Publikationen


Suche nach „[Elektrotechnik und Medientechnik]“ hat 1199 Publikationen gefunden
Suchergebnis als PDF
    MobilNachhaltigElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Markus Eider

    Nutzerorientierte Empfehlungen für Lithium-Ionen-Batterien in Elektrofahrzeugen

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalNachhaltigElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Christina Sigl, Siegfried Hildebrand

    Smart Grid: Technologien für ländliche Gebiete

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und Medientechnik

    Vortrag

    Peter Faber

    Contactless Inductive Flow Tomography (CIFT)

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Vortrag

    Amar Almaini

    Authentication and port scan mitigation in the Software Defined Network Switches

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Melanie Piser, S. Schmuderer

    Bürgerbeteiligung neu denken: transparent, einflussreich und digital

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Mariann Juha

    Peregrinus Silva Bohemica: Multimediale und digitale Touristenführung auf grenzüberschreitenden historischen Wegen im Bayer- und Böhmerwald

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    MobilElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Nicki Bodenschatz

    Electric Vehicle Fleet Charging

    Vortrag und Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Vortrag

    Fabian Sauer

    Evaluationsframework für Intrusion Detection System (IDS)

    Vortrag und Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Anja Braehmer

    MuseumUploaded: Interaktive und grenzüberschreitende Museumskooperationen

    Vortrag und Posterpräsentation

    6. Tag der Forschung, Deggendorf

    DigitalElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Alexander Weinberger

    Einsatz von Software Defined Radio zur Detektion und Analyse von Funksignalen ziviler Drohnen

    U.T.SEC 2019 - Summit for Drones, Unmanned Technologies & Security, Nürnberg

    DigitalElektrotechnik und MedientechnikTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    Stefan Kunze, Alexander Weinberger, Rainer Pöschl

    A Software Defined Radio Based Implementation for the Radio Frequency Analysis of Signals from Unmanned Aerial Systems

    Proceedings of the 29th International Conference Radioelektronika 2019 (April 16-18, 2019; Pardubice, Czech Republic)

    DigitalElektrotechnik und MedientechnikTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    Stefan Kunze, M. Schiefer, Alexander Weinberger

    A GNU Radio Imprementation for Frequency Hopping Spread Spectrum Receiver Synchronization

    Proceedings of the 29th International Conference Radioelektronika 2019 (April 16-18, 2019; Pardubice, Czech Republic)

    DigitalMobilElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Michael Heigl, Martin Schramm, D. Fiala

    A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication

    Proceedings of the IEEE Annual International Conference on Pervasive Computing and Communications Workshops (March 11-15, 2019; Kyoto, Japan)

    ISBN: 978-1-5386-9150-2

    DOI: 10.1109/PERCOMW.2019.8730749

    Abstract anzeigen

    The ubiquitous internetworking of devices in all areas of life is boosted by various trends for instance the Internet of Things. Promising technologies that can be used for such future environments come from Wireless Sensor Networks. It ensures connectivity between distributed, tiny and simple sensor nodes as well as sensor nodes and base stations in order to monitor physical or environmental conditions such as vibrations, temperature or motion. Security plays an increasingly important role in the coming decades in which attacking strategies are becoming more and more sophisticated. Contemporary cryptographic mechanisms face a great threat from quantum computers in the near future and together with Intrusion Detection Systems are hardly applicable on sensors due to strict resource constraints. Thus, in this work a future-proof lightweight and resource-aware security concept for sensor networks with a processing stage permeated filtering mechanism is proposed. A special focus in the concepts evaluation lies on the novel Magic Number filter to mitigate a special kind of Denial-of-Service attack performed on CC1350 LaunchPad ARM Cortex-M3 microcontroller boards.

    DigitalMobilElektrotechnik und MedientechnikTC Freyung

    Beitrag (Sammelband oder Tagungsband)

    Simon Graf, Raphaela Pagany, Wolfgang Dorner, A. Weigold

    Georeferencing of road infrastructure from photographs using computer vision and deep learning for road safety applications

    Proceedings of the 5th International Conference on Geographical Information Systems Theory, Applications and Management (GISTAM) [May 3-5, 2019; Heraklion, Greece], vol. Vol. 1

    DOI: 10.5220/0007706800710076

    DigitalElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Alexander Weinberger

    Einsatz von Software Defined Radio zur Detektion und Analyse von Funksignalden ziviler Drohnen

    U.T.SEC 2019 - Summit for Drones, Unmanned Technologies & Security, Nürnberg

    MobilElektrotechnik und MedientechnikTC Freyung

    Zeitschriftenartikel

    Raphaela Pagany, Anna Marquardt, Roland Zink

    Electric Charging Demand Location Model—A User- and Destination-Based Locating Approach for Electric Vehicle Charging Stations

