Chen, Y. ., Schlipf, D. ., & Cheng, P. W. (2021). Parameterization of wind evolution using lidar. Wind Energy Science, 6, 61–91. http://doi.org/10.5194/wes-6-61-2021 (Original work published 2024)
Schlipf, D. ., Lemmer, F. ., & Thomas, F. . (2021). Realization of wind field reconstruction for real- time monitoring and LIDAR-assisted control. http://doi.org/10.5281/zenodo.5608684 (Original work published 2024)
Lübben, R. ., Gübner, S. ., & Wette, P. . (2021). Fast Reinjection for Intermittent MPTCP Connections. In Proc. IEEE VTC. (Original work published 2024)
Lübben, R. ., Wette, P. ., & Gübner, S. . (2021). RTTPROBS: A RTT Probing Scheme for RTT Aware Multi-path Scheduling. In . (Original work published 2024)
Guo, F. ., & Schlipf, D. . (2021). A Spectral Model of Grid Frequency for Assessing the Impact of Inertia Response on Wind Turbine Dynamics. Energies, 14. http://doi.org/10.3390/en14092492 (Original work published 2024)
Huth, G. ., & Löhlein, B. . (2021). Teilwicklungsanlauf von Käfigläufermotoren mit kombinierter Stern-Dreieck-Wicklung. http://doi.org/10.1007/s00502-021-00900-6
Abstract
Mit Rücksicht auf die Netzverhältnisse müssen Käfigläufermotoren mit einem geeigneten Anlaufverfahren an das Drehstromnetz geschaltet werden. Liegen, wie zum Beispiel bei Kompressoren, schwere Anlaufbedingungen vor, so kommt neben dem verstärkten Stern-Dreieck-Anlauf häufig der Teilwicklungsanlauf zum Einsatz. Wenn zur Steigerung der Energieeffizienz eine kombinierte Stern-Dreieck-Wicklung zum Einsatz kommt, bietet sich die Drehfeldwicklung zusätzlich auch für den Teilwicklungsanlauf an, wenn die kombinierte Wicklung als Parallelschaltung ausgeführt ist. Die Möglichkeiten hierzu werden unter Berücksichtigung des Oberfeldverhaltens analysiert und am Beispiel von zwei Käfigläufermotoren wird das Betriebsverhalten simulativ untersucht.
Neumann, T. . (2021). The impact of entrepreneurship on economic, social and environmental welfare and its determinants: a systematic review, 71(3), 553–584. http://doi.org/10.1007/s11301-020-00193-7
Abstract
This paper presents a systematic review of (a) the impact of entrepreneurship on economic, social and environmental welfare and (b) the factors determining this impact. Research over the past 25 years shows that entrepreneurship is one cause of macroeconomic development, but that the relationship between entrepreneurship and welfare is very complex. The literature emphasizes that the generally positive impact of entrepreneurship depends on a variety of associated determinants which affect the degree of this impact. This paper seeks to contribute to the literature in three ways. First, it updates and extends existing literature reviews with the recently emerged research stream on developing countries, and incorporates studies analysing not only the impact of entrepreneurship on economic growth and welfare but also on social and environmental welfare. Second, it identifies and structures the current knowledge on the determinants of this impact. And third, it provides a roadmap for future research which targets the shortcomings of the existing empirical literature on this topic. The review of 102 publications reveals that the literature generally lacks research which (a) goes beyond the common measures of economic welfare, (b) examines the long-term impact of entrepreneurship and (c) focuses on emerging and developing countries. Regarding the determinants of the impact of entrepreneurship, the results highlight the need for empirical research which addresses both already investigated determinants which require more attention (e.g. survival, internationalisation, qualifications) and those which are currently only suspected of shaping the impact of entrepreneurship (e.g. firm performance, the entrepreneur’s socio-cultural background and motivations).
Gönen, M. E., Tutdere, S. ., & Uzunkol, O. . (2021). A Key Manipulation Attack on Some Recent Isogeny-Based Key Agreement Protocols. Bulletin of the Iranian Mathematical Society . http://doi.org/10.1007/s41980-021-00534-6
Abstract
Recently, Daghigh et al. proposed some isogeny-based key agreement protocols in Bull. Iran. Math. Soc. 43 (2017), no. 4, 77-88. They claimed that their key exchange protocols based on supersingular isogenies provide the same security level as the Jao et al.’s protocol SIDH. This paper addresses first a vulnerability of these protocols to a key manipulation attack. Hence, unlike the security claims of Daghigh et al., these protocols unfortunately do not provide the same security when compared with SIDH. Second, we show in particular that the secret dual isogenies of the protocols can easily be retrieved by applying our key manipulation attack. We also discuss lastly the countermeasures to this attack.
Bartscher, T. ., & Nissen, R. . (2021). Akademische (Weiter-)Bildung im Learning Hub. Deggendorf/Flensburg: i:ad-Studie 2021. (Original work published 2021)
Teistler, M. ., Reinhold, S. ., Süncksen, M. ., & Mayer, L. . (2021). Training Visuospatial And Visuomotor Skills For Ultrasound Imaging With A Game. In 107th Scientific Assembly and Annual Meeting (RSNA 2021). Chicago, IL, USA: Radiological Society of North America. (Original work published Dezember 2021)