@inproceedings{KirschMatareFerreinetal.2020, author = {Kirsch, Maximilian and Matar{\´e}, Victor and Ferrein, Alexander and Schiffer, Stefan}, title = {Integrating golog++ and ROS for Practical and Portable High-level Control}, series = {12th International Conference on Agents and Artificial Intelligence}, booktitle = {12th International Conference on Agents and Artificial Intelligence}, doi = {10.5220/0008984406920699}, year = {2020}, language = {en} } @inproceedings{DinghoferHartung2020, author = {Dinghofer, Kai and Hartung, Frank}, title = {Analysis of Criteria for the Selection of Machine Learning Frameworks}, series = {2020 International Conference on Computing, Networking and Communications (ICNC)}, booktitle = {2020 International Conference on Computing, Networking and Communications (ICNC)}, doi = {10.1109/ICNC47757.2020.9049650}, pages = {373 -- 377}, year = {2020}, language = {en} } @inproceedings{RekePeterSchulteTiggesetal.2020, author = {Reke, Michael and Peter, Daniel and Schulte-Tigges, Joschua and Schiffer, Stefan and Ferrein, Alexander and Walter, Thomas and Matheis, Dominik}, title = {A Self-Driving Car Architecture in ROS2}, series = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, booktitle = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, isbn = {978-1-7281-4162-6}, doi = {10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020}, pages = {1 -- 6}, year = {2020}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @inproceedings{ElgamalHeuermann2020, author = {Elgamal, Abdelrahman and Heuermann, Holger}, title = {Design and Development of a Hot S-Parameter Measurement System for Plasma and Magnetron Applications}, series = {2020 German Microwave Conference (GeMiC), Cottbus, Germany, 2020}, booktitle = {2020 German Microwave Conference (GeMiC), Cottbus, Germany, 2020}, isbn = {978-3-9820397-1-8}, pages = {124 -- 127}, year = {2020}, language = {en} } @article{RoepkeKoehlerDruryetal.2020, author = {Roepke, Rene and K{\"o}hler, Klemens and Drury, Vincent and Schroeder, Ulrik and Wolf, Martin and Meyer, Ulrike}, title = {A pond full of phishing games - analysis of learning games for anti-phishing education}, series = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, journal = {Model-driven Simulation and Training Environments for Cybersecurity. MSTEC 2020}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-62433-0}, doi = {10.1007/978-3-030-62433-0_32020}, pages = {41 -- 60}, year = {2020}, abstract = {Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom's Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.}, language = {en} } @article{SerrorHackHenzeetal.2021, author = {Serror, Martin and Hack, Sacha and Henze, Martin and Schuba, Marko and Wehrle, Klaus}, title = {Challenges and Opportunities in Securing the Industrial Internet of Things}, series = {IEEE Transactions on Industrial Informatics}, volume = {17}, journal = {IEEE Transactions on Industrial Informatics}, number = {5}, publisher = {IEEE}, address = {New York}, issn = {1941-0050}, doi = {10.1109/TII.2020.3023507}, pages = {2985 -- 2996}, year = {2021}, language = {en} } @inproceedings{ChajanSchulteTiggesRekeetal.2021, author = {Chajan, Eduard and Schulte-Tigges, Joschua and Reke, Michael and Ferrein, Alexander and Matheis, Dominik and Walter, Thomas}, title = {GPU based model-predictive path control for self-driving vehicles}, series = {IEEE Intelligent Vehicles Symposium (IV)}, booktitle = {IEEE Intelligent Vehicles Symposium (IV)}, publisher = {IEEE}, isbn = {978-1-7281-5394-0}, doi = {10.1109/IV48863.2021.9575619}, pages = {1243 -- 1248}, year = {2021}, abstract = {One central challenge for self-driving cars is a proper path-planning. Once a trajectory has been found, the next challenge is to accurately and safely follow the precalculated path. The model-predictive controller (MPC) is a common approach for the lateral control of autonomous vehicles. The MPC uses a vehicle dynamics model to predict the future states of the vehicle for a given prediction horizon. However, in order to achieve real-time path control, the computational load is usually large, which leads to short prediction horizons. To deal with the computational load, the control algorithm