Offene Abschlussarbeiten

Auf dieser Seite finden Sie Informationen zu aktuell von uns angebotenen Themen für Abschlussarbeiten. Informationen zu bereits laufenden oder fertiggestellten Arbeiten finden sich auf einer Unterseite. Beachten Sie, dass ausgeschriebene Arbeiten teilweise als Bachelor- und Masterarbeit oder auch als Projektarbeit ausgeschrieben sind. Je nachdem, was Studierende benötigen, wird in der Regel das Thema der gewählten Arbeit in Arbeitsumfang und Schwierigkeitsgrad angepasst.

Hinweis zur Sprache: Im Folgenden werden die verfügbaren Themen hauptsächlich auf Englisch aufgelistet. Bei der Bearbeitung eines Thema steht es Studierenden frei, sich entweder für Deutsch oder Englisch als Sprache für die Ausarbeitung zu entscheiden.

Aktuelle Ausschreibungen

„Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
„Extension of a Monero Wallet,“ Bachelorarbeit, Projektarbeitarbeit, F. Engelmann (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
The goal of this project is to extend the Monero project [1] to support an additional transaction type. The transaction itself is already implemented, but is not integrated into the cli tools and the consensus mechanism. A good knowledge of C++ is required and a basic understanding of cryptocurrencies is helpful. The evaluation of the project consists of creating a cli demo in a test setup.
„Latenzmessungen und Evaluation in alternativen Blockchain Systemen,“ Bachelorarbeit, Masterarbeit, Projektarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Die Transaktionsverbreitung in Blockchain Netzwerken findet üblicherweise über einen Broadcastmechanismus statt. In einer ersten Forschungsarbeit am Institut haben wir das Verhalten dieses Broadcasts im Bitcoin Netzwerk untersucht. Ziel dieser Arbeit ist es, für alternative Blockchain Netzwerke, wie Beispielsweise das Ethereum oder Monero Netzwerk, die Untersuchung zu replizieren. Hierfür gilt es einen geeigneten Crawler zu erstellen, Datensets zusammen zu stellen und geeignete stochastische Methoden anzuwenden. Das Ausmaß dieser Untersuchung richtet sich nach der gewählten Art der Arbeit.
„Machine Learning with TensorFlow Federated,“ Masterarbeit, Bachelorarbeit, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
To build powerful machine learning models, lots of data is required. However, obtaining the data comes with privacy risks for the people or entities that provide their data. Recently, Google published TensorFlow Federated - an open source framework to allow machine learning on decentralized data. The approach of federated learning makes machine learning in the age of mobile devices and wearables both more efficient, as well as more privacy-friendly. The goal of this thesis or project is to become familiar with the TensorFlow Federated framework, to understand and be able to explain the techniques which are implemented in it, to be able to build machine learning models in a federated way, and possibly to implement own enhancements of the framework.
„Machine Learning with TensorFlow Privacy,“ Masterarbeit, Bachelorarbeit, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Machine learning offers great opportunities, but also comes with risks. Especially the privacy risks are becoming more prevalent in the discussions about machine learning. Recently, Google published a machine learning library called TensorFlow Privacy. Its goal is to make it easier for developers and researchers to build privacy-preserving machine learning models. Specifically, it utilizes Differential Privacy, which mathematically guarantees that the training data to create the models is protected from being extracted. The goal of this thesis or project is to become familiar with the TensorFlow Privacy library, to understand and be able to explain the techniques which are implemented in it, to be able to build privacy-preserved machine learning models, and possibly to implement own protection techniques that could enhance the TensorFlow Privacy library.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
„Verwirklichung eines Privatsphäre garantierenden Broadcast Protokolls,“ Masterarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. f. Vert. Sys., Univ. Ulm, 2019 – Verfügbar.
Die Verbreitung von Transaktionen in Blockchain-Netzwerken kann viele Informationen über deren Nutzer preisgeben. Ins- besonder muss die Vertraulichkeit von Zahlungsinformationen geschützt werden. Um diesen Schutz zu erreichen, haben wir ein Protokoll entworfen, welches die Privatsphäre dieser Trans-aktionen gewährleistet und Entwicklern die nötige Flexibilität für verschiedenste Anwendungsszenarien bereitstellt. Doch es bleiben viele offene Fragen für die Umsetzung in der Praxis, beispielsweise die Anpassung an praktische Begebenheiten und die Erstellung der nötigen Gruppen. Ziel dieser Arbeit ist es, einige der offenen Fragen zu klären und das Protokoll im Rahmen einer Proof-of-Concept-Implementierung zu evaluieren. Geeignet für Studierende mit Erfahrung Netzwerkprogrammierung. This project can also be completed in English. Please contact me for further details.
