Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailH wie Heimat
Heimböckel, Dieter UL

Article for general public (2012)

Detailed reference viewed: 48 (0 UL)
Full Text
Peer Reviewed
See detailH-infinity Adaptive Observer Design and Parameter Identification for a Class of Nonlinear Fractional-Order Systems
N'Doye, Ibrahima; Voos, Holger UL; Laleg-Kirati, Taous-Meriem et al

in 53rd IEEE Conference Decision and Control, CDC’14, Los Angeles, USA, 15-17 Dec. 2014 (2014, December)

Detailed reference viewed: 65 (5 UL)
Full Text
Peer Reviewed
See detailH-infinity dynamic observer design for linear time invariant systems
Gao, Nan; Darouach, Mohamed; Voos, Holger UL et al

in 2014 IEEE 53rd Annual Conference on Decision and Control (CDC), Los Angeles, USA (2014, December)

This paper proposes an H-infinity dynamic observer (DO) for a class of linear time invariant (LTI) systems in the presence of disturbances. It generalizes the existing results on the proportional observer ... [more ▼]

This paper proposes an H-infinity dynamic observer (DO) for a class of linear time invariant (LTI) systems in the presence of disturbances. It generalizes the existing results on the proportional observer (PO), the proportional integral observer (PIO) and the DO. The design method is derived from a new formulation of linear matrix inequality (LMI), based on the solutions of the algebraic constraints obtained from the unbiasedness conditions of the estimation error. A numerical example is provided to show the applicability and performances of our observer. [less ▲]

Detailed reference viewed: 128 (1 UL)
Full Text
Peer Reviewed
See detailH-infinity Static Output Feedback Control for a Fractional-Order Glucose-Insulin System
Ndoye, Ibrahima UL; Voos, Holger UL; Darouach, Mohamed et al

in 6th Workshop on Fractional Differentiation and Its Applications. Part of 2013 IFAC Joint Conference SSSC, TDS and FDA (2013), Grenoble, February 4-6, 2013 (2013)

This paper presents the H-infinity static output feedback control of nonlinear fractional-order glucose-insulin systems. In this paper, it is an attempt to incorporate fractional-order into the ... [more ▼]

This paper presents the H-infinity static output feedback control of nonlinear fractional-order glucose-insulin systems. In this paper, it is an attempt to incorporate fractional-order into the mathematical minimal model of glucose-insulin system dynamics and it is still an interesting challenge to show, how the order of a fractional di erential system a ects the dynamics of system in the presence of meal disturbance. A static output feedback control is considered for the problem. Su fficient conditions are derived in terms of linear matrix inequalities (LMIs) formulation by using the fractional Lyapunov direct method where the fractional-order \alpha belongs to 0<\alpha<1. Finally, numerical simulations are carried out to illustrate our proposed results and show that the nonlinear fractional-order glucose-insulin systems are as stable as their integer-order counterpart in the presence of exogenous glucose infusion or meal disturbance. [less ▲]

Detailed reference viewed: 311 (7 UL)
Full Text
Peer Reviewed
See detailH2 Norm Based Network Volatility Measures
Huang, Qingqing; Yuan, Ye; Goncalves, Jorge UL et al

in The proceedings of the American Control Conference (2014)

Motivated by applications in biology and economics, we propose new volatility measures based on the H2 system norm for linear networks stimulated by independent or correlated noise. We identify critical ... [more ▼]

Motivated by applications in biology and economics, we propose new volatility measures based on the H2 system norm for linear networks stimulated by independent or correlated noise. We identify critical links in a network, where relatively small improvements can lead to large reductions in network volatility measures. We also examine volatility measures of individual nodes and their dependence on the topological position in the network. Finally, we investigate the dependence of the volatility on different network interconnections, weights of the edges and other network properties. Hence in an intuitive and efficient way, we can identify critical links, nodes and interconnections in network which can shed light in the network design to make it more robust. [less ▲]

Detailed reference viewed: 80 (5 UL)
Full Text
Peer Reviewed
See detailH2-Based Network Volatility Measures
Goncalves, Jorge UL; Huang, Qingqing; Yuan, Ye et al

in American Control Conference (2014, June)

Detailed reference viewed: 40 (0 UL)
Full Text
See detailH2020 PROJECT CEASEVAL. Evaluation of the Common European Asylum System under Pressure and Recommendations for Further Development
Nienaber, Birte UL; Vianelli, Lorenzo UL; Paraschivescu, Claudia UL et al

Poster (2018)

