@inproceedings{BeckerWolf2019, author = {Becker, Willi and Wolf, Martin R.}, title = {Entwicklung eines Einf{\"u}hrungskonzepts f{\"u}r IT-Service-Management in KMU}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {129 -- 137}, year = {2019}, abstract = {Obwohl es eine Vielzahl von Einf{\"u}hrungskonzepten f{\"u}r ITSM gibt, hat sich bisher keines dieser Konzepte auf breiter Linie durchgesetzt. Das gilt in erh{\"o}htem Maße f{\"u}r ITSM-Einf{\"u}hrungskonzepte f{\"u}r KMU, wohl nicht zuletzt aufgrund der Tatsache, dass der Mehrwert von ITSM f{\"u}r KMU aufgrund der geringeren Gr{\"o}ße der IT-Organisationen nur entsprechend schwieriger generiert werden kann. Mit diesem Beitrag wird ein Einf{\"u}hrungskonzept f{\"u}r ITSM in KMU systematisch hergeleitet. Daf{\"u}r wurden zun{\"a}chst die Treiber und Barrieren von ITSM untersucht, um daraus ein umfassendes Wirkmodell zu entwickeln. Da mit diesem Wirkungsmodell die Einflussfaktoren auf den Erfolg von ITSM in KMU deutlich werden, konnte auf dieser Basis ein Einf{\"u}hrungskonzept abgeleitet werden, welches insbesondere die positiven Effekte unterst{\"u}tzt bzw. verst{\"a}rkt.}, language = {de} } @inproceedings{MollKoehlerWolf2019, author = {Moll, Florian and K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Konzeption von IT-Sicherheitsl{\"o}sungen unter ethischen Gesichtspunkten am Beispiel einer Monitoring-App f{\"u}r mobile Endger{\"a}te}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {61 -- 72}, year = {2019}, abstract = {Die steigende Popularit{\"a}t von mobilen Endger{\"a}ten im privaten und gesch{\"a}ftlichen Umfeld geht mit einem Anstieg an Sicherheitsl{\"u}cken und somit potentiellen Angriffsfl{\"a}chen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes k{\"o}nnen Monitoring-Apps dienen, die unerw{\"u}nschtes Verhalten und Angriffe erkennen. Die automatisierte {\"U}berwachung von Endger{\"a}ten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilit{\"a}t der Nutzer und Nutzerinnen dieser Ger{\"a}te in Bezug auf Privatsph{\"a}re, kann zu einer geringen Akzeptanz und Compliance f{\"u}hren. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess f{\"u}hrt zu h{\"o}herer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt M{\"o}glichkeiten zur Umsetzung.}, language = {de} } @inproceedings{WolfBartonHerrmannetal.2019, author = {Wolf, Martin R. and Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung vom 15.09.2019 bis 18.09.2019 an der Fachhochschule f{\"u}r Angewandte Wissenschaften Aachen / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, doi = {10.15771/978-3-944330-62-4}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13026}, pages = {261 Seiten}, year = {2019}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen Projektmanagement, Didaktik in der Wirtschaftsinformatik, IT-Sicherheit, Anwendungsf{\"a}lle, Reifegradmodelle, Plattformen f{\"u}r Gesch{\"a}ftsprozesse und Prototypen.}, language = {de} } @inproceedings{NeesStengelMeisteretal.2020, author = {Nees, Franz and Stengel, Ingo and Meister, Vera G. and Barton, Thomas and Herrmann, Frank and M{\"u}ller, Christian and Wolf, Martin R.}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik / hrsg. von Franz Nees, Ingo Stengel, Vera G. Meister, Thomas Barton, Frank Herrmann, Christian M{\"u}ller, Martin R. Wolf}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-66-2}, doi = {10.15771/978-3-944330-66-2}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13840}, pages = {147 Seiten}, year = {2020}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen KI, Prozessorganisation und Plattformen f{\"u}r Gesch{\"a}ftsprozesse, Sicherheit und Datenschutz sowie Prototypen und Modelle.}, language = {de} } @inproceedings{WiegnerVolkerMainzetal.2022, author = {Wiegner, Jonas and Volker, Hanno and Mainz, Fabian and Backes, Andreas and L{\"o}ken, Michael and H{\"u}ning, Felix}, title = {Wiegand-effect-powered wireless IoT sensor node}, series = {ITG-Fb. 303: Sensoren und Messsysteme}, booktitle = {ITG-Fb. 303: Sensoren und Messsysteme}, publisher = {VDE Verlag GmbH}, address = {Berlin}, isbn = {978-3-8007-5835-7}, pages = {255 -- 260}, year = {2022}, abstract = {In this article we describe an Internet-of-Things sensing device with a wireless interface which is powered by the oftenoverlooked harvesting method of the Wiegand effect. The sensor can determine position, temperature or other resistively measurable quantities and can transmit the data via an ultra-low power ultra-wideband (UWB) data transmitter. With this approach we can energy-self-sufficiently acquire, process, and wirelessly transmit data in a pulsed operation. A proof-of-concept system was built up to prove the feasibility of the approach. The energy consumption of the system is analyzed and traced back in detail to the individual components, compared to the generated energy and processed to identify further optimization options. Based on the proof-of-concept, an application demonstrator was developed. Finally, we point out possible use cases.