„Controlled Neurofeedback using Mobile EEG and Smartphone,“ Masterarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Neurofeedback provides the necessary means to visualize selected and controlled parameters of the brain activity. In healthcare domain, neurofeedback studies enable mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus providing the necessary feedback. In this thesis work, the student is required to survey the current state of frameworks, techniques, or methods that enable coupling of Mobile EEGs with Smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with Smartphones. The student would therefore be required to work on the Bluetooth stack to acquire real-time data generated from the Mobile EEGs, parse the electrical signal, and visualize the signal semantically. For successful completion of the thesis, the student would be required to identify and address any one of the open challenges faced by the proposed topic. An example of this can be addressing the bandwidth challenges, battery consumption, or signal accuracy
„Machine Learning on Encrypted Data,“ Bachelor Thesis, Master Thesis, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Encryption is one of the most reliable techniques for protecting information. However, once data is encrypted, using it becomes very difficult. Goal of this thesis or project, is to explore how Machine Learning algorithms can be designed to be able to deal with encrypted data. Firstly, a survey of existing mechanisms should be conducted. In a second part, algorithms will be comparatively implemented, or own encryption mechanisms introduced.
„Node-centric detection and eviction of malicious nodes in VANETs,“ Master Thesis, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Vehicular ad-hoc networks (VANETs) are designed to provide various services to drivers and passengers by exchanging information between vehicles. Services include improved safety, better navigation recommendations, road condition warnings and features to support self-driving vehicles. For these services to work correctly, data correctness is extremely important. Literature suggests that node-centric detection mechanisms are a potential solution: by monitoring the behavior of other vehicles over time, vehicles can determine who is most reliable. It is also possible to exchange this information between vehicles using trust mechanisms. In this thesis, the goal is to improve existing trust mechanisms and implement the resulting mechanisms in the Maat framework, a Java-based prototype detection framework under development at the institute of distributed systems.
„Weltbild-Modellierung in kooperativen intelligenten Transport-Systemen,“ Bachelor, Master- oder Diplomarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2014 – Verfügbar.
In den letzten 10 Jahren entstand eine neue Art von Netzwerken, die dafür entwickelt wurde Fahrzeuge ad-hoc kommunizieren zu lassen. Diese Netzwerke, so genannte Fahrzeug-Fahrzeug-Kommunikationssysteme, können erweitert werden durch zentrale Backend Systeme und so genannte Road-Side-Units (RSUs), die am Straßenrand aufgestellt werden. Das gesamte System, inklusive Infrastruktur, bezeichnet man auch als kooperatives intelligentes Transport-Systemen (cITS). In diesen Netzwerken sollen Fahrzeuge regelmäßig Nachrichten austauschen, um festzustellen wo sich einzelne Fahrzeuge befinden und wie schnell sie fahren. Darüber hinaus schicken sie auch Warnungen wenn bestimmte Ereignisse erkannt wurden (z.B. ein Stau oder vereiste Fahrbahn). Um diese Daten effizient zu nutzen und Ereignisse sinnvoll erkennen zu können, sollte es ein Welt-Modell geben, in dem alle empfangenen Informationen gesammelt werden. Außer der direkten Nutzung als Informationsquelle kann das Weltbild dazu genutzt werden, festzustellen wenn Daten miteinander in Konflikt stehen. Solche Konflikte können auf Angreifer hindeuten, die gefälschte Daten verschickt haben. Das Welt-Modell sollte daher möglichst flexibel sein und eine Vielzahl von unterschiedlichen Daten abbilden können. Ziel der Arbeit ist, ein Konzept für ein solches Weltmodell zu entwickeln und es erweiterbar und flexibel zu implementieren. Es existieren Vorarbeiten, auf denen gerade bei der Konzept-Erstellung aufgebaut werden kann. Neben konzeptuellen Aspekten und möglichst generischer Repräsentation soll die Arbeit auch effiziente Skalierbarkeit und Performanz betrachten.
„Verification of data consistency mechanisms,“ Master- oder Diplomarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2012 – Verfügbar.
In recent literature on Vehicular Networks, many works assume the existence of data consistency mechanisms, physical model checks and other data-centric verification. However, little is known about how well these mechanisms can work, what type of guarantees they can give, what to do with errors and whether they can be used for attacker detection. Many of these unanswered questions relate to the fact that data consistency mechanisms are still a relatively new concept, and they are not exclusively used for security purposes. The goal of this thesis is to provide a brief summary of existing mechanisms and to provide a good method for evaluating data consistency mechanisms, either with formal verification or with simulation. Initial Literature: Dietzel, S.; Schoch, E.; Konings, B.; Weber, M.; Kargl, F.: Resilient secure aggregation for vehicular networks; IEEE Network; Vol. 24(1); January 2010. Raya, M.; Hubaux, J-P.: The security of vehicular ad hoc networks; ACM SASN 2005.

