@inproceedings{RauschLeiseEdereretal.2016, author = {Rausch, Lea and Leise, Philipp and Ederer, Thorsten and Altherr, Lena and Pelz, Peter F.}, title = {A comparison of MILP and MINLP solver performance on the example of a drinking water supply system design problem}, series = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, booktitle = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, editor = {Papadrakakis, M. and Ppadopoulos, V. and Stefanou, G. and Plevris, V.}, isbn = {978-618-82844-0-1}, pages = {8509 -- 8527}, year = {2016}, abstract = {Finding a good system topology with more than a handful of components is a highly non-trivial task. The system needs to be able to fulfil all expected load cases, but at the same time the components should interact in an energy-efficient way. An example for a system design problem is the layout of the drinking water supply of a residential building. It may be reasonable to choose a design of spatially distributed pumps which are connected by pipes in at least two dimensions. This leads to a large variety of possible system topologies. To solve such problems in a reasonable time frame, the nonlinear technical characteristics must be modelled as simple as possible, while still achieving a sufficiently good representation of reality. The aim of this paper is to compare the speed and reliability of a selection of leading mathematical programming solvers on a set of varying model formulations. This gives us empirical evidence on what combinations of model formulations and solver packages are the means of choice with the current state of the art.}, language = {en} } @inproceedings{MuellerAltherrAholaetal.2019, author = {M{\"u}ller, Tim M. and Altherr, Lena and Ahola, Marja and Schabel, Samuel and Pelz, Peter F.}, title = {Multi-Criteria optimization of pressure screen systems in paper recycling - balancing quality, yield, energy consumption and system complexity}, series = {EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization}, booktitle = {EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization}, editor = {Rodrigues, H. C.}, publisher = {Springer International Publishing}, address = {Basel}, isbn = {978-3-319-97773-7}, doi = {10.1007/978-3-319-97773-7_105}, year = {2019}, abstract = {The paper industry is the industry with the third highest energy consumption in the European Union. Using recycled paper instead of fresh fibers for papermaking is less energy consuming and saves resources. However, adhesive contaminants in recycled paper are particularly problematic since they reduce the quality of the resulting paper-product. To remove as many contaminants and at the same time obtain as many valuable fibres as possible, fine screening systems, consisting of multiple interconnected pressure screens, are used. Choosing the best configuration is a non-trivial task: The screens can be interconnected in several ways, and suitable screen designs as well as operational parameters have to be selected. Additionally, one has to face conflicting objectives. In this paper, we present an approach for the multi-criteria optimization of pressure screen systems based on Mixed-Integer Nonlinear Programming. We specifically focus on a clear representation of the trade-off between different objectives.}, language = {en} } @inproceedings{AltherrEdererSchaenzleetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Sch{\"a}nzle, Christian and Lorenz, Ulf and Pelz, Peter F.}, title = {Algorithmic system design using scaling and affinity laws}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1}, pages = {605 -- 611}, year = {2017}, abstract = {Energy-efficient components do not automatically lead to energy-efficient systems. Technical Operations Research (TOR) shifts the focus from the single component to the system as a whole and finds its optimal topology and operating strategy simultaneously. In previous works, we provided a preselected construction kit of suitable components for the algorithm. This approach may give rise to a combinatorial explosion if the preselection cannot be cut down to a reasonable number by human intuition. To reduce the number of discrete decisions, we integrate laws derived from similarity theory into the optimization model. Since the physical characteristics of a production series are similar, it can be described by affinity and scaling laws. Making use of these laws, our construction kit can be modeled more efficiently: Instead of a preselection of components, it now encompasses whole model ranges. This allows us to significantly increase the number of possible set-ups in our model. In this paper, we present how to embed this new formulation into a mixed-integer program and assess the run time via benchmarks. We present our approach on the example of a ventilation system design problem.