@inproceedings{BeckerBragard2024, author = {Becker, Tim and Bragard, Michael}, title = {Low-Voltage DC Training Lab for Electric Drives - Optimizing the Balancing Act Between High Student Throughput and Individual Learning Speed}, series = {2024 IEEE Global Engineering Education Conference (EDUCON)}, booktitle = {2024 IEEE Global Engineering Education Conference (EDUCON)}, publisher = {IEEE}, address = {New York, NY}, issn = {2165-9559}, doi = {10.1109/EDUCON60312.2024.10578902}, pages = {8 Seiten}, year = {2024}, abstract = {After a brief introduction of conventional laboratory structures, this work focuses on an innovative and universal approach for a setup of a training laboratory for electric machines and drive systems. The novel approach employs a central 48 V DC bus, which forms the backbone of the structure. Several sets of DC machine, asynchronous machine and synchronous machine are connected to this bus. The advantages of the novel system structure are manifold, both from a didactic and a technical point of view: Student groups can work on their own performance level in a highly parallelized and at the same time individualized way. Additional training setups (similar or different) can easily be added. Only the total power dissipation has to be provided, i.e. the DC bus balances the power flow between the student groups. Comparative results of course evaluations of several cohorts of students are shown.}, language = {en} } @inproceedings{VladovaUllrichSultanowetal.2023, author = {Vladova, Gergana and Ullrich, Andr{\´e} and Sultanow, Eldar and Tobolla, Marinho and Sebrak, Sebastian and Czarnecki, Christian and Brockmann, Carsten}, title = {Visual analytics for knowledge management}, series = {INFORMATIK 2023 - Designing Futures: Zuk{\"u}nfte gestalten}, booktitle = {INFORMATIK 2023 - Designing Futures: Zuk{\"u}nfte gestalten}, publisher = {GI - Gesellschaft f{\"u}r Informatik}, address = {Bonn}, isbn = {978-3-88579-731-9}, issn = {1617-5468}, doi = {10.18420/inf2023_187}, pages = {1851 -- 1870}, year = {2023}, abstract = {The management of knowledge in organizations considers both established long-term processes and cooperation in agile project teams. Since knowledge can be both tacit and explicit, its transfer from the individual to the organizational knowledge base poses a challenge in organizations. This challenge increases when the fluctuation of knowledge carriers is exceptionally high. Especially in large projects in which external consultants are involved, there is a risk that critical, company-relevant knowledge generated in the project will leave the company with the external knowledge carrier and thus be lost. In this paper, we show the advantages of an early warning system for knowledge management to avoid this loss. In particular, the potential of visual analytics in the context of knowledge management systems is presented and discussed. We present a project for the development of a business-critical software system and discuss the first implementations and results.}, language = {en} } @inproceedings{FerreinBharatheeshaSchifferetal.2019, author = {Ferrein, Alexander and Bharatheesha, Mukunda and Schiffer, Stefan and Corbato, Carlos Hernandez}, title = {TRROS 2018 : Teaching Robotics with ROS Workshop at ERF 2018; Proceedings of the Workshop on Teaching Robotics with ROS (held at ERF 2018), co-located with European Robotics Forum 2018 (ERF 2018), Tampere, Finland, March 15th, 2018}, series = {CEUR Workshop Proceedings}, booktitle = {CEUR Workshop Proceedings}, number = {Vol-2329}, issn = {1613-0073}, pages = {68 Seiten}, year = {2019}, language = {en} } @inproceedings{FerreinSchollNeumannetal.2019, author = {Ferrein, Alexander and Scholl, Ingrid and Neumann, Tobias and Kr{\"u}ckel, Kai and Schiffer, Stefan}, title = {A system for continuous underground site mapping and exploration}, doi = {10.5772/intechopen.85859}, pages = {16 Seiten}, year = {2019}, language = {en} } @inproceedings{HeuermannFinger2014, author = {Heuermann, Holger and Finger, Torsten}, title = {2.45 GHz Plasma Powered Spark Plug by Thermal and EM-Optimization}, pages = {30 Folien}, year = {2014}, language = {en} } @inproceedings{SchoppHeuermannHoltrup2014, author = {Schopp, Christoph and Heuermann, Holger and Holtrup, S.