Themen nach Abschluss

Bachelor-Arbeiten

„Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
„Extension of a Monero Wallet,“ Bachelorarbeit, Projektarbeitarbeit, F. Engelmann (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
The goal of this project is to extend the Monero project [1] to support an additional transaction type. The transaction itself is already implemented, but is not integrated into the cli tools and the consensus mechanism. A good knowledge of C++ is required and a basic understanding of cryptocurrencies is helpful. The evaluation of the project consists of creating a cli demo in a test setup.
„Latenzmessungen und Evaluation in alternativen Blockchain Systemen,“ Bachelorarbeit, Masterarbeit, Projektarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Die Transaktionsverbreitung in Blockchain Netzwerken findet üblicherweise über einen Broadcastmechanismus statt. In einer ersten Forschungsarbeit am Institut haben wir das Verhalten dieses Broadcasts im Bitcoin Netzwerk untersucht. Ziel dieser Arbeit ist es, für alternative Blockchain Netzwerke, wie Beispielsweise das Ethereum oder Monero Netzwerk, die Untersuchung zu replizieren. Hierfür gilt es einen geeigneten Crawler zu erstellen, Datensets zusammen zu stellen und geeignete stochastische Methoden anzuwenden. Das Ausmaß dieser Untersuchung richtet sich nach der gewählten Art der Arbeit.
„Machine Learning with TensorFlow Federated,“ Masterarbeit, Bachelorarbeit, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
To build powerful machine learning models, lots of data is required. However, obtaining the data comes with privacy risks for the people or entities that provide their data. Recently, Google published TensorFlow Federated - an open source framework to allow machine learning on decentralized data. The approach of federated learning makes machine learning in the age of mobile devices and wearables both more efficient, as well as more privacy-friendly. The goal of this thesis or project is to become familiar with the TensorFlow Federated framework, to understand and be able to explain the techniques which are implemented in it, to be able to build machine learning models in a federated way, and possibly to implement own enhancements of the framework.
„Machine Learning with TensorFlow Privacy,“ Masterarbeit, Bachelorarbeit, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Machine learning offers great opportunities, but also comes with risks. Especially the privacy risks are becoming more prevalent in the discussions about machine learning. Recently, Google published a machine learning library called TensorFlow Privacy. Its goal is to make it easier for developers and researchers to build privacy-preserving machine learning models. Specifically, it utilizes Differential Privacy, which mathematically guarantees that the training data to create the models is protected from being extracted. The goal of this thesis or project is to become familiar with the TensorFlow Privacy library, to understand and be able to explain the techniques which are implemented in it, to be able to build privacy-preserved machine learning models, and possibly to implement own protection techniques that could enhance the TensorFlow Privacy library.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
„Machine Learning on Encrypted Data,“ Bachelor Thesis, Master Thesis, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Encryption is one of the most reliable techniques for protecting information. However, once data is encrypted, using it becomes very difficult. Goal of this thesis or project, is to explore how Machine Learning algorithms can be designed to be able to deal with encrypted data. Firstly, a survey of existing mechanisms should be conducted. In a second part, algorithms will be comparatively implemented, or own encryption mechanisms introduced.
„Weltbild-Modellierung in kooperativen intelligenten Transport-Systemen,“ Bachelor, Master- oder Diplomarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2014 – Verfügbar.
In den letzten 10 Jahren entstand eine neue Art von Netzwerken, die dafür entwickelt wurde Fahrzeuge ad-hoc kommunizieren zu lassen. Diese Netzwerke, so genannte Fahrzeug-Fahrzeug-Kommunikationssysteme, können erweitert werden durch zentrale Backend Systeme und so genannte Road-Side-Units (RSUs), die am Straßenrand aufgestellt werden. Das gesamte System, inklusive Infrastruktur, bezeichnet man auch als kooperatives intelligentes Transport-Systemen (cITS). In diesen Netzwerken sollen Fahrzeuge regelmäßig Nachrichten austauschen, um festzustellen wo sich einzelne Fahrzeuge befinden und wie schnell sie fahren. Darüber hinaus schicken sie auch Warnungen wenn bestimmte Ereignisse erkannt wurden (z.B. ein Stau oder vereiste Fahrbahn). Um diese Daten effizient zu nutzen und Ereignisse sinnvoll erkennen zu können, sollte es ein Welt-Modell geben, in dem alle empfangenen Informationen gesammelt werden. Außer der direkten Nutzung als Informationsquelle kann das Weltbild dazu genutzt werden, festzustellen wenn Daten miteinander in Konflikt stehen. Solche Konflikte können auf Angreifer hindeuten, die gefälschte Daten verschickt haben. Das Welt-Modell sollte daher möglichst flexibel sein und eine Vielzahl von unterschiedlichen Daten abbilden können. Ziel der Arbeit ist, ein Konzept für ein solches Weltmodell zu entwickeln und es erweiterbar und flexibel zu implementieren. Es existieren Vorarbeiten, auf denen gerade bei der Konzept-Erstellung aufgebaut werden kann. Neben konzeptuellen Aspekten und möglichst generischer Repräsentation soll die Arbeit auch effiziente Skalierbarkeit und Performanz betrachten.

