@inproceedings{FingerKhalsaKreyeretal.2019, author = {Finger, Felix and Khalsa, R. and Kreyer, J{\"o}rg and Mayntz, Joscha and Braun, Carsten and Dahmann, Peter and Esch, Thomas and Kemper, Hans and Schmitz, O. and Bragard, Michael}, title = {An approach to propulsion system modelling for the conceptual design of hybrid-electric general aviation aircraft}, series = {Deutscher Luft- und Raumfahrtkongress 2019, 30.9.-2.10.2019, Darmstadt}, booktitle = {Deutscher Luft- und Raumfahrtkongress 2019, 30.9.-2.10.2019, Darmstadt}, pages = {15 Seiten}, year = {2019}, abstract = {In this paper, an approach to propulsion system modelling for hybrid-electric general aviation aircraft is presented. Because the focus is on general aviation aircraft, only combinations of electric motors and reciprocating combustion engines are explored. Gas turbine hybrids will not be considered. The level of the component's models is appropriate for the conceptual design stage. They are simple and adaptable, so that a wide range of designs with morphologically different propulsive system architectures can be quickly compared. Modelling strategies for both mass and efficiency of each part of the propulsion system (engine, motor, battery and propeller) will be presented.}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin R.}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @inproceedings{RekePeterSchulteTiggesetal.2020, author = {Reke, Michael and Peter, Daniel and Schulte-Tigges, Joschua and Schiffer, Stefan and Ferrein, Alexander and Walter, Thomas and Matheis, Dominik}, title = {A Self-Driving Car Architecture in ROS2}, series = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, booktitle = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-1-7281-4162-6}, doi = {10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020}, pages = {1 -- 6}, year = {2020}, abstract = {In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions.}, language = {en} } @inproceedings{DinghoferHartung2020, author = {Dinghofer, Kai and Hartung, Frank}, title = {Analysis of Criteria for the Selection of Machine Learning Frameworks}, series = {2020 International Conference on Computing, Networking and Communications (ICNC)}, booktitle = {2020 International Conference on Computing, Networking and Communications (ICNC)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.1109/ICNC47757.2020.9049650}, pages = {373 -- 377}, year = {2020}, abstract = {With the many achievements of Machine Learning in the past years, it is likely that the sub-area of Deep Learning will continue to deliver major technological breakthroughs [1]. In order to achieve best results, it is important to know the various different Deep Learning frameworks and their respective properties. This paper provides a comparative overview of some of the most popular frameworks. First, the comparison methods and criteria are introduced and described with a focus on computer vision applications: Features and Uses are examined by evaluating papers and articles, Adoption and Popularity is determined by analyzing a data science study. Then, the frameworks TensorFlow, Keras, PyTorch and Caffe are compared based on the previously described criteria to highlight properties and differences. Advantages and disadvantages are compared, enabling researchers and developers to choose a framework according to their specific needs.}, language = {en} } @article{KoehlerRoepkeWolf2021, author = {K{\"o}hler, Klemens and R{\"o}pke, Ren{\´e} and Wolf, Martin R.}, title = {Through a mirror darkly - On the obscurity of teaching goals in game-based learning in IT security}, series = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, journal = {ISAGA 2019: Simulation Gaming Through Times and Disciplines}, publisher = {Springer}, address = {Cham}, doi = {10.1007/978-3-030-72132-9_6}, pages = {61 -- 73}, year = {2021}, abstract = {Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom's Taxonomy and the Revised Bloom's Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved.}, language = {en} } @article{LimpertWiesenFerreinetal.2019, author = {Limpert, Nicolas and Wiesen, Patrick and Ferrein, Alexander and Kallweit, Stephan and Schiffer, Stefan}, title = {The ROSIN Project and its Outreach to South Africa}, series = {R\&D Journal}, volume = {35}, journal = {R\&D Journal}, pages = {1 -- 6}, year = {2019}, language = {en} } @inproceedings{AlhwarinSchifferFerreinetal.2019, author = {Alhwarin, Faraj and Schiffer, Stefan and Ferrein, Alexander and Scholl, Ingrid}, title = {An Optimized Method for 3D Body Scanning Applications Based on KinectFusion}, series = {Communications in Computer and Information Science}, volume = {1024}, booktitle = {Communications in Computer and Information Science}, publisher = {Springer}, issn = {1865-0929}, doi = {10.1007/978-3-030-29196-9_6}, pages = {100 -- 113}, year = {2019}, language = {en} } @incollection{RaoPathroseHueningetal.2019, author = {Rao, Deepak and Pathrose, Plato and H{\"u}ning, Felix and Sid, Jithin}, title = {An Approach for Validating Safety of Perception Software in Autonomous Driving Systems}, series = {Model-Based Safety and Assessment: 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16-18, 2019, Proceedings}, booktitle = {Model-Based Safety and Assessment: 6th International Symposium, IMBSA 2019, Thessaloniki, Greece, October 16-18, 2019, Proceedings}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-32872-6}, doi = {10.1007/978-3-030-32872-6_20}, pages = {303 -- 316}, year = {2019}, abstract = {The increasing complexity of Advanced Driver Assistance Systems (ADAS) presents a challenging task to validate safe and reliable performance of these systems under varied conditions. The test and validation of ADAS/AD with real test drives, although important, involves huge costs and time. Simulation tools provide an alternative with the added advantage of reproducibility but often use ideal sensors, which do not reflect real sensor output accurately. This paper presents a new validation methodology using fault injection, as recommended by the ISO 26262 standard, to test software and system robustness. In our work, we investigated and developed a tool capable of inserting faults at different software and system levels to verify its robustness. The scope of this paper is to cover the fault injection test for the Visteon's DriveCore™ system, a centralized domain controller for Autonomous driving which is sensor agnostic and SoC agnostic. With this new approach, the validation of safety monitoring functionality and its behavior can be tested using real-world data instead of synthetic data from simulation tools resulting in having better confidence in system performance before proceeding with in-vehicle testing.}, language = {en} } @book{OPUS4-9062, title = {Angewandte Forschung in der Wirtschaftsinformatik}, editor = {Wolf, Martin R. and Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {Mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {259 Seiten}, year = {2019}, language = {de} }