Within CEASEVAL, the University of Luxembourg leads Work Package 4 (WP4) on “Borders and the Mobility of Migrants”. The aim of WP4 is to develop a framework to analyse the interactions between borders and ... [more ▼]

Within CEASEVAL, the University of Luxembourg leads Work Package 4 (WP4) on “Borders and the Mobility of Migrants”. The aim of WP4 is to develop a framework to analyse the interactions between borders and the mobility of migrants (asylum seekers, refugees and irregular migrants), thus also addressing the relation between asylum systems and Schengen regime. In order to do so, WP4 investigates the functioning of the internal and external EU borders in the governance of migrants’ mobility by looking specifically at the ways in which bordering processes are implemented when confronted with the mobility of migrants. The research draws from an extensive empirical study in 7 different countries: France, Germany, Greece, Hungary, Luxembourg, Spain and Turkey. Qualitative interviews with migrants (asylum seekers, refugees and irregular migrants) and institutional actors (border agents, policymakers, representatives of institutions, etc.), as well as ethnographic observations of border agencies and border points are conducted in these case studies. The objectives of this qualitative fieldwork are to identify mobility trajectories, understand how these are shaped by border policies, and compare bordering processes. The work package will result in 7 country reports (one for each case study), a comparative report, a policy brief, and an online interactive map. [less ▲]

Detailed reference viewed: 51 (11 UL)
Full Text
Peer Reviewed
See detailH_∞ decentralized dynamic-observer-based control design for large-scale nonlinear intercon-nected systems
Gao, Nan; Darouach, Mohamed; Alma, Marouane et al

in Transaction on IoT and Cloud Computing (2014), 2(3), 46-66

Detailed reference viewed: 51 (1 UL)
Full Text
See detailHaben die 'neuen Medien' die Öffentlichkeit zerstört? : Ein Versuch zur Differenzierung
Kohns, Oliver UL

Article for general public (2019)

Detailed reference viewed: 26 (2 UL)
Full Text
Peer Reviewed
See detailHabenula deep brain stimulation for refractory bipolar disorder.
Zhang, Chencheng; Kim, Seung-Goo; Li, Dianyou et al

in Brain stimulation (2019)

Bipolar disorder (BD) is a mood disorder associated with significant morbidity and mortality. In many cases, BD can be managed with pharmacotherapy, psychological therapy, or electroconvulsive therapy [1 ... [more ▼]

Bipolar disorder (BD) is a mood disorder associated with significant morbidity and mortality. In many cases, BD can be managed with pharmacotherapy, psychological therapy, or electroconvulsive therapy [1]. For some afflicted patients, however, BD is a chronic and severely disabling condition that is resistant to the aforementioned treatments. Deep brain stimulation (DBS) offers a safe and effective neurosurgical treatment for otherwise refractory movement disorders and obsessive-compulsive disorder [2,3]. [less ▲]

Detailed reference viewed: 39 (1 UL)
Full Text
See detailHabilitation Thesis
Baraud, Yannick UL

Dissertation and these (2002)

Detailed reference viewed: 38 (0 UL)
See detailL'habitat collectif autogéré : choix ou contrainte ?
Hiez, David UL

Scientific Conference (2013)

Detailed reference viewed: 32 (1 UL)
Full Text
See detailHabiter par projets. Transformations urbaines et lieux de ville
Bricocoli, Massimo UL; Savoldi, Paola

in Berque, Augustin; De Biase, Alessia; Bonnin, Philippe (Eds.) Donner lieu au monde: la poétique de l'habiter (2012)

Detailed reference viewed: 37 (1 UL)
Full Text
See detailHabitudes de lecture et compétences de lecture bilingue
Reichert, Monique UL; Krämer, Charlotte UL; Wollschläger, Rachel UL et al

Report (2018)

La problématique soulevée dans cet article concerne les liens entre d’une part, la fréquence de lecture chez les adolescents en fonction des types de textes lus, et de la langue dans laquelle ils lisent ... [more ▼]

La problématique soulevée dans cet article concerne les liens entre d’une part, la fréquence de lecture chez les adolescents en fonction des types de textes lus, et de la langue dans laquelle ils lisent et, dautre part, leur niveau de compétence de lecture en allemand et en français. En outre, il s’agit d’étudier ces liens en fonction des contextes socio-économique et migratoire, de la langue maternelle, et du sexe des adolescents. À cet effet, les données recueillies dans le cadre des Épreuves Standardisées (ÉpStan) de novembre 2016 permettent d’analyser les compétences de lecture en allemand et en français ainsi que les habitudes de lecture extrascolaire de 5177 élèves du grade 9, fréquentant l’Enseignement Secondaire (ES), l’Enseignement Secondaire Technique (EST) ou la branche Préparatoire de l’Enseignement Secondaire Technique (EST-PRE). Les analyses montrent clairement que, indépendamment du sexe, du type d’enseignement et des caractéristiques socioculturelles des adolescents, principalement la tendance à lire des textes narratifs est positivement corrélée aux compétences en lecture. [less ▲]