Master-Arbeiten

„Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
„Latenzmessungen und Evaluation in alternativen Blockchain Systemen,“ Bachelorarbeit, Masterarbeit, Projektarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Die Transaktionsverbreitung in Blockchain Netzwerken findet üblicherweise über einen Broadcastmechanismus statt. In einer ersten Forschungsarbeit am Institut haben wir das Verhalten dieses Broadcasts im Bitcoin Netzwerk untersucht. Ziel dieser Arbeit ist es, für alternative Blockchain Netzwerke, wie Beispielsweise das Ethereum oder Monero Netzwerk, die Untersuchung zu replizieren. Hierfür gilt es einen geeigneten Crawler zu erstellen, Datensets zusammen zu stellen und geeignete stochastische Methoden anzuwenden. Das Ausmaß dieser Untersuchung richtet sich nach der gewählten Art der Arbeit.
„Machine Learning with TensorFlow Federated,“ Masterarbeit, Bachelorarbeit, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
To build powerful machine learning models, lots of data is required. However, obtaining the data comes with privacy risks for the people or entities that provide their data. Recently, Google published TensorFlow Federated - an open source framework to allow machine learning on decentralized data. The approach of federated learning makes machine learning in the age of mobile devices and wearables both more efficient, as well as more privacy-friendly. The goal of this thesis or project is to become familiar with the TensorFlow Federated framework, to understand and be able to explain the techniques which are implemented in it, to be able to build machine learning models in a federated way, and possibly to implement own enhancements of the framework.
„Machine Learning with TensorFlow Privacy,“ Masterarbeit, Bachelorarbeit, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Machine learning offers great opportunities, but also comes with risks. Especially the privacy risks are becoming more prevalent in the discussions about machine learning. Recently, Google published a machine learning library called TensorFlow Privacy. Its goal is to make it easier for developers and researchers to build privacy-preserving machine learning models. Specifically, it utilizes Differential Privacy, which mathematically guarantees that the training data to create the models is protected from being extracted. The goal of this thesis or project is to become familiar with the TensorFlow Privacy library, to understand and be able to explain the techniques which are implemented in it, to be able to build privacy-preserved machine learning models, and possibly to implement own protection techniques that could enhance the TensorFlow Privacy library.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
„Verwirklichung eines Privatsphäre garantierenden Broadcast Protokolls,“ Masterarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. f. Vert. Sys., Univ. Ulm, 2019 – Verfügbar.
Die Verbreitung von Transaktionen in Blockchain-Netzwerken kann viele Informationen über deren Nutzer preisgeben. Ins- besonder muss die Vertraulichkeit von Zahlungsinformationen geschützt werden. Um diesen Schutz zu erreichen, haben wir ein Protokoll entworfen, welches die Privatsphäre dieser Trans-aktionen gewährleistet und Entwicklern die nötige Flexibilität für verschiedenste Anwendungsszenarien bereitstellt. Doch es bleiben viele offene Fragen für die Umsetzung in der Praxis, beispielsweise die Anpassung an praktische Begebenheiten und die Erstellung der nötigen Gruppen. Ziel dieser Arbeit ist es, einige der offenen Fragen zu klären und das Protokoll im Rahmen einer Proof-of-Concept-Implementierung zu evaluieren. Geeignet für Studierende mit Erfahrung Netzwerkprogrammierung. This project can also be completed in English. Please contact me for further details.
„Controlled Neurofeedback using Mobile EEG and Smartphone,“ Masterarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Neurofeedback provides the necessary means to visualize selected and controlled parameters of the brain activity. In healthcare domain, neurofeedback studies enable mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus providing the necessary feedback. In this thesis work, the student is required to survey the current state of frameworks, techniques, or methods that enable coupling of Mobile EEGs with Smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with Smartphones. The student would therefore be required to work on the Bluetooth stack to acquire real-time data generated from the Mobile EEGs, parse the electrical signal, and visualize the signal semantically. For successful completion of the thesis, the student would be required to identify and address any one of the open challenges faced by the proposed topic. An example of this can be addressing the bandwidth challenges, battery consumption, or signal accuracy