}, language = {en} } @inproceedings{NikolovskiRekeElsenetal.2021, author = {Nikolovski, Gjorgji and Reke, Michael and Elsen, Ingo and Schiffer, Stefan}, title = {Machine learning based 3D object detection for navigation in unstructured environments}, series = {2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops)}, booktitle = {2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops)}, publisher = {IEEE}, isbn = {978-1-6654-7921-9}, doi = {10.1109/IVWorkshops54471.2021.9669218}, pages = {236 -- 242}, year = {2021}, abstract = {In this paper we investigate the use of deep neural networks for 3D object detection in uncommon, unstructured environments such as in an open-pit mine. While neural nets are frequently used for object detection in regular autonomous driving applications, more unusual driving scenarios aside street traffic pose additional challenges. For one, the collection of appropriate data sets to train the networks is an issue. For another, testing the performance of trained networks often requires tailored integration with the particular domain as well. While there exist different solutions for these problems in regular autonomous driving, there are only very few approaches that work for special domains just as well. We address both the challenges above in this work. First, we discuss two possible ways of acquiring data for training and evaluation. That is, we evaluate a semi-automated annotation of recorded LIDAR data and we examine synthetic data generation. Using these datasets we train and test different deep neural network for the task of object detection. Second, we propose a possible integration of a ROS2 detector module for an autonomous driving platform. Finally, we present the performance of three state-of-the-art deep neural networks in the domain of 3D object detection on a synthetic dataset and a smaller one containing a characteristic object from an open-pit mine.}, language = {en} } @inproceedings{SchaenzleAltherrEdereretal.2015, author = {Sch{\"a}nzle, Christian and Altherr, Lena and Ederer, Thorsten and Pelz, Peter}, title = {TOR - Towards the energetically optimal ventilation system}, pages = {1 Seite}, year = {2015}, language = {en} } @inproceedings{LorenzAltherrPelz2020, author = {Lorenz, Imke-Sophie and Altherr, Lena and Pelz, Peter F.}, title = {Resilience enhancement of critical infrastructure - graph-theoretical resilience analysis of the water distribution system in the German city of Darmstadt}, series = {14th WCEAM Proceedings}, booktitle = {14th WCEAM Proceedings}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-64228-0}, doi = {10.1007/978-3-030-64228-0_13}, pages = {137 -- 149}, year = {2020}, abstract = {Water suppliers are faced with the great challenge of achieving high-quality and, at the same time, low-cost water supply. Since climatic and demographic influences will pose further challenges in the future, the resilience enhancement of water distribution systems (WDS), i.e. the enhancement of their capability to withstand and recover from disturbances, has been in particular focus recently. To assess the resilience of WDS, graph-theoretical metrics have been proposed. In this study, a promising approach is first physically derived analytically and then applied to assess the resilience of the WDS for a district in a major German City. The topology based resilience index computed for every consumer node takes into consideration the resistance of the best supply path as well as alternative supply paths. This resistance of a supply path is derived to be the dimensionless pressure loss in the pipes making up the path. The conducted analysis of a present WDS provides insight into the process of actively influencing the resilience of WDS locally and globally by adding pipes. The study shows that especially pipes added close to the reservoirs and main branching points in the WDS result in a high resilience enhancement of the overall WDS.}, language = {en} } @inproceedings{AltherrEdererFarnetaneetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Farnetane, Lucas S. and P{\"o}ttgen, Philipp and Verg{\´e}, Angela and Pelz, Peter F.}, title = {Multicriterial design of a hydrostatic transmission system via mixed-integer programming}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1_41}, pages = {301 -- 307}, year = {2017}, abstract = {In times of planned obsolescence the demand for sustainability keeps growing. Ideally, a technical system is highly reliable, without failures and down times due to fast wear of single components. At the same time, maintenance should preferably be limited to pre-defined time intervals. Dispersion of load between multiple components can increase a system's reliability and thus its availability inbetween maintenance points. However, this also results in higher investment costs and additional efforts due to higher complexity. Given a specific load profile and resulting wear of components, it is often unclear which system structure is the optimal one. Technical Operations Research (TOR) finds an optimal structure balancing availability and effort. We present our approach by designing a hydrostatic transmission system.}, language = {en} } @inproceedings{SchaenzleAltherrEdereretal.2015, author = {Sch{\"a}nzle, Christian and Altherr, Lena and Ederer, Thorsten and Lorenz, Ulf and Pelz, Peter F.}, title = {As good as it can be: Ventilation system design by a combined scaling and discrete optimization method}, series = {Proceedings of FAN 2015}, booktitle = {Proceedings of FAN 2015}, pages = {1 -- 11}, year = {2015}, abstract = {The understanding that optimized components do not automatically lead to energy-efficient systems sets the attention from the single component on the entire technical system. At TU Darmstadt, a new field of research named Technical Operations Research (TOR) has its origin. It combines mathematical and technical know-how for the optimal design of technical systems. We illustrate our optimization approach in a case study for the design of a ventilation system with the ambition to minimize the energy consumption for a temporal distribution of diverse load demands. By combining scaling laws with our optimization methods we find the optimal combination of fans and show the advantage of the use of multiple fans.}, language = {en} }