}, title = {Investigation on efficacy optimization of RF-driven automotive D-lamps}, series = {44th European Microwave Conference (EuMC),2014, Rome}, booktitle = {44th European Microwave Conference (EuMC),2014, Rome}, doi = {10.1109/EuMC.2014.6986645}, pages = {1154 -- 1157}, year = {2014}, language = {en} } @inproceedings{NeumannFerreinKallweitetal.2014, author = {Neumann, Tobias and Ferrein, Alexander and Kallweit, Stephan and Scholl, Ingrid}, title = {Towards a mobile mapping robot for underground mines}, series = {7th Conference of Robotics and Mechatronics : RobMech 2014 : 27th and 28th Nov. 2014, Cape Town}, booktitle = {7th Conference of Robotics and Mechatronics : RobMech 2014 : 27th and 28th Nov. 2014, Cape Town}, organization = {Conference of Robotics and Mechatronics <7, 2014, Cape Town, South Africa>}, pages = {1 -- 6}, year = {2014}, language = {en} } @inproceedings{NethSchubaBrodkorbetal.2023, author = {Neth, Jannik and Schuba, Marko and Brodkorb, Karsten and Neugebauer, Georg and H{\"o}ner, Tim and Hack, Sacha}, title = {Digital forensics triage app for android}, series = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, booktitle = {ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security}, publisher = {ACM}, isbn = {9798400707728}, doi = {10.1145/3600160.3605017}, pages = {6 Seiten}, year = {2023}, abstract = {Digital forensics of smartphones is of utmost importance in many criminal cases. As modern smartphones store chats, photos, videos etc. that can be relevant for investigations and as they can have storage capacities of hundreds of gigabytes, they are a primary target for forensic investigators. However, it is exactly this large amount of data that is causing problems: extracting and examining the data from multiple phones seized in the context of a case is taking more and more time. This bears the risk of wasting a lot of time with irrelevant phones while there is not enough time left to analyze a phone which is worth examination. Forensic triage can help in this case: Such a triage is a preselection step based on a subset of data and is performed before fully extracting all the data from the smartphone. Triage can accelerate subsequent investigations and is especially useful in cases where time is essential. The aim of this paper is to determine which and how much data from an Android smartphone can be made directly accessible to the forensic investigator - without tedious investigations. For this purpose, an app has been developed that can be used with extremely limited storage of data in the handset and which outputs the extracted data immediately to the forensic workstation in a human- and machine-readable format.}, language = {en} } @inproceedings{NeugebauerBrutschyMeyeretal.2014, author = {Neugebauer, Georg and Brutschy, Lucas and Meyer, Ulrike and Wetzel, Susanne}, title = {Privacy-preserving multi-party reconciliation secure in the malicious model}, series = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, booktitle = {DPM 2013, SETOP 2013: Data Privacy Management and Autonomous Spontaneous Security}, editor = {Garcia-Alfaro, Joaquin and Lioudakis, Georgios and Cuppens-Boulahia, Nora and Foley, Simon and Fitzgerald, William M.}, publisher = {Springer}, address = {Berlin}, isbn = {978-3-642-54567-2 (Print)}, doi = {10.1007/978-3-642-54568-9_12}, pages = {178 -- 193}, year = {2014}, abstract = {The problem of fair and privacy-preserving ordered set reconciliation arises in a variety of applications like auctions, e-voting, and appointment reconciliation. While several multi-party protocols have been proposed that solve this problem in the semi-honest model, there are no multi-party protocols that are secure in the malicious model so far. In this paper, we close this gap. Our newly proposed protocols are shown to be secure in the malicious model based on a variety of novel non-interactive zero-knowledge-proofs. We describe the implementation of our protocols and evaluate their performance in comparison to protocols solving the problem in the semi-honest case.}, language = {en} } @inproceedings{ChircuCzarneckiFriedmannetal.2023, author = {Chircu, Alina and Czarnecki, Christian and Friedmann, Daniel and Pomaskow, Johanna and Sultanow, Eldar}, title = {Towards a Digital Twin of Society}, series = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, booktitle = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, publisher = {University of Hawai'i}, address = {Honolulu}, isbn = {978-0-9981331-6-4}, pages = {6748 -- 6757}, year = {2023}, abstract = {This paper describes the potential for developing a digital twin of society- a dynamic model that can be used to observe, analyze, and predict the evolution of various societal aspects. Such a digital twin can help governmental agencies and policy makers in interpreting trends, understanding challenges, and making decisions regarding investments or policies necessary to support societal development and ensure future prosperity. The paper reviews related work regarding the digital twin paradigm and its applications. The paper presents a motivating case study- an analysis of opportunities and challenges faced by the German federal employment agency, Bundesagentur f¨ur Arbeit (BA), proposes solutions using digital twins, and describes initial proofs of concept for such solutions.}, language = {en} }