„Machine Learning on Encrypted Data,“ Bachelor Thesis, Master Thesis, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Encryption is one of the most reliable techniques for protecting information. However, once data is encrypted, using it becomes very difficult. Goal of this thesis or project, is to explore how Machine Learning algorithms can be designed to be able to deal with encrypted data. Firstly, a survey of existing mechanisms should be conducted. In a second part, algorithms will be comparatively implemented, or own encryption mechanisms introduced.
„Node-centric detection and eviction of malicious nodes in VANETs,“ Master Thesis, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Vehicular ad-hoc networks (VANETs) are designed to provide various services to drivers and passengers by exchanging information between vehicles. Services include improved safety, better navigation recommendations, road condition warnings and features to support self-driving vehicles. For these services to work correctly, data correctness is extremely important. Literature suggests that node-centric detection mechanisms are a potential solution: by monitoring the behavior of other vehicles over time, vehicles can determine who is most reliable. It is also possible to exchange this information between vehicles using trust mechanisms. In this thesis, the goal is to improve existing trust mechanisms and implement the resulting mechanisms in the Maat framework, a Java-based prototype detection framework under development at the institute of distributed systems.
„Weltbild-Modellierung in kooperativen intelligenten Transport-Systemen,“ Bachelor, Master- oder Diplomarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2014 – Verfügbar.
In den letzten 10 Jahren entstand eine neue Art von Netzwerken, die dafür entwickelt wurde Fahrzeuge ad-hoc kommunizieren zu lassen. Diese Netzwerke, so genannte Fahrzeug-Fahrzeug-Kommunikationssysteme, können erweitert werden durch zentrale Backend Systeme und so genannte Road-Side-Units (RSUs), die am Straßenrand aufgestellt werden. Das gesamte System, inklusive Infrastruktur, bezeichnet man auch als kooperatives intelligentes Transport-Systemen (cITS). In diesen Netzwerken sollen Fahrzeuge regelmäßig Nachrichten austauschen, um festzustellen wo sich einzelne Fahrzeuge befinden und wie schnell sie fahren. Darüber hinaus schicken sie auch Warnungen wenn bestimmte Ereignisse erkannt wurden (z.B. ein Stau oder vereiste Fahrbahn). Um diese Daten effizient zu nutzen und Ereignisse sinnvoll erkennen zu können, sollte es ein Welt-Modell geben, in dem alle empfangenen Informationen gesammelt werden. Außer der direkten Nutzung als Informationsquelle kann das Weltbild dazu genutzt werden, festzustellen wenn Daten miteinander in Konflikt stehen. Solche Konflikte können auf Angreifer hindeuten, die gefälschte Daten verschickt haben. Das Welt-Modell sollte daher möglichst flexibel sein und eine Vielzahl von unterschiedlichen Daten abbilden können. Ziel der Arbeit ist, ein Konzept für ein solches Weltmodell zu entwickeln und es erweiterbar und flexibel zu implementieren. Es existieren Vorarbeiten, auf denen gerade bei der Konzept-Erstellung aufgebaut werden kann. Neben konzeptuellen Aspekten und möglichst generischer Repräsentation soll die Arbeit auch effiziente Skalierbarkeit und Performanz betrachten.
„Verification of data consistency mechanisms,“ Master- oder Diplomarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2012 – Verfügbar.
In recent literature on Vehicular Networks, many works assume the existence of data consistency mechanisms, physical model checks and other data-centric verification. However, little is known about how well these mechanisms can work, what type of guarantees they can give, what to do with errors and whether they can be used for attacker detection. Many of these unanswered questions relate to the fact that data consistency mechanisms are still a relatively new concept, and they are not exclusively used for security purposes. The goal of this thesis is to provide a brief summary of existing mechanisms and to provide a good method for evaluating data consistency mechanisms, either with formal verification or with simulation. Initial Literature: Dietzel, S.; Schoch, E.; Konings, B.; Weber, M.; Kargl, F.: Resilient secure aggregation for vehicular networks; IEEE Network; Vol. 24(1); January 2010. Raya, M.; Hubaux, J-P.: The security of vehicular ad hoc networks; ACM SASN 2005.