Detailed reference viewed: 29 (6 UL)
Full Text
See detailHachage vers les courbes elliptiques et cryptanalyse de schémas RSA
Tibouchi, Mehdi UL

Doctoral thesis (2011)

This thesis consists of two independent parts, devoted to both aspects of cryptology: construction and analysis. Contributions to cryptography proper, on the one hand, address open questions in algebraic ... [more ▼]

This thesis consists of two independent parts, devoted to both aspects of cryptology: construction and analysis. Contributions to cryptography proper, on the one hand, address open questions in algebraic curve-based cryptography, particularly the problem of encoding and hashing to elliptic curves. We derive some quantitative results on curve-valued encoding functions, and give a satisfactory construction of hash functions based on those encodings, using a range of mathematical techniques from function field arithmetic, the algebraic geometry of curves and surfaces, and character sums. We also worked on a more implementation-related problem in elliptic curve cryptography, namely the construction of fast addition and doubling formulas. Our cryptanalytic work, on the other hand, focuses on RSA-based cryptosystems—mostly encryption and signature schemes. We have obtained and carried out new attacks on standardized padding schemes that remain in widespread use, including ISO/IEC 9796-2 for signatures and PKCS#1 v1.5 for encryption. We also propose new physical fault attacks on RSA signature schemes using the Chinese Remainder Theorem, and a stronger attack on RSA schemes relying on small hidden-order subgroups. The tools involved include index calculus, lattice reduction techniques and efficient arithmetic of large degree polynomials. [less ▲]

Detailed reference viewed: 79 (4 UL)
See detail¿Hacia la firma de un acuerdo sectorial México-Unión Europea en materia de educación y formación?
Velasco Pufleau, Monica UL

in Huacuja Acevedo, Luis (Ed.) IX Reunión de la Comisión Parlamentaria Mixta México - Unión Europea: Cuaderno de Trabajo (2009)

Detailed reference viewed: 45 (2 UL)
Full Text
Peer Reviewed
See detail¿Hacia una Verdadera Acción Popular para la Protección del Medioambiente? Una Reflexión a la Luz de la Jurisprudencia Española y Europea
Muñoz, Susana UL

in Murillo, F. Javier; Mesa, Manuela (Eds.) Actas del I Congreso Internacional Derechos Humanos, Democracia, Cultura de Paz y No Violencia (2019)

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European ... [more ▼]

The lack of legal locus standi for natural persons in environmental matters in the Spanish legal system raises important legal issues. The multilevel environmental protection and, fundamentally, European human rights law provide interpretative keys in favour of a true actio popularis open to citizens in defence of their individual rights and, ultimately, of environmental justice. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailHacker’s Toolbox: Detecting Software-Based 802.11 Evil Twin Access Points
Lanze, Fabian UL; Panchenko, Andriy UL; Ponce-Alcaide, Ignacio et al

in Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015) (2015)

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are ... [more ▼]

The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are exposed to a severe security threat: since 802.11 identifiers (SSID, BSSID) can be easily faked, an attacker can setup an evil twin, i.e., an access point (AP) that users are unable to distinguish from a legitimate one. Once a user connects to the evil twin, he inadvertently creates a playground for various attacks such as collection of sensitive data (e.g., credit card information, passwords) or man-in-the-middle attacks even on encrypted traffic. It is particularly alarming that this security flaw has led to the development of several tools that are freely available, easy to use and allow mounting the attack from commodity client devices such as laptops, smartphones or tablets without attracting attention. In this paper we provide a detailed overview of tools that have been developed (or can be misused) to set up evil twin APs. We inspect them thoroughly in order to identify characteristics that allow them to be distinguished from legitimate hardware-based access points. Our analysis has discovered three methods for detecting software-based APs. These exploit accuracy flaws due to emulation of hardware behavior or peculiarities of the client Wi-Fi hardware they operate on. Our evaluation with 60 hardware APs and a variety of tools on different platforms reveals enormous potential for reliable detection. Furthermore, our methods can be performed on typical client hardware within a short period of time without even connecting to a potentially untrustworthy access point. [less ▲]

Detailed reference viewed: 227 (4 UL)