Refine
Year of publication
Document Type
- Doctoral Thesis (58) (remove)
Language
- English (31)
- German (25)
- Multiple languages (2)
Keywords
- Agrarprodukt (1)
- Apfel (1)
- Architektur (3)
- Autonomous vessels (1)
- Autonomy (1)
- BIPV (1)
- Backstepping control (1)
- Bahnplanung (1)
- Beobachterentwurf (1)
- Bernstein Basis (1)
- Biomedical signals (1)
- Bodensee (1)
- COMSOL Multiphysics (1)
- Cauchon algorithm (1)
- Channel Coding (1)
- Code-based cryptography (1)
- Company Building (1)
- Compliance (1)
- Computer hardware (1)
- Computer security (1)
- Control Theory (1)
- Corporate Entrepreneurship (1)
- Corporate Responsibility (1)
- Corporate Social Responsibility (2)
- Corporate Venturing (1)
- Corporate venture (1)
- Corporate venture management (1)
- Crowdsourcing (1)
- Data encryption (Computer science) (1)
- Decision making (1)
- Digital and Analog Signal Processing, Automation (1)
- Drying (1)
- Dünne Schicht (1)
- EMV (1)
- Eletromobilität (1)
- Energieeffizientes Bauen (1)
- Entrepreneurship (1)
- Feuchtigkeitsmessung (1)
- Flash Memories (1)
- Gebäudedesign (1)
- Generalized Concatenated Code (1)
- Generalized concatenated codes (1)
- Hybrides Leistungsbündel (1)
- Höhenstrahlung (1)
- Incubation (1)
- Information Exchange (1)
- Innovation (1)
- Innovation Management (1)
- Integrity (1)
- Integrität in Unternehmen (1)
- Kaufentscheidung (1)
- Kollisionsschutz (1)
- Konvektionstrocknung (1)
- Körner, Edmund (1)
- Lebensmittel (1)
- Lebensmitteleinzelhandel (1)
- Lebensmittelqualität (2)
- Machine Learning (1)
- Machine learning (1)
- Magnetaktoren (1)
- Maschinelles Lernen (1)
- McEliece cryptosystem (1)
- Medical systems (1)
- Messtechnik (1)
- Microprocessors (1)
- Model predictive control (1)
- Modellierung (1)
- Multinationales Unternehmen (1)
- NLP (1)
- Nachhaltigkeit (1)
- Numerical Optimization (1)
- Oberflächenprüfung (1)
- Operations research (1)
- Optimization (1)
- Organisational Transformation (1)
- P2P (1)
- Post-quantum public-key cryptography (1)
- Preisbündelung (1)
- Principles of Blockchain Technology (1)
- Probabilistic Data Association (1)
- Product Development (1)
- Produkteigenschaft (1)
- Prozessmanagement (1)
- Prozessoptimierung (1)
- Quality retention (1)
- Random Matrices (1)
- Reichlin, Bruno (1)
- Requirements Engineering (1)
- Road Infrastructure Projects (1)
- SME (1)
- Sensorlose Folgeregelung (1)
- Sign regular matrix (1)
- Sign-regular matrix (1)
- Signal acquisition (1)
- Signal processing (1)
- Social entrepreneurship (1)
- Solaraktive Gebäudehülle (1)
- Solararchitektur (1)
- Startup Collaboration (1)
- Startup Investing (1)
- Strategic renewal (1)
- Strictly sign-regular matrix (1)
- Systemgeschäft (1)
- Target Tracking (1)
- Totally nonnegative matrix (1)
- Totally nonpositive matrix (1)
- Totally positive matrix (1)
- Tourismus (1)
- Trajectory tracking (1)
- Trocknung (3)
- Unbemanntes Fahrzeug (1)
- Unternehmensethik (1)
- Verbraucherverhalten (1)
- Verbundangebot (1)
- Vitamin C (1)
- Warenkennzeichnung (1)
- Wasserfahrzeug (1)
- aktiver Leistungsfilter (1)
- network traffic (1)
- selektive Signalanalyse (1)
- string matching (1)
- traffic classification (1)
- traffic obfuscation (1)
Institute
- Fakultät Bauingenieurwesen (1)
- Fakultät Elektrotechnik und Informationstechnik (1)
- Fakultät Informatik (3)
- Fakultät Maschinenbau (2)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (3)
- Institut für Optische Systeme - IOS (3)
- Institut für Strategische Innovation und Technologiemanagement - IST (3)
- Institut für Systemdynamik - ISD (8)
- Institut für angewandte Thermo- und Fluiddynamik - IATF (1)
- Konstanz Institut für Corporate Governance - KICG (1)
Salem baut Neu-Birnau
(2012)
Cyberspace: a world at war. Our privacy, freedom of speech, and with them the very foundations of democracy are under attack. In the virtual world frontiers are not set by nations or states, they are set by those, who control the flows of information. And control is, what everybody wants.