Themen nach Schwerpunkt

Netzwerke

„Efficient Updating of a Network-Protocol-Model with Message-Format Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Additional information gained by recorded network traffic needs to be incorporated by recognizing the appropriate parts of the model. The modeled knowledge is to be extended depending on the applicable information inferable from the new trace.
„Erweiterung von C++ Netzwerksimulator,“ Projektarbeitarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Am Institut für verteilte Systeme wurde in früheren Arbeiten ein Simulator für Peer-to-Peer Netzwerke erstellt und mit ver-schiedenen Protokollen ausgestattet. Zunächst wurde dieser zielgerichtet auf einzelne Anwendungszwecke weiterentwickelt. In dieser Arbeit sollen nun die verschiedenen Entwicklungen vereinheitlicht und zu einer einfach erweiterbaren Simulations-software zusammengefasst werden. Hierfür gilt es zunächst die bestehende Codebasis zu verstehen und zu vereinheitlichen, sowie geeignete Schnittstellen für verschiedene Verhaltensweisen, Modelle und Strategien des Simulators zu erstellen.
„Latenzmessungen und Evaluation in alternativen Blockchain Systemen,“ Bachelorarbeit, Masterarbeit, Projektarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Die Transaktionsverbreitung in Blockchain Netzwerken findet üblicherweise über einen Broadcastmechanismus statt. In einer ersten Forschungsarbeit am Institut haben wir das Verhalten dieses Broadcasts im Bitcoin Netzwerk untersucht. Ziel dieser Arbeit ist es, für alternative Blockchain Netzwerke, wie Beispielsweise das Ethereum oder Monero Netzwerk, die Untersuchung zu replizieren. Hierfür gilt es einen geeigneten Crawler zu erstellen, Datensets zusammen zu stellen und geeignete stochastische Methoden anzuwenden. Das Ausmaß dieser Untersuchung richtet sich nach der gewählten Art der Arbeit.
„Realisierung von spieltheoretischer Peer-to-Peer Netzwerkerzeugung II,“ D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Die Topologie von Peer-to-Peer-Netzen spielt für viele darauf aufbauende Protokolle eine zentrale Bedeutung. So bestimmt der Netzwerkdurchmesser beispielsweise, wie schnell alle Teilnehmer Broadcastnachrichten erhalten können. Zudem agieren Teilnehmer in einem Peer-to-Peer-Netzwerk üblicherweise so, dass sie ihre ei-gene Situation verbessern. Basierend darauf lassen sich die Hand-lungen der Teilnehmer spieltheoretisch modellieren. Ziel dieser Arbeit ist es, aufbauend auf Ergebnisse einers vorherigen Projekts, ein gegebenes spieltheoretisches Modell in ein Protokoll umzusetzen, das jeder Spieler bzw. Teilnehmer befolgt. Hierfür soll die gegebene Simulation erweitert werden. Dieses Projekt wird in Kooperation zwischen den Instituten für Theoretische Informatik und Verteilte Systeme durchgeführt und gemeinsam betreut.
„Test-Case-Generation Strategies for Network-Protocol-Model Refinements,“ Bachelor's oder Masterarbeit, S. Kleber (Betreuung), F. Kargl (Prüfer), Institut of Distributed Systems, Ulm University, 2019 – Verfügbar.
Security assessments of networked systems require knowledge about the utilized communication protocol. For proprietary protocols without known specification and with only limited access to the end-points, the only source of information is the communication itself. To correctly conclude from the captured byte stream to message-formats, -types, and finally a protocol model, structure, message- and field-boundaries, data-type, and semantics need to be inferred.After an initial inference procedure, it is desirable to refine the existing protocol model. Actively probing an entity for the validity of message syntaxes allows to targetedly enhance the knowledge about the protocol. To do this efficiently a smart method of automatically generating test-cases depending on the current protocol model needs to be developed.
„Verwirklichung eines Privatsphäre garantierenden Broadcast Protokolls,“ Masterarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. f. Vert. Sys., Univ. Ulm, 2019 – Verfügbar.
Die Verbreitung von Transaktionen in Blockchain-Netzwerken kann viele Informationen über deren Nutzer preisgeben. Ins- besonder muss die Vertraulichkeit von Zahlungsinformationen geschützt werden. Um diesen Schutz zu erreichen, haben wir ein Protokoll entworfen, welches die Privatsphäre dieser Trans-aktionen gewährleistet und Entwicklern die nötige Flexibilität für verschiedenste Anwendungsszenarien bereitstellt. Doch es bleiben viele offene Fragen für die Umsetzung in der Praxis, beispielsweise die Anpassung an praktische Begebenheiten und die Erstellung der nötigen Gruppen. Ziel dieser Arbeit ist es, einige der offenen Fragen zu klären und das Protokoll im Rahmen einer Proof-of-Concept-Implementierung zu evaluieren. Geeignet für Studierende mit Erfahrung Netzwerkprogrammierung. This project can also be completed in English. Please contact me for further details.
„Node-centric detection and eviction of malicious nodes in VANETs,“ Master Thesis, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Vehicular ad-hoc networks (VANETs) are designed to provide various services to drivers and passengers by exchanging information between vehicles. Services include improved safety, better navigation recommendations, road condition warnings and features to support self-driving vehicles. For these services to work correctly, data correctness is extremely important. Literature suggests that node-centric detection mechanisms are a potential solution: by monitoring the behavior of other vehicles over time, vehicles can determine who is most reliable. It is also possible to exchange this information between vehicles using trust mechanisms. In this thesis, the goal is to improve existing trust mechanisms and implement the resulting mechanisms in the Maat framework, a Java-based prototype detection framework under development at the institute of distributed systems.
„Replicating data-centric detection results in VANETs,“ (Individual) Projektarbeitarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Vehicular ad-hoc networks (VANETs) have many applications that rely on the same type of data that is directly related to traffic and sensor data available to a vehicle. These applications include traffic jam warnings, efficient navigation for drivers, and improved safety; all of them rely on the accuracy of the data stored in the vehicle. In the scientific literature, there is a multitude of mechanisms to determine this accuracy; however, existing work is often not comparable. In this project, the goal is to implement several such mechanisms in the Java-based Maat framework, which is a prototype detection framework designed to combine detection results. The purpose is twofold; verifying that existing work behaves as expected (i.e., reproducing results) and enabling the use of these mechanisms in future studies.