    Sustainability, vol. 11, no. 8

    DOI: 10.3390/su11082301

    Abstract anzeigen

    In recent years, with the increased focus on climate protection, electric vehicles (EVs) have become a relevant alternative to conventional motorized vehicles. Even though the market share of EVs is still comparatively low, there are ongoing considerations for integrating EVs in transportation systems. Along with pushing EV sales numbers, the installation of charging infrastructure is necessary. This paper presents a user- and destination-based approach for locating charging stations (CSs) for EVs—the electric charging demand location (ECDL) model. With regard to the daily activities of potential EV users, potential positions for CSs are derived on a micro-location level in public and semipublic spaces using geographic information systems (GIS). Depending on the vehicle users’ dwell times and visiting frequencies at potential points of interest (POIs), the charging demand at such locations is calculated. The model is mainly based on a survey analyzing the average time spent per daily activity, regional data about driver and vehicle ownership numbers, and the georeferenced localization of regularly visited POIs. Optimal sites for parking and charging EVs within the POIs neighborhood are selected based on walking distance calculations, including spatial neighborhood effects, such as the density of POIs. In a case study in southeastern Germany, the model identifies concrete places with the highest overall demand for CSs, resulting in an extensive coverage of the electric energy demand while considering as many destinations within the acceptable walking distance threshold as possible.

    DigitalElektrotechnik und MedientechnikTC Freyung

    Vortrag

    Stefan Kunze, I. Tchouchenkov

    Detektionsmöglichkeiten mit HF-basierter Sensorik (SDR)

    Counter-UAS Symposium, Wachtberg

    DigitalMobilElektrotechnik und MedientechnikInstitut ProtectIT

    Zeitschriftenartikel

    Michael Heigl, Laurin Dörr, Nicolas Tiefnig, D. Fiala, Martin Schramm

    A Resource-Preserving Self-Regulating Uncoupled MAC Algorithm to be Applied in Incident Detection

    Computers & Security, vol. 85, no. August, pp. 270-285

    Abstract anzeigen

    The connectivity of embedded systems is increasing accompanied with thriving technology such as Internet of Things/Everything (IoT/E), Connected Cars, Smart Cities, Industry 4.0, 5G or Software-Defined Everything. Apart from the benefits of these trends, the continuous networking offers hackers a broad spectrum of attack vectors. The identification of attacks or unknown behavior through Intrusion Detection Systems (IDS) has established itself as a conducive and mandatory mechanism apart from the protection by cryptographic schemes in a holistic security eco-system. In systems where resources are valuable goods and stand in contrast to the ever increasing amount of network traffic, sampling has become a useful utility in order to detect malicious activities on a manageable amount of data. In this work an algorithm – Uncoupled MAC – is presented which secures network communication through a cryptographic scheme by uncoupled Message Authentication Codes (MAC) but as a side effect also provides IDS functionality producing alarms based on the violation of Uncoupled MAC values. Through a novel self-regulation extension, the algorithm adapts it’s sampling parameters based on the detection of malicious actions. The evaluation in a virtualized environment clearly shows that the detection rate increases over runtime for different attack scenarios. Those even cover scenarios in which intelligent attackers try to exploit the downsides of sampling.

    DigitalElektrotechnik und Medientechnik

    Beitrag (Sammelband oder Tagungsband)

    Andreas Fischer, A. Paler

    On the analogy between quantum circuit design automation and virtual network embedding

    Proceedings of 34th ACM/SIGAPP Symposium on Applied Computing (SAC'19) [April 8-12, 2019; Limassol, Cyprus], New York, NY, USA

    DOI: 10.1145/3297280.3297419

    Abstract anzeigen

    Quantum computing and network virtualisation share more similarities than it would seem on first thought: both reach their potential by using the underlying hardware as efficiently as possible - a classical computer science problem. Quantum computing research has already been focusing on key problems related to the scarcity of the quantum hardware, hoping that once scalable quantum computers will be available, quantum circuit design automation methods (QCDA) are mature. Consequently, a significant methodological apparatus exists for a technology envisioned to scale in the future. Likewise, the optimisation of resource assignment for virtual networks has received much attention in the literature. As such, any scalability improvement of virtual network embedding (VNE) would be of high practical importance in the present. There is an interesting and promising relationship between VNE and QCDA. This work introduces the possibility to use QCDA methodology for VNE, and vice versa. VNE problem instances can be modeled using the quantum circuit formalism, and we offer some basic examples. To the best of our knowledge, this is the first work that highlights this analogy.