The Five Eyes are watching, storing, and evaluating every transmission. Internet corporations compete for our data and decide if, when, and how we gain access to that data and to their pretended free services. Search engines control what information we are allowed - or want - to consume. Network access providers and carriers are fighting for control of larger networks and for better ways to shape the traffic. Interest groups and copyright holders struggle to limit access to specific content. Network operators try to keep their networks and their data safe from outside - or inside - adversaries.
And users? Many of them just don’t care. Trust in concepts and techniques is implicit. Those who do care try to take back control of the Internet through privacy-preserving techniques.
This leads to an arms race between those who try to classify the traffic, and those who try to obfuscate it. But good or bad lies in the eye of the beholder, and one will find himself fighting on both sides.
Network Traffic Classification is an important tool for network security. It allows identification of malicious traffic and possible intruders, and can also optimize network usage. Network Traffic Obfuscation is required to protect transmissions of important data from unauthorized observers, to keep the information private. However, with security and privacy both crumbling under the grip of legal and illegal black hat crackers, we dare say that contemporary traffic classification and obfuscation techniques are fundamentally flawed. The underlying concepts cannot keep up with technological evolution. Their implementation is insufficient, inefficient and requires too much resources.
We provide (1) a unified view on the apparently opposed fields of traffic classification and obfuscation, their deficiencies and limitations, and how they can be improved. We show that (2) using multiple classification techniques, optimized for specific tasks improves overall resource requirements and subsequently increases classification speed. (3) Classification based on application domain behavior leads to more accurate information than trying to identify communication protocols. (4) Current approaches to identify signatures in packet content are slow and require much space or memory. Enhanced methods reduce these requirements and allow faster matching. (5) Simple and easy to implement obfuscation techniques allow circumvention of even sophisticated contemporary classification systems. (6) Trust and privacy can be increased by reducing communication to a required minimum and limit it to known and trustworthy communication partners.
Our techniques improve both security and privacy and can be applied efficiently on a large scale. It is but a small step in taking back the Web.
Nowadays, there is a continuous need for many corporations to renew their business portfolio strategically in anticipation of changes in the business environment (e.g., technological change). The ongoing booming of founding international start-ups suggests that small entrepreneurial teams are an effective means to develop new businesses. Corporations should be able to benefit from this form of self-organized innovation when entering novel business domains for strategic renewal. However, corporations that establish small entrepreneurial teams (corporate ventures) are facing two obstacles. First, corporate ventures often fail for reasons that are not well explored. Second, it remains unclear how the partial successes may be improved to large successes. Although the key success factors remain ambiguous, there is little hope that corporate ventures will be successful without effective management. Since an empirical model for corporate venture management does not exists so far, the thesis formulates and answers the following problem statement: How can corporate management effectively manage corporate ventures? Building on qualitative and quantitative research methodologies, a model for effective corporate venture management is developed and tested statistically in the German IT consulting industry. The research results reveal some of the essential management principles through which corporate management can increase corporate venture success systematically.
The intentions of the so-called "More Electrical Aircraft" (MEA) are higher efficiency and lower weight. A main topic here is the application of electrical instead of hydraulical, pneumatical and mechanical systems. The necessary power electronic devices have intermediate DC-links, which are typically supplied by a three-phase system with active B6 and passive B12 rectifiers. A possible alternative is the B6 diode bridge in combination with an active power filter (APF). Due to the parallel arrangement, the APF offers a higher power density and is able to compensate for harmonics from several devices. The use of the diode bridge rectifier alone is not permitted due to the highly distorted phase current. The following investigations are dealing with the development of an active power filter for a three-phase supply with variable frequency from 360 to 800 Hz. All relevant components such as inductors, EMC-filters, power modules and DC-link capacitor are designed. A particular focus is put on the customized power module with SiC-MOSFETs and SiC-diodes, which is characterized electrically and thermally. The maximum supply frequency slope has a value of 50 Hz/ms, which requires a high dynamic and robustness on the control algorithm. Furthermore, the content of 5th and 7th harmonics must be reduced to less than 2 %, which demands a high accuracy. To cope with both requirements, a two-stage filter algorithm is developed and implemented in two independent signal processors. Simulations and laboratory experiments confirm the performance and robustness of the control algorithm. This work comprehensively presents the design of aerospace rectifiers. The results were published in conferences and patents.