Mobile Systeme

„Optimizing Smart Mobile Crowdsensing Apps,“ Projektarbeitarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Mobile crowdsensing is the method of acquiring user experience data from users. Either in an automated fashion without limited user engagement, for instance using embedded sensors of the smartphone. Or in a participatory fashion, where the user is the main responsible for the provision of data, for instance filling out surveys. With regard to this, we have developed an app that acquires user experience data related to weather in both - automated as well as participatory fashion. However, using multiple embedded sensors of the smartphone consumes resources, battery, as well as storage. For successful completion of the project, the student is required to work on the existing mobile crowdsensing app. More specifically, in the project, the student will have the options to work on optimizing battery consumption, limiting resource usage, optimize sensor data storage, or improve the sensor data accuracy. Or the student has the freedom to suggest his own vision about extending the current app. The successful completion of the project requires the student to actively participate in the project meetings, deliver the tasks on time, write a project report and present their work at the end.
„Controlled Neurofeedback using Mobile EEG and Smartphone,“ Masterarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Neurofeedback provides the necessary means to visualize selected and controlled parameters of the brain activity. In healthcare domain, neurofeedback studies enable mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus providing the necessary feedback. In this thesis work, the student is required to survey the current state of frameworks, techniques, or methods that enable coupling of Mobile EEGs with Smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with Smartphones. The student would therefore be required to work on the Bluetooth stack to acquire real-time data generated from the Mobile EEGs, parse the electrical signal, and visualize the signal semantically. For successful completion of the thesis, the student would be required to identify and address any one of the open challenges faced by the proposed topic. An example of this can be addressing the bandwidth challenges, battery consumption, or signal accuracy
„Electroencephalography (EEG) using Smartphones,“ Projektarbeitarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus enabling mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Mobile EEGs are dedicated hardware equipment capable of coupling with many state-of-the-art smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with smartphones. For successful completion of the project, the student is required to work on Bluetooth 2.1 stack to couple electrical signal simulator with Smartphones. More specifically, in the project, the student will have the options to work on acquiring and collecting data from the simulator, managing the bandwidth of incoming data, real-time data compression, visualizing data on smartphone, or optimally storing data in a database.
„Node-centric detection and eviction of malicious nodes in VANETs,“ Master Thesis, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Vehicular ad-hoc networks (VANETs) are designed to provide various services to drivers and passengers by exchanging information between vehicles. Services include improved safety, better navigation recommendations, road condition warnings and features to support self-driving vehicles. For these services to work correctly, data correctness is extremely important. Literature suggests that node-centric detection mechanisms are a potential solution: by monitoring the behavior of other vehicles over time, vehicles can determine who is most reliable. It is also possible to exchange this information between vehicles using trust mechanisms. In this thesis, the goal is to improve existing trust mechanisms and implement the resulting mechanisms in the Maat framework, a Java-based prototype detection framework under development at the institute of distributed systems.
„Replicating data-centric detection results in VANETs,“ (Individual) Projektarbeitarbeit, R. van der Heijden (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Vehicular ad-hoc networks (VANETs) have many applications that rely on the same type of data that is directly related to traffic and sensor data available to a vehicle. These applications include traffic jam warnings, efficient navigation for drivers, and improved safety; all of them rely on the accuracy of the data stored in the vehicle. In the scientific literature, there is a multitude of mechanisms to determine this accuracy; however, existing work is often not comparable. In this project, the goal is to implement several such mechanisms in the Java-based Maat framework, which is a prototype detection framework designed to combine detection results. The purpose is twofold; verifying that existing work behaves as expected (i.e., reproducing results) and enabling the use of these mechanisms in future studies.

Distributed Computing

„Pause/Shift/Resume in Chronograph,“ Bachelorarbeit oder individual lab Projektarbeitarbeit, D. Meißner und B. Erb (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2017 – Verfügbar.
Pause/Shift/Resume is a mechanism for doing iterative graph processing on an evolving graph using snapshots. Our Chronograph graph processing platform provides very similar functionalities based on an event-sourced graph model. In this work, the student is asked to incorporate the Pause/Shift/Resume mechanism into our platform. Therefore, the mechanism has to be adapted and adjusted to event-sourced graphs. Furthermore, an evaluation should highlight the runtime behavior of the approach in different workloads.
„Analyse, Kategorisierung und Bewertung von Ansätzen für verteilte und nebenläufige Versionshistorien von Graphen,“ Masterarbeit oder Diplomarbeit, B. Erb (Betreuung), F. Kargl (Prüfer), Inst. f. Vert. Sys., Univ. Ulm, 2015 – Verfügbar.
Ob git als Versionskontrollsystem, MVCC als Nebenläufigkeitskontrolle in Datenbanken, Vector-Clocks als Zeitstempel in verteilten Anwendungen oder CRDTs als dedizierte Datenstrukturen – wenn auf Daten nebenläufig und verteilt zugegriffen wird, sind Mechanismen zur Einhaltung von Konsistenz, zeitlicher Kausalität und Ordnung essenziell. Ebenso erlauben viele Ansätze die Untersuchung der änderungshistorie. In dieser Literaturarbeit sollen verschiedene Ansätze aus verschiedenen Anwendungsbereichen vorgestellt und miteinander verglichen werden. Hierfür sollen zunächst geeignete Kriterien aufgestellt und sinnvolle Ansätze gewählt werden. In einem systematischen Vergleich sollen dann Gemeinsamkeiten und Unterschiede herausgearbeitet werden. Als Ergebnis sollen Ansätze kategorisiert werden und anhand der Bewertung ihrer Merkmale sinnvolle Anwendungszwecke aufgezeigt werden.

Privacy

„Latenzmessungen und Evaluation in alternativen Blockchain Systemen,“ Bachelorarbeit, Masterarbeit, Projektarbeit, D. Mödinger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Die Transaktionsverbreitung in Blockchain Netzwerken findet üblicherweise über einen Broadcastmechanismus statt. In einer ersten Forschungsarbeit am Institut haben wir das Verhalten dieses Broadcasts im Bitcoin Netzwerk untersucht. Ziel dieser Arbeit ist es, für alternative Blockchain Netzwerke, wie Beispielsweise das Ethereum oder Monero Netzwerk, die Untersuchung zu replizieren. Hierfür gilt es einen geeigneten Crawler zu erstellen, Datensets zusammen zu stellen und geeignete stochastische Methoden anzuwenden. Das Ausmaß dieser Untersuchung richtet sich nach der gewählten Art der Arbeit.

IT-Sicherheit

Fehlertoleranz

„Integration of etcd4j and BFT-SMaRt Parallel,“ Projektarbeitarbeit, G. Habiger (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
In our recent research, teaching, and project work, we re-implemented etcd – a popular and well-known fault-tolerant key-value store – in Java, resulting in a multithreaded version that is easier to integrate into our research prototypes. Additionally, recent projects have looked at the State Machine Replication framework BFT-SMaRt, especially our own parallelized version of it, and worked on a way to enable snapshotting functionality. This project aims at integrating these two prototypes – etcd4J and BFT-SMaRt Parallel – into one working project, to yield a fully working, state machine replicated and fault-tolerant version of etcd4J. Further work includes testing and benchmarking this solution. The project can be modified to fit 8 or 16 ECTS.