can be parallelized on the graphics processing unit (GPU). In contrast to the widely used stochastic methods, in this paper we propose a deterministic approach based on grid search. Our approach focuses on systematically discovering the search area with different levels of granularity. To achieve this, we split the optimization algorithm into multiple iterations. The best sequence of each iteration is then used as an initial solution to the next iteration. The granularity increases, resulting in smooth and predictable steering angle sequences. We present a novel GPU-based algorithm and show its accuracy and realtime abilities with a number of real-world experiments.}, language = {en} } @incollection{PfetschAbeleAltherretal.2021, author = {Pfetsch, Marc E. and Abele, Eberhard and Altherr, Lena and B{\"o}lling, Christian and Br{\"o}tz, Nicolas and Dietrich, Ingo and Gally, Tristan and Geßner, Felix and Groche, Peter and Hoppe, Florian and Kirchner, Eckhard and Kloberdanz, Hermann and Knoll, Maximilian and Kolvenbach, Philip and Kuttich-Meinlschmidt, Anja and Leise, Philipp and Lorenz, Ulf and Matei, Alexander and Molitor, Dirk A. and Niessen, Pia and Pelz, Peter F. and Rexer, Manuel and Schmitt, Andreas and Schmitt, Johann M. and Schulte, Fiona and Ulbrich, Stefan and Weigold, Matthias}, title = {Strategies for mastering uncertainty}, series = {Mastering uncertainty in mechanical engineering}, booktitle = {Mastering uncertainty in mechanical engineering}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-78353-2}, doi = {10.1007/978-3-030-78354-9_6}, pages = {365 -- 456}, year = {2021}, abstract = {This chapter describes three general strategies to master uncertainty in technical systems: robustness, flexibility and resilience. It builds on the previous chapters about methods to analyse and identify uncertainty and may rely on the availability of technologies for particular systems, such as active components. Robustness aims for the design of technical systems that are insensitive to anticipated uncertainties. Flexibility increases the ability of a system to work under different situations. Resilience extends this characteristic by requiring a given minimal functional performance, even after disturbances or failure of system components, and it may incorporate recovery. The three strategies are described and discussed in turn. Moreover, they are demonstrated on specific technical systems.}, language = {en} } @inproceedings{MuellerSchmittLeiseetal.2021, author = {M{\"u}ller, Tim M. and Schmitt, Andreas and Leise, Philipp and Meck, Tobias and Altherr, Lena and Pelz, Peter F. and Pfetsch, Marc E.}, title = {Validation of an optimized resilient water supply system}, series = {Uncertainty in Mechanical Engineering}, booktitle = {Uncertainty in Mechanical Engineering}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-77255-0}, doi = {10.1007/978-3-030-77256-7_7}, pages = {70 -- 80}, year = {2021}, abstract = {Component failures within water supply systems can lead to significant performance losses. One way to address these losses is the explicit anticipation of failures within the design process. We consider a water supply system for high-rise buildings, where pump failures are the most likely failure scenarios. We explicitly consider these failures within an early design stage which leads to a more resilient system, i.e., a system which is able to operate under a predefined number of arbitrary pump failures. We use a mathematical optimization approach to compute such a resilient design. This is based on a multi-stage model for topology optimization, which can be described by a system of nonlinear inequalities and integrality constraints. Such a model has to be both computationally tractable and to represent the real-world system accurately. We therefore validate the algorithmic solutions using experiments on a scaled test rig for high-rise buildings. The test rig allows for an arbitrary connection of pumps to reproduce scaled versions of booster station designs for high-rise buildings. We experimentally verify the applicability of the presented optimization model and that the proposed resilience properties are also fulfilled in real systems.}, language = {en} }