Refine
Year
Publication Type
- Part of a Book (119)
- Lecture (83)
- Article (68)
- Conference Proceeding (42)
- Book (20)
- Participation in a Norm (DIN, RFC etc.) (13)
- Master's Thesis (4)
- Course Material (3)
- Report (2)
- Bachelor Thesis (1)
Language
- English (197)
- German (131)
- Multiple languages (27)
Keywords
- Photovoltaik, Solarstrom, Speicher (5)
- Cyber Security (4)
- Elektrotechnik (3)
- Photovoltaik (3)
- QUIC (3)
- Outdoor-EL (2)
- Photovoltaics (2)
- Solarstrom (2)
- Transport Protocol (2)
- Ack Ratio (1)
Faculty
- Elektrotechnik und Informatik (ETI) (355) (remove)
Durchgängige Digitalisierung industrieller Abläufe am Beispiel der Modellfabrik der FH Münster
(2023)
Die Modellfabrik der FH Münster erlaubt durch den Umfang und die Komplexität der enthaltenen Automatisierungsaufgaben sowie einen Aufbau aus industriellen Komponenten eine praxisnahe Lehre im Bereich aktueller Anlagenautomatisierung und darüber hinausgehenden Funktionen im Sinne einer durchgängigen Digitalisierung. Die verwendete Unterscheidung der durchgängigen Digitalisierung in horizontale und vertikale Verknüpfungen wird veranschaulicht. Aufbauend auf Erfahrungen mit der Vorgängeranlage werden Neuerungen der 2021 aufgebauten neuen Modellfabrik vorgestellt. Neuerungen umfassen insbesondere die Modularisierung der Anlage, das umgesetzte Sicherheitskonzept, einen Webshop mit Onlinekonfigurator, eine Webvisualiserung des Anlagenzustandes inklusive der Energieverbräuche, sowie Möglichkeiten zur virtuellen Inbetriebnahme. Weiterhin wird das aktuelle Konzept zur Erweiterung der horizontalen digitalen Durchgängigkeit mittels der Einbindung eines autonomen mobilen Roboters in die Modellfabrik vorgestellt.
Multi-part Nanocubes
(2016)
This thesis describes the development of Multi-part Nanocubes. It is a further development of Nanocubes, an in-memory data structure for spatiotemporal data cubes. "Nanocubes provides you with real-time visualization of large datasets. Slice and dice your data with respect to space, time, or some of your data attributes, and view the results in real-time on a web browser over heatmaps, bar charts, and histograms." Partitioning the structure to parallelize the build process as well as merging query results is the principal part of this document. Furthermore, a new memory management (slab allocation with offset pointers) was implemented to enable 32-bit support and faster load times of already built nanocubes. Porting the project to Windows and implementing on-the-fly compression and decompression of nanocube files is also described.
Seitenkanäle mit Untiefen: Manche Webanwendungen spielen Angreifern unfreiwillig Informationen zu
(2012)
Immer mehr Menschen nutzen das Internet für private oder geschäftliche Zwecke. Immer mehr Firmen und Behörden wissen die Vorteile des Intranets zu schätzen. An vielen Stellen werden heutzutage die Vorteile von beiden Netzen verknüpft, um möglichst effektives Arbeiten zu ermöglichen; Stichworte sind E-Mail, Online-Shopping, Online-Banking, Internet-Surfing, Datenkonsistenz, verteilte Systeme und Client-Server-Architekturen. Immer weniger Menschen sind jedoch in der Lage, die komplexen Strukturen, die diese neuen Techniken mit sich bringen oder durch die sie erst möglich werden, zu durchschauen. Auf der Gegenseite der vielen Vorteile, die diese nahezu grenzenlosen Kommunikationsmöglichkeiten bieten, stehen viele nicht zu unterschätzende Sicherheitsrisiken. Anders als bei den positiven Seiten dieser Entwicklung wissen aber viele Benutzer nichts von den Risiken oder unterschätzen und ignorieren diese. In dieser Diplomarbeit können aufgrund der knapp bemessenen Zeit, vorgesehen für die Diplomarbeit an der Fachhochschule sind etwa drei Monate, keine eigenständigen Untersuchungen über Viren oder andere Bedrohungen von Computersystemen durchgeführt werden. Diese Untersuchungen werden durch eine systematische Recherche, vor allem im Internet, ersetzt. Die Diplomarbeit soll zeigen, dass es sowohl im homogenen wie auch in einem heterogenen Umfeld - der Windows NT Server steht in einem UNIX-dominierten Netzwerk - möglich ist, mit geringem finanziellen und personellen Aufwand einen "relativ" sicheren Netzwerkserver mit Internetanbindung aufzubauen, welcher sowohl Angriffen von innen als auch von außen in einem gewissen Rahmen widerstehen kann. Vollkommene Sicherheit gibt es nicht und maximale Sicherheit wird man in diesem Zeit- und Kostenrahmen nicht erreichen können. Zu erreichen ist aber ein wesentlich höherer Sicherheits-Level als ihn Windows NT standardmäßig mit sich bringt.
Pressure Sensor Systems for Wide Pressure Ranges Integrated by a Combined CMOS- and MEMS-Technology
(2013)
Designing MEMS Pressure Sensors with Integrated Circuitry on Silicon for Miscellaneous Applications
(2013)
Strategies to Secure End-to-End Communication - And Their Application to SCTP-Based Communication
(2011)
Magnetic field sensors based on quantum mechanic effects are often
susceptible to misalignments of the magnetic field or need advanced
procedures to compensate for these. Also, the record breaking sensitivities reported for superconducting quantum interference devices and alkali vapor magnetometers come along with large and complex experimental setups. The nitrogen vacancy center in diamond can be used to design a simple, small, and robust sensor without employing microwave radiation. By using compressed nanodiamond particles, it is possible to eliminate the need of an alignment of the magnetic field and still obtain the absolute magnetic flux density in a single measurement. In order to demonstrate the capabilities of this approach, a centimeter-sized modified automotive demo board is employed as a complete sensor with a sensitivity of 78 µT/Wurzel Hz.
This document is a compilation of issues found since the publication of RFC 4960 in September 2007, based on experience with implementing, testing, and using the Stream Control Transmission Protocol (SCTP) along with the suggested fixes. This document provides deltas to RFC 4960 and is organized in a time-ordered way. The issues are listed in the order in which they were brought up. Because some text is changed several times, the last delta in the text is the one that should be applied. In addition to the deltas, a description of each problem and the details of the solution for each are also provided.
Additional Policies for the Partially Reliable Stream Control Transmission Protocol Extension
(2015)
packetdrill
(2017)
Automatic Classification of Left Ventricular Wall Segments in Small Animal Ultrasound Imaging.
(2014)
A communication over an Internet Protocol (IP) based network fails if an endpoint sends packets that are too big to reach their destination and if the sender is unable to detect that. The node on the path that drops these packets should respond with a Packet Too Big (PTB) message. However, multiple scenarios exist in which the sender will not receive a PTB message. Even if it does, it refrains from using the information in case it suspects that a potential attacker forged the message. In particular, we are not aware of any implementation of the secure transport protocol QUIC (e.g., used by HTTP/3) that processes PTB messages. In this paper, we present a novel parameterizable PTB detection algorithm for reliable transport protocols that does not depend on PTB messages. We further describe how to integrate our algorithm into QUIC, present results from an evaluation using the algorithm within a QUIC simulation model and, based on these results, suggest concrete parameter values.
A data sender in an IP based network is only capable to efficiently use a network path if it knows the packet size limit of the path, i.e., the Path Maximum Transmission Unit (PMTU). The IETF recently specified a PMTU discovery framework for transport protocols like QUIC. This paper complements this specification by presenting a search algorithm. In addition, it defines several metrics and shows results of analyses for the algorithm with various PMTU candidate sequences using these metrics. We integrated the PMTU discovery with our algorithm into a QUIC simulation model. This paper describes the integration and presents measurements obtained by simulations.
Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite.
In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue.
This paper deals with the issue of automating the
process of machine learning and analyzing bio-datasets. For this
a user-friendly website has been developed for the interaction
with the researchers. On this website it is possible to upload
datasets and to share them, if desired, with other scientists. The
uploaded data can also be analyzed by various methods and
functions. The signals inside these datasets can also be visualized.
Furthermore several algorithms have been implemented to create
machine learning models with the uploaded data. Based on these
generated models new data can be classified or calculated. For all
these applications the simplest possible handling was
implemented to make the website available to all interested
researchers.
WebRTC Data Channels
(2017)
A NEAT Way to Browse the Web
(2017)
Accurate self-localisation is a fundamental ability of any mobile robot. In Monte Carlo localisation, a probability distribution over a space of possible hypotheses accommodates the inherent uncertainty in the position estimate, whereas bounded-error localisation provides a region that is guaranteed to contain the robot. However, this guarantee is accompanied by a constant probability over the confined region and therefore the information yield may not be sufficient for certain practical applications. Four hybrid localisation algorithms are proposed, combining probabilistic filtering with non-linear bounded-error state estimation based on interval analysis. A forward-backward contractor and the Set Inverter via Interval Analysis are hybridised with a bootstrap filter and an unscented particle filter, respectively. The four algorithms are applied to global localisation of an underwater robot, using simulated distance measurements to distinguishable landmarks. As opposed to previous hybrid methods found in the literature, the bounded-error state estimate is not maintained throughout the whole estimation process. Instead, it is only computed once in the beginning, when solving the wake-up robot problem, and after kidnapping of the robot, which drastically reduces the computational cost when compared to the existing algorithms. It is shown that the novel algorithms can solve the wake-up robot problem as well as the kidnapped robot problem more accurately than the two conventional probabilistic filters.
Camera based path planning for low quantity - high variant manufacturing with industrial robots
(2019)
The acquisition costs for industrial robots have been steadily decreasing in past years. Nevertheless, they still face significant drawbacks in the required effort for the preparation of complex robot tasks which causes these systems to be rarely present so far in small and medium-sized enterprises (SME) that focus mainly on small volume, high variant manufacturing. In this paper, we propose a camera-based path planning framework that allows the fast preparation and execution of robot tasks in dynamic environments which leads to less planning overhead, fast program generation and reduced cost and hence overcomes the major impediments for the usage of industrial robots for automation in SMEs with focus on low volume and high variant manufacturing. The framework resolves existing problems in different steps. The exact position and orientation of the workpiece are determined from a 3D environment model scanned by an optical sensor. The so retrieved information is used to plan a collision-free path that meets the boundary conditions of the specific robot task. Experiments show the potential and effectiveness of the the framework presented here by evaluating a case study.
Sichere ABAP-Programmierung
(2009)
Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors’ incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
Cathode ray-luminescent phosphor and method for the preparation thereof, <b>United States Patent</b>
(2000)