Cloud Computing

„Practical Overview of Serverless Computing,“ Projektarbeitarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Serverless is a current trend in cloud computing. In contrast to what the name indicates it does not describe an architecture without servers. Instead, it really means that developers do not have to worry about servers and infrastructure, but can completely focus on their code. Unlike previous cloud computing models, a cloud vendor does not offer full platforms or virtual machines, but an execution environment for functions. These often feature a pay-per-use billing model and automatic scalability of resources based on current utilization. Thus, developers are completely relieved of the operational concerns of their applications. All major cloud computing providers offer their own flavor of serverless computing or Function as a Service (FaaS). The goal of this project is to provide a comparison of the similarities and differences of these platforms. Another goal of this project is the implementation of a reference application that can be used to compare different platforms and their programming model. As the practical part of this project a multi node Apache OpenWhisk (an open source serverless platform) cluster should be set up and tested.
„Machine Learning on Encrypted Data,“ Bachelor Thesis, Master Thesis, Projektarbeitarbeit, M. Matousek (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Encryption is one of the most reliable techniques for protecting information. However, once data is encrypted, using it becomes very difficult. Goal of this thesis or project, is to explore how Machine Learning algorithms can be designed to be able to deal with encrypted data. Firstly, a survey of existing mechanisms should be conducted. In a second part, algorithms will be comparatively implemented, or own encryption mechanisms introduced.

Multimediakommunikation

„Android app for mobile electroencephalography (EEG),“ Projektarbeitarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus enabling mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Mobile EEGs are dedicated hardware equipment capable of coupling with many state-of-the-art smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with smartphones. For successful completion of the project, the student is required to work on development of an app. More specifically, in the project, the student will have the options to work on acquiring and collecting data, transformation and parsing of data, visualizing data on smartphone, or optimally storing data in a database.

Weitere Themen

„Android app for mobile electroencephalography (EEG),“ Projektarbeitarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus enabling mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Mobile EEGs are dedicated hardware equipment capable of coupling with many state-of-the-art smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with smartphones. For successful completion of the project, the student is required to work on development of an app. More specifically, in the project, the student will have the options to work on acquiring and collecting data, transformation and parsing of data, visualizing data on smartphone, or optimally storing data in a database.
„Optimizing Smart Mobile Crowdsensing Apps,“ Projektarbeitarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2019 – Verfügbar.
Mobile crowdsensing is the method of acquiring user experience data from users. Either in an automated fashion without limited user engagement, for instance using embedded sensors of the smartphone. Or in a participatory fashion, where the user is the main responsible for the provision of data, for instance filling out surveys. With regard to this, we have developed an app that acquires user experience data related to weather in both - automated as well as participatory fashion. However, using multiple embedded sensors of the smartphone consumes resources, battery, as well as storage. For successful completion of the project, the student is required to work on the existing mobile crowdsensing app. More specifically, in the project, the student will have the options to work on optimizing battery consumption, limiting resource usage, optimize sensor data storage, or improve the sensor data accuracy. Or the student has the freedom to suggest his own vision about extending the current app. The successful completion of the project requires the student to actively participate in the project meetings, deliver the tasks on time, write a project report and present their work at the end.
„Controlled Neurofeedback using Mobile EEG and Smartphone,“ Masterarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Neurofeedback provides the necessary means to visualize selected and controlled parameters of the brain activity. In healthcare domain, neurofeedback studies enable mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus providing the necessary feedback. In this thesis work, the student is required to survey the current state of frameworks, techniques, or methods that enable coupling of Mobile EEGs with Smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with Smartphones. The student would therefore be required to work on the Bluetooth stack to acquire real-time data generated from the Mobile EEGs, parse the electrical signal, and visualize the signal semantically. For successful completion of the thesis, the student would be required to identify and address any one of the open challenges faced by the proposed topic. An example of this can be addressing the bandwidth challenges, battery consumption, or signal accuracy
„Electroencephalography (EEG) using Smartphones,“ Projektarbeitarbeit, M. Mehdi (Betreuung), F. J. Hauck (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2018 – Verfügbar.
Electroencephalography (EEG) is the method of monitoring the electrical activity of the brain, thus enabling mitigation of many psychological disorders and illnesses, mainly by therapies that help patients to better self-regulate their brain activity. Mobile EEGs are dedicated hardware equipment capable of coupling with many state-of-the-art smartphones. Bluetooth 2.1 with Enhanced Data Rate (EDR) capability is one of the most effective mean of coupling EEGs with smartphones. For successful completion of the project, the student is required to work on Bluetooth 2.1 stack to couple electrical signal simulator with Smartphones. More specifically, in the project, the student will have the options to work on acquiring and collecting data from the simulator, managing the bandwidth of incoming data, real-time data compression, visualizing data on smartphone, or optimally storing data in a database.