}, language = {en} } @inproceedings{AltherrEdererVergeetal.2015, author = {Altherr, Lena and Ederer, Thorsten and Verg{\´e}, Angela and Pelz, Peter F.}, title = {Algorithmische Struktursynthese eines hydrostatischen Getriebes}, series = {Antriebssysteme 2015 : Elektrik, Mechanik, Fluidtechnik in der Anwendung}, booktitle = {Antriebssysteme 2015 : Elektrik, Mechanik, Fluidtechnik in der Anwendung}, publisher = {VDI-Verlag}, address = {D{\"u}sseldorf}, isbn = {978-3-18-092268-3}, pages = {145 -- 155}, year = {2015}, language = {de} } @inproceedings{SchaenzleAltherrEdereretal.2015, author = {Sch{\"a}nzle, Christian and Altherr, Lena and Ederer, Thorsten and Lorenz, Ulf and Pelz, Peter F.}, title = {As good as it can be: Ventilation system design by a combined scaling and discrete optimization method}, series = {Proceedings of FAN 2015}, booktitle = {Proceedings of FAN 2015}, pages = {1 -- 11}, year = {2015}, abstract = {The understanding that optimized components do not automatically lead to energy-efficient systems sets the attention from the single component on the entire technical system. At TU Darmstadt, a new field of research named Technical Operations Research (TOR) has its origin. It combines mathematical and technical know-how for the optimal design of technical systems. We illustrate our optimization approach in a case study for the design of a ventilation system with the ambition to minimize the energy consumption for a temporal distribution of diverse load demands. By combining scaling laws with our optimization methods we find the optimal combination of fans and show the advantage of the use of multiple fans.}, language = {en} } @inproceedings{AltherrEdererFarnetaneetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Farnetane, Lucas S. and P{\"o}ttgen, Philipp and Verg{\´e}, Angela and Pelz, Peter F.}, title = {Multicriterial design of a hydrostatic transmission system via mixed-integer programming}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1_41}, pages = {301 -- 307}, year = {2017}, abstract = {In times of planned obsolescence the demand for sustainability keeps growing. Ideally, a technical system is highly reliable, without failures and down times due to fast wear of single components. At the same time, maintenance should preferably be limited to pre-defined time intervals. Dispersion of load between multiple components can increase a system's reliability and thus its availability inbetween maintenance points. However, this also results in higher investment costs and additional efforts due to higher complexity. Given a specific load profile and resulting wear of components, it is often unclear which system structure is the optimal one. Technical Operations Research (TOR) finds an optimal structure balancing availability and effort. We present our approach by designing a hydrostatic transmission system.}, language = {en} } @inproceedings{BuesgenKloeserKohletal.2022, author = {B{\"u}sgen, Andr{\´e} and Kl{\"o}ser, Lars and Kohl, Philipp and Schmidts, Oliver and Kraft, Bodo and Z{\"u}ndorf, Albert}, title = {Exploratory analysis of chat-based black market profiles with natural language processing}, series = {Proceedings of the 11th International Conference on Data Science, Technology and Applications}, booktitle = {Proceedings of the 11th International Conference on Data Science, Technology and Applications}, isbn = {978-989-758-583-8}, issn = {2184-285X}, doi = {10.5220/0011271400003269}, pages = {83 -- 94}, year = {2022}, abstract = {Messenger apps like WhatsApp or Telegram are an integral part of daily communication. Besides the various positive effects, those services extend the operating range of criminals. Open trading groups with many thousand participants emerged on Telegram. Law enforcement agencies monitor suspicious users in such chat rooms. This research shows that text analysis, based on natural language processing, facilitates this through a meaningful domain overview and detailed investigations. We crawled a corpus from such self-proclaimed black markets and annotated five attribute types products, money, payment methods, user names, and locations. Based on each message a user sends, we extract and group these attributes to build profiles. Then, we build features to cluster the profiles. Pretrained word vectors yield better unsupervised clustering results than current state-of-the-art transformer models. The result is a semantically meaningful high-level overview of the user landscape of black market chatrooms. Additionally, the extracted structured information serves as a foundation for further data exploration, for example, the most active users or preferred payment methods.}, language = {en} } @inproceedings{OstkottePetersHueningetal.2022, author = {Ostkotte, Sebastian and Peters, Constantin