 - Glösekötter, P. A1 - Brennemann, A. A1 - Prost, W. A1 - Tegude, F. J. A1 - Goser, K. F. T1 - Thresold Logic Circuit Design of Parallel Adders Using Resonant Tunneling Devices JF - IEEE Transactions on Very Larg Scale Integration (VLSI) Systems Y1 - 2000 VL - October SP - 558 EP - 572 ER - TY - CHAP A1 - Ortuno, F. M. A1 - Valenzuela, O. A1 - Glösekötter, P. A1 - Rojas, I. T1 - Main findings and advances in biomedical engineering and bioinformatics from IWBBIO 2015 Y1 - 2016 U6 - https://doi.org/10.1186/s 12938-016-0187-9 PB - BioMedical Engineering OnLine ER - TY - BOOK A1 - Mertens, Konrad T1 - Photovoltaics - Fundamentals, Technology, and Practice N2 - A comprehensive tutorial on photovoltaic technology now fully updated to include solar storage and the latest methods for on-site plant measurements. Starting with the basic principles of solar energy, this fully updated, practical text explains the fundamentals of semiconductor physics and the structure and functioning of the solar cell. It describes the latest measurement techniques for solar modules, and the planning and operation of grid-connected and off-grid PV systems. It also looks at other thin film cells, hybrid wafer cells, and concentrator systems. Additionally, this Second Edition covers solar modules and solar generators; system technology of grid connected plants; the storage of solar energy; photovoltaic measurement technology; the planning and operation of grid-connected systems; economic efficiency of PV systems; and the future development of PV. - Presents the latest advances in PV R&D and industry deployment - Updated illustrations and tabular data reflect current state-of-the-art and PV technology efficiencies - Offers expanded tutorial sections to aid teaching and self-study - Includes a brand-new chapter on Solar Energy Storage - Features two enlarged chapters—one on up-to-date photovoltaic metrology and the other on the future developments in photovoltaics - Comes along with the accompanying website www.textbook-pv.org which offers free downloadable figures of the book, solutions of exercises, additional free PV software etc. Developed to prepare engineering students for the PV industry, this practical text is an essential PV primer. KW - Solar KW - Solar Module KW - Photovoltaics KW - PV-Outdoor-Measurements KW - Outdoor-EL Y1 - 2019 SN - 978-1-119-40104-9 PB - John Wiley & Sons Ltd CY - Chichester, United Kingdom ER - TY - BOOK A1 - Mertens, Konrad T1 - Photovoltaics - Fundamentals, Technology, and Practice KW - Photovoltaics KW - Solar Energy KW - Textbook KW - Comprehensive Textbook KW - Energy Transition Y1 - 2018 SN - 978-1-119-40104-9 PB - John Wiley & Sons, Inc. CY - Chichester, UK ET - 2. Edition ER - TY - GEN A1 - Glösekötter, P. T1 - Wireless Sensor Networks N2 - Wireless Sensor Networks Y1 - 2013 U6 - https://doi.org/10.25974/fhms-709 PB - FH Münster ER - TY - CHAP A1 - Mertens, K. A1 - Kösters, H. A1 - Diehl, M T1 - Low-Cost-Outdoor-EL: Cost-Efficient Extensive on-Site Quality Analysis of Solar Modules, 31st European Photovoltaic Solar Energy Conference and Exhibition T2 - Proceedings of EU-PVSEC 2015 Y1 - 2015 SN - 3-936338-39-6 U6 - https://doi.org/10.4229/EUPVSEC20152015-5BV.2.42 CY - Hamburg ET - 31 ER - TY - GEN A1 - Mertens, K. T1 - "Understanding Photovoltaics: Textbook Photovoltaics and PV-Teach", 29th European PV Solar Energy Converence and Exhibition, Amsterdam Y1 - 2014 ER - TY - GEN A1 - Job, Reinhart T1 - Do we have an Energy Crisis? - A brief discussion on energy and resources, Seminar, 24.8.2016, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien Y1 - 2016 ER - TY - CHAP A1 - Beckschulze, E. A1 - Salewski, F. A1 - Siegbert, T. A1 - Kowalewski, S. T1 - Fault Handling Approaches on Dual-Core Microcontrollers in Safety-Critical Automotive Applications T2 - Proc. Leveraging Applications of Formal Methods, Verification and Validation (ISoLA08), 2009, vol. 17 in Communications in Computer and Information Science Y1 - 2009 U6 - https://doi.org/10.1007/978-3-540-88479-8_7 SP - 82 EP - 92 PB - Springer CY - Berlin, Heidelberg ER - TY - GEN A1 - Job, Reinhart T1 - Optimization of Integrated Pressure Sensor Systems for Widely Spread Applications, Seminar, 14.8.2013, Engineering School, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien Y1 - 2013 ER - TY - GEN A1 - Job, Reinhart A1 - Ungru, Kathrin T1 - What seems to be the trouble with energy and resources?, eingeladener Vortrag, 3.3.2017, Universidade Federal do Rio Grande do Norte (UFRN), Natal, Brasilien Y1 - 2017 ER - TY - GEN A1 - Job, Reinhart T1 - Materials, Resources and the Impact on our Societies and Future Technology, Seminar, 8.9.2015, Instituto Federal do Rio Grande do Norte, Natal, Brasilien Y1 - 2015 ER - TY - GEN A1 - Job, Reinhart T1 - Materials and Environment, Seminar, 14.8.2013, Center for Interdisciplinary Research in Agribusiness, Universidade Federal do Rio Grande do Sul, Porto Alegre, Brasilien Y1 - 2013 ER - TY - CHAP A1 - Poppe, Martin ED - Skolaut, Werner T1 - Elektrotechnik T2 - Maschinenbau - Ein Lehrbuch für das ganze Bachelor Studium N2 - In diesen Kapiteln wird zusammengefasst, was ein Maschinenbauer auf dem Gebiete der Elektrotechnik wissen sollte. KW - Elektrotechnik, Netzwerke, Halbleiter, Motoren Y1 - 2018 UR - https://www.springer.com/gp/book/9783662558812 SN - 978-3-662-55881-2 U6 - https://doi.org/10.1007/978-3-662-55882-9 SP - 1181 EP - 1269 PB - Springer CY - Heidelberg ER - TY - GEN A1 - Mertens, K. T1 - "Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Energiespartage Steinfurt, Steinfurt, 03.04.2018 Y1 - 2018 ER - TY - GEN A1 - Mertens, Konrad T1 - "Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Solarkampagne des Kreises Steinfurt, Steinfurt, 25.06.2018 KW - Photovoltaik, Solarstrom, Speicher Y1 - 2018 ER - TY - GEN A1 - Mertens, Konrad T1 - "Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?", Solarkampagne des Kreises Steinfurt, Metelen, 02.08.2018 KW - Photovoltaik, Solarstrom, Speicher Y1 - 2018 ER - TY - BOOK A1 - Poppe, Martin T1 - Gesangbuchlieder für dreistimmigen Chor und Klavier Y1 - 2014 SN - 978-3-941628-16-8 PB - Evangelisches Medienhaus CY - Stuttgart ET - 1 ER - TY - BOOK A1 - Poppe, Martin T1 - Gesangbuchlieder für Gitarre, Flöte und Singstimme Y1 - 2010 SN - 978-3-941628-11-3 PB - Evangelisches Medienhaus CY - Stuttgart ET - 1 ER - TY - BOOK A1 - Mertens, Konrad T1 - Photovoltaik - Lehrbuch zu Grundlagen, Technologie und Praxis Y1 - 2013 SN - 978-3-446-43410-3 PB - Hanser CY - München ET - 2 ER - TY - BOOK T1 - Konrad Mertens: Photovoltaik - Lehrbuch zu Grundlagen, Technologie und Praxis, 3., neu bearbeitete und aktualisierte Auflage Y1 - 2015 SN - 978-3-446-442 PB - Hanser CY - München ER - TY - BOOK A1 - Poppe, Martin T1 - Prüfungstrainer Elektrotechnik Y1 - 2018 SN - 9783662566480 U6 - https://doi.org/10.1007/978-3-662-56649-7 PB - Springer CY - Heidelberg ET - 3 ER - TY - BOOK A1 - Mertens, Konrad T1 - Photovoltaik - Lehrbuch zu Grundlagen, Technologie und Praxis, 4., aktualisierte Auflage KW - Photovoltaik KW - Solarstrom KW - Solarenergie KW - Lehrbuch Y1 - 2018 SN - 978-3-446-44863-6 PB - Carl Hanser Verlag CY - München ER - TY - JOUR A1 - Poppe, Martin T1 - Exclusive Hadron Production in Two-Photon Reactions JF - International Journal of Modern Physics A Y1 - 1986 U6 - https://doi.org/10.1142/S0217751X8600023X VL - 1 IS - 3 SP - 545 EP - 668 ER - TY - GEN A1 - Mertens, Konrad T1 - ,,Feldstudie zur tatsächlichen Leistung von Photovoltaikanlagen mittels Peakleistungsmessgerät", 23. Symposium "Photovoltaische Solarenergie, Staffelstein, 6.3.08. Y1 - 2008 ER - TY - GEN A1 - Mertens, Konrad T1 - „Solarstrom auf meinem Dach: Wie geht das? Lohnt sich das noch?“, Solarkampagne des Kreises Steinfurt, Westerkappeln, 25.09.2018 KW - Photovoltaik, Solarstrom, Speicher Y1 - 2018 ER - TY - BOOK A1 - Poppe, Martin T1 - Die Maxwellsche Theorie Y1 - 2015 SN - 978-3-662-45592-0 U6 - https://doi.org/10.1007/978-3-662-45593-7 PB - Springer CY - Berlin ET - 1 ER - TY - GEN A1 - Mertens, K. T1 - „Ist Ihr Haus solar geDacht?“, Bürger-Veranstaltung des Kreises Steinfurt, Hörstel, 21.06.2017 Y1 - 2017 ER -