Bei der Auslegung von Trocknungsprozessen empfindlicher biologischer Güter spielt die Produktqualität eine zunehmend wichtige Rolle. Obwohl der Einfluss der Trocknungsparameter auf die Trocknungskinetik von Äpfeln bereits Gegenstand vieler Studien war, sind die Auswirkungen auf die Produktqualität bisher kaum bekannt. Die Untersuchung dieses Sachverhalts und die Entwicklung geeigneter Prozessstrategien zur Verbesserung der Qualität des resultierenden Produkts, waren das Ziel der vorliegenden Arbeit. In einem ersten Schritt wurden zunächst umfangreiche stationäre Grundlagenversuche durchgeführt, die zeigten, dass eine Lufttemperatur im höheren Bereich, eine möglichst hohe Luftgeschwindigkeit und eine niedrige Taupunkttemperatur zur geringsten Trocknungszeit bei gleichzeitig guter optischer Qualität führt. Die Beurteilung dieser Qualitätsveränderungen erfolgte mit Hilfe einer neu eingeführten Bezugsgröße, der kumulierten thermischen Belastung, die durch das zeitliche Integral über der Oberflächentemperatur repräsentiert wird und die Vergleichbarkeit der Versuchsergebnisse entscheidend verbessert. Im zweiten Schritt wurden die Ergebnisse der Einzelschichtversuche zur Aufstellung eines numerischen Simulationsmodells verwendet, welches sowohl die entsprechenden Transportvorgänge, als auch die Formveränderung des Trocknungsgutes berücksichtigt. Das Simulationsmodell sowie die experimentellen Daten waren die Grundlage zur anschließenden Entwicklung von Prozessstrategien für die konvektive Trocknung von Äpfeln, die die resultierende Produktqualität, repräsentiert durch die Produktfarbe und –form, verbessern und gleichzeitig möglichst energieeffizient sein sollten. In einem weiteren Schritt wurde die Übertragbarkeit auf den industriellen Maßstab untersucht, wobei die entsprechenden Prozessstrategien an einer neu entwickelten, kostengünstigen Trocknungsanlage erfolgreich implementiert werden konnten. Das Ziel einer verbesserten Produktqualität konnte mit Hilfe unterschiedlicher instationärer Trocknungsschemata sowohl am Einzelschichttrockner, als auch im größeren Maßstab erreicht werden. Das vorgestellte numerische Simulationsmodell zeigte auch bei der Vorhersage des instationären Trocknungsprozesses eine hohe Genauigkeit und war außerdem in der Lage, den Trocknungsverlauf im industriellen Maßstab zuverlässig voraus zu berechnen.
In this thesis, a new framework has been proposed, designed and developed for creating efficient and cost effective logistics chains for long items within the building industry. The building industry handles many long items such as pipes, profiles and so on. The handling of these long items is quite complicated and difficult because they are bulky, unstable and heavy. So it is not cost effective and efficient to handle them manually. Existing planning frameworks ignore these special requirements of such goods and are not planned for handling these goods. That leads to that many additional manual handling steps are currently required to handle long items. Therefore, it is very important to develop a new framework for creating the efficient and cost-effective logistics chain for long items. To propose such a new framework, the expert interviews were conducted to gain the fully understanding about the customer requirements. The experts from all stages of the building industry supply chain were interviewed. The data collected from the expert interviews has been analysed and the meaningful findings about the customer requirements have been applied as the valuable inputs for the proposition of the new framework. To have fully knowledge about current practices, all existing planning frameworks have been analysed and evaluated using SWOT analysis. The strengths, weaknesses, opportunities and threats of the current planning frameworks have been comparatively analysed and evaluated. The findings from SWOT analysis have been used for proposing, designing and developing the new framework. The great efforts have been made during the implementation stage. The six different key parameters for a successful implementation have been identified. They are: • Improvement Process with Employees • Control of the Improvements • Gifts/Money for the Improvements and Additional Work • KAIZEN Workshops • Motivation of the Employees for Improvements • Presentation of the Results Among these six parameters, it has been found that KAIZEN workshops is a very effective way for creating an efficient and cost-effective logistics chain for long items. It is believed that the new framework can be theoretically used for the planning of logistics that handle long items and commercial goods. This framework can also be used to plan all kinds of in-house logistics processes from the incoming goods, storage, picking, delivery combination areas and through to the outgoing goods area. The achievements of this project are as follows (1) the new framework for creating efficient and cost-effective logistics chains for long items, (2) the data collection and the data evaluation at the preliminary planning, (3) the decision for one planning variant already at the end of the structure planning, (4) the analysis and evaluation of customer requirements, (5) the consideration and implementation of the customer requirements in the new framework, (6) the creation of figures and tables as planning guideline, (7) the research and further development of Minomi with regards to long items, (8) the research on the information flow, (9) the classification of the improvements and the improvement handling at the implementation, (10) the identification of key parameters for a successful implementation of the planning framework. This framework has been evaluated both theoretically and through a case study of a logistics system planning for handling long items and commercial goods. It has been found that the new framework is theoretically sound and practically valuable. It can be applied to creating the logistics system for long items, especially for building industry.