Elektrotechnik und Informatik (ETI)
Refine
Year
Publication Type
- Part of a Book (119)
- Lecture (83)
- Article (68)
- Conference Proceeding (42)
- Book (20)
- Participation in a Norm (DIN, RFC etc.) (13)
- Master's Thesis (4)
- Course Material (3)
- Report (2)
- Bachelor Thesis (1)
Language
- English (197)
- German (131)
- Multiple languages (27)
Keywords
- Photovoltaik, Solarstrom, Speicher (5)
- Cyber Security (4)
- Elektrotechnik (3)
- Photovoltaik (3)
- QUIC (3)
- Outdoor-EL (2)
- Photovoltaics (2)
- Solarstrom (2)
- Transport Protocol (2)
- Ack Ratio (1)
Cathode ray-luminescent phosphor and method for the preparation thereof, <b>United States Patent</b>
(2000)
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
Technical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors’ incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.
Sichere ABAP-Programmierung
(2009)
Camera based path planning for low quantity - high variant manufacturing with industrial robots
(2019)
The acquisition costs for industrial robots have been steadily decreasing in past years. Nevertheless, they still face significant drawbacks in the required effort for the preparation of complex robot tasks which causes these systems to be rarely present so far in small and medium-sized enterprises (SME) that focus mainly on small volume, high variant manufacturing. In this paper, we propose a camera-based path planning framework that allows the fast preparation and execution of robot tasks in dynamic environments which leads to less planning overhead, fast program generation and reduced cost and hence overcomes the major impediments for the usage of industrial robots for automation in SMEs with focus on low volume and high variant manufacturing. The framework resolves existing problems in different steps. The exact position and orientation of the workpiece are determined from a 3D environment model scanned by an optical sensor. The so retrieved information is used to plan a collision-free path that meets the boundary conditions of the specific robot task. Experiments show the potential and effectiveness of the the framework presented here by evaluating a case study.
Accurate self-localisation is a fundamental ability of any mobile robot. In Monte Carlo localisation, a probability distribution over a space of possible hypotheses accommodates the inherent uncertainty in the position estimate, whereas bounded-error localisation provides a region that is guaranteed to contain the robot. However, this guarantee is accompanied by a constant probability over the confined region and therefore the information yield may not be sufficient for certain practical applications. Four hybrid localisation algorithms are proposed, combining probabilistic filtering with non-linear bounded-error state estimation based on interval analysis. A forward-backward contractor and the Set Inverter via Interval Analysis are hybridised with a bootstrap filter and an unscented particle filter, respectively. The four algorithms are applied to global localisation of an underwater robot, using simulated distance measurements to distinguishable landmarks. As opposed to previous hybrid methods found in the literature, the bounded-error state estimate is not maintained throughout the whole estimation process. Instead, it is only computed once in the beginning, when solving the wake-up robot problem, and after kidnapping of the robot, which drastically reduces the computational cost when compared to the existing algorithms. It is shown that the novel algorithms can solve the wake-up robot problem as well as the kidnapped robot problem more accurately than the two conventional probabilistic filters.
A NEAT Way to Browse the Web
(2017)
WebRTC Data Channels
(2017)
This paper deals with the issue of automating the
process of machine learning and analyzing bio-datasets. For this
a user-friendly website has been developed for the interaction
with the researchers. On this website it is possible to upload
datasets and to share them, if desired, with other scientists. The
uploaded data can also be analyzed by various methods and
functions. The signals inside these datasets can also be visualized.
Furthermore several algorithms have been implemented to create
machine learning models with the uploaded data. Based on these
generated models new data can be classified or calculated. For all
these applications the simplest possible handling was
implemented to make the website available to all interested
researchers.
Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite.
In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue.
A data sender in an IP based network is only capable to efficiently use a network path if it knows the packet size limit of the path, i.e., the Path Maximum Transmission Unit (PMTU). The IETF recently specified a PMTU discovery framework for transport protocols like QUIC. This paper complements this specification by presenting a search algorithm. In addition, it defines several metrics and shows results of analyses for the algorithm with various PMTU candidate sequences using these metrics. We integrated the PMTU discovery with our algorithm into a QUIC simulation model. This paper describes the integration and presents measurements obtained by simulations.
A communication over an Internet Protocol (IP) based network fails if an endpoint sends packets that are too big to reach their destination and if the sender is unable to detect that. The node on the path that drops these packets should respond with a Packet Too Big (PTB) message. However, multiple scenarios exist in which the sender will not receive a PTB message. Even if it does, it refrains from using the information in case it suspects that a potential attacker forged the message. In particular, we are not aware of any implementation of the secure transport protocol QUIC (e.g., used by HTTP/3) that processes PTB messages. In this paper, we present a novel parameterizable PTB detection algorithm for reliable transport protocols that does not depend on PTB messages. We further describe how to integrate our algorithm into QUIC, present results from an evaluation using the algorithm within a QUIC simulation model and, based on these results, suggest concrete parameter values.
Automatic Classification of Left Ventricular Wall Segments in Small Animal Ultrasound Imaging.
(2014)
packetdrill
(2017)
Additional Policies for the Partially Reliable Stream Control Transmission Protocol Extension
(2015)
This document is a compilation of issues found since the publication of RFC 4960 in September 2007, based on experience with implementing, testing, and using the Stream Control Transmission Protocol (SCTP) along with the suggested fixes. This document provides deltas to RFC 4960 and is organized in a time-ordered way. The issues are listed in the order in which they were brought up. Because some text is changed several times, the last delta in the text is the one that should be applied. In addition to the deltas, a description of each problem and the details of the solution for each are also provided.
Magnetic field sensors based on quantum mechanic effects are often
susceptible to misalignments of the magnetic field or need advanced
procedures to compensate for these. Also, the record breaking sensitivities reported for superconducting quantum interference devices and alkali vapor magnetometers come along with large and complex experimental setups. The nitrogen vacancy center in diamond can be used to design a simple, small, and robust sensor without employing microwave radiation. By using compressed nanodiamond particles, it is possible to eliminate the need of an alignment of the magnetic field and still obtain the absolute magnetic flux density in a single measurement. In order to demonstrate the capabilities of this approach, a centimeter-sized modified automotive demo board is employed as a complete sensor with a sensitivity of 78 µT/Wurzel Hz.
Strategies to Secure End-to-End Communication - And Their Application to SCTP-Based Communication
(2011)
Pressure Sensor Systems for Wide Pressure Ranges Integrated by a Combined CMOS- and MEMS-Technology
(2013)
Designing MEMS Pressure Sensors with Integrated Circuitry on Silicon for Miscellaneous Applications
(2013)
Immer mehr Menschen nutzen das Internet für private oder geschäftliche Zwecke. Immer mehr Firmen und Behörden wissen die Vorteile des Intranets zu schätzen. An vielen Stellen werden heutzutage die Vorteile von beiden Netzen verknüpft, um möglichst effektives Arbeiten zu ermöglichen; Stichworte sind E-Mail, Online-Shopping, Online-Banking, Internet-Surfing, Datenkonsistenz, verteilte Systeme und Client-Server-Architekturen. Immer weniger Menschen sind jedoch in der Lage, die komplexen Strukturen, die diese neuen Techniken mit sich bringen oder durch die sie erst möglich werden, zu durchschauen. Auf der Gegenseite der vielen Vorteile, die diese nahezu grenzenlosen Kommunikationsmöglichkeiten bieten, stehen viele nicht zu unterschätzende Sicherheitsrisiken. Anders als bei den positiven Seiten dieser Entwicklung wissen aber viele Benutzer nichts von den Risiken oder unterschätzen und ignorieren diese. In dieser Diplomarbeit können aufgrund der knapp bemessenen Zeit, vorgesehen für die Diplomarbeit an der Fachhochschule sind etwa drei Monate, keine eigenständigen Untersuchungen über Viren oder andere Bedrohungen von Computersystemen durchgeführt werden. Diese Untersuchungen werden durch eine systematische Recherche, vor allem im Internet, ersetzt. Die Diplomarbeit soll zeigen, dass es sowohl im homogenen wie auch in einem heterogenen Umfeld - der Windows NT Server steht in einem UNIX-dominierten Netzwerk - möglich ist, mit geringem finanziellen und personellen Aufwand einen "relativ" sicheren Netzwerkserver mit Internetanbindung aufzubauen, welcher sowohl Angriffen von innen als auch von außen in einem gewissen Rahmen widerstehen kann. Vollkommene Sicherheit gibt es nicht und maximale Sicherheit wird man in diesem Zeit- und Kostenrahmen nicht erreichen können. Zu erreichen ist aber ein wesentlich höherer Sicherheits-Level als ihn Windows NT standardmäßig mit sich bringt.
Seitenkanäle mit Untiefen: Manche Webanwendungen spielen Angreifern unfreiwillig Informationen zu
(2012)
Multi-part Nanocubes
(2016)
This thesis describes the development of Multi-part Nanocubes. It is a further development of Nanocubes, an in-memory data structure for spatiotemporal data cubes. "Nanocubes provides you with real-time visualization of large datasets. Slice and dice your data with respect to space, time, or some of your data attributes, and view the results in real-time on a web browser over heatmaps, bar charts, and histograms." Partitioning the structure to parallelize the build process as well as merging query results is the principal part of this document. Furthermore, a new memory management (slab allocation with offset pointers) was implemented to enable 32-bit support and faster load times of already built nanocubes. Porting the project to Windows and implementing on-the-fly compression and decompression of nanocube files is also described.
Durchgängige Digitalisierung industrieller Abläufe am Beispiel der Modellfabrik der FH Münster
(2023)
Die Modellfabrik der FH Münster erlaubt durch den Umfang und die Komplexität der enthaltenen Automatisierungsaufgaben sowie einen Aufbau aus industriellen Komponenten eine praxisnahe Lehre im Bereich aktueller Anlagenautomatisierung und darüber hinausgehenden Funktionen im Sinne einer durchgängigen Digitalisierung. Die verwendete Unterscheidung der durchgängigen Digitalisierung in horizontale und vertikale Verknüpfungen wird veranschaulicht. Aufbauend auf Erfahrungen mit der Vorgängeranlage werden Neuerungen der 2021 aufgebauten neuen Modellfabrik vorgestellt. Neuerungen umfassen insbesondere die Modularisierung der Anlage, das umgesetzte Sicherheitskonzept, einen Webshop mit Onlinekonfigurator, eine Webvisualiserung des Anlagenzustandes inklusive der Energieverbräuche, sowie Möglichkeiten zur virtuellen Inbetriebnahme. Weiterhin wird das aktuelle Konzept zur Erweiterung der horizontalen digitalen Durchgängigkeit mittels der Einbindung eines autonomen mobilen Roboters in die Modellfabrik vorgestellt.
KIM: Kaos In der Medizin
(2024)
Die sichere E-Mail-Infrastruktur für Ärzt*innen, Apotheker*innen, Krankenversicherungen und Kliniken in Deutschland, KIM - Kommunikation im Gesundheitswesen - ist mit über 200 Millionen E-Mails in den vergangenen zwei Jahren eine der am meisten genutzten Anwendungen in der Telematikinfrastruktur. Mit dem Ausgeben von S/MIME-Zertifikaten für alle medizinische Beteiligten in Deutschland verspricht KIM sichere Ende-zu-Ende-Verschlüsselung von E-Mails zwischen Heilberufler*innen in ganz Deutschland.
In diesem Paper analysieren wir die KIM-Spezifikation sowie eine beispielhafte KIM-Installation in einer deutschen Zahnarztpraxis. Wir zeigen, dass KIM kryptografisch ein sehr hohes Sicherheitslevel erfüllt, doch in der Verarbeitung der E-Mails bei den Clients eine schwerwiegende Sicherheitslücke besteht. Weiterhin zeigen wir zwei Sicherheitslücken in dem KIM-Verarbeitungsmodul eines großen deutschen Unternehmens für medizinische Software. Diese Defizite zeigen außerdem Mängel in dem verpflichtenden Zulassungsprozess der KIM-Komponenten auf.
Smart wearable devices become more and more prevalent in the age of the Internet of Things. While people wear them as fitness trackers or full-fledged smartphones, they also come in unique versions as smartwatches for children. These watches allow parents to track the location of their children in real-time and offer a communication channel between parent and child.
In this paper, we analyzed six smartwatches for children and the corresponding backend platforms and applications for security and privacy concerns. We structure our analysis in distinct attacker scenarios and collect and describe related literature outside academic publications. Using a cellular network Man-in-the-Middle setup, reverse engineering, and dynamic analysis, we found several severe security issues, allowing for sensitive data disclosure, complete watch takeover, and illegal remote monitoring functionality.
Medizinische Einrichtungen waren in den letzten Jahren immer wieder von Cyber-Angriffen betroffen. Auch wenn sich diese Angriffe derzeit auf die Office-IT-Infrastruktur der Einrichtungen konzentrieren, existiert mit medizinischen Systemen und Kommunikationsprotokollen eine weitere wenig beachtete Angriffsoberfläche.
In diesem Beitrag analysieren wir die weit verbreiteten medizintechnischen Kommunikations-Protokolle DICOM und HL7 sowie Protokoll-Implementierungen auf ihre IT-Sicherheit. Dafür präsentieren wir die Ergebnisse der Sicherheitsanalyse der DICOM- und HL7-Standards, einen Fuzzer “MedFUZZ” für diese Protokolle sowie einen Schwachstellenscanner “MedVAS”, der Schwachstellen in medizintechnischen Produktivumgebungen auffinden kann.
A New Fast Algorithm for Connecting the INET Simulation Framework to Applications in Real-time
(2011)
State of the art classifiers split Alzheimer’s disease progression into a limited number of stages and use a comparatively small database. For the best treatment, it is desirable to have the highest resolution from the progression of the disease. This paper proposes a reliable deep convolutional neural network for the classification of six different Alzheimer’s disease stages based on Magnetic Resonance Imaging (MRI). The peculiarity of this paper is the introduction of a new, sixth, disease stage, and the large amount of data that has been taken into account. Additionally, not only the testing accuracy is analyzed, but also the robustness of the classifier to have feedback on how certain the neural network makes its predictions.
Zu den Versuchen existieren Versuchsanleitungen, die die Grundlage zum Versuchsthema, die Geräteliste, die Versuchsschaltungen, die Meßaufgaben und die Fragen zur Auswertungen enthalten. Von den Praktikumsteilnehmern sind die theoretischen Grundlagen der einzelnen Versuche anhand der Versuchsanleitungen und ggf. weitergehender Fachliteratur jeweils vor dem Versuch selbständig zu erarbeiten. Stellt der Praktikumsleiter bei der Versuchsbesprechung fest, daß die Teilnehmer einer Gruppe die Grundlagen des aktuellen Versuches nicht beherrschen, so wird diese Gruppe i.a. von der momentanen Durchführung des Versuches ausgeschlossen und muß diesen Versuch an einem Nachholtermin durchführen.
Diese Vorlesung Grundlagen der Elektrotechnik im Studiengang Physikalische Technik beruht im wesentlichen auf den Büchern [MP92], [CW92] und [FB82]. [MP92] Anfängern, besser Fachfremden ist ein Studium von [MP92] empfohlen, das für Studenten des Fachbereiches Wirtschaft ausgelegt ist. [CW92] Bei vorhandenen Grundkenntnissen bietet sich [CW92] an, das über den Stoff der Vorlesung hinaus die Elektrotechnik theoretisch erläutert. [FB82] Aus dem Bereich Maschinenbau kommt [FB82], das für den Teil der elektrischen Maschinen als Vorlage diente. Es kann aber auch Fachfremden für ein allgemeines Verständnis empfolen werden.
Die vorliegende Praktikumsanleitung ist in wesentlichen Teilen in Inhalt und Layout überarbeitet worden. Dazu haben neben Kollegen auch Studenten beigetragen, deren Ergebnisse Sie nun nutzen können. Um die Qualität weiter zu sichern und den Nutzen zu steigern, bitten wir Sie um folgende Mitarbeit: Sollten Sie bei der Vorbereitung Ihres 1. Versuches inhaltliche Fehler oder Rechtschreib- und Grammatikfehler feststellen, so teilen Sie uns diese bitte mit. Sollten Sie nach Abschluß des Praktikums Wünsche oder Anregungen haben, so teilen Sie uns diese bitte ebenfalls mit.
Fast Constant Time Memory Allocator for Inter Task Communication in Ultra Low Energy Embedded Systems
Modern implantable cardiologic devices communicate via radio frequency techniques and nearby gateways to a backend server on the internet. Those implanted devices, gateways, and servers form an ecosystem of proprietary hardware and protocols that process sensitive medical data and is often vital for patients’ health.
This paper analyzes the security of this Ecosystem, from technical gateway aspects, via the programmer, to configure the implanted device, up to the processing of personal medical data from large cardiological device producers. Based on a real-world attacker model, we evaluated different devices and found several severe vulnerabilities. Furthermore, we could purchase a fully functional programmer for implantable cardiological devices, allowing us to re-program such devices or even induce electric shocks on untampered implanted devices.
Additionally, we sent several Art. 15 and Art. 20 GDPR inquiries to manufacturers of implantable cardiologic devices, revealing non-conforming processes and a lack of awareness about patients’ rights and companies’ obligations. This, and the fact that many vulnerabilities are still to be found after many vulnerability disclosures in recent years, present a worrying security state of the whole ecosystem.
Die Maxwellsche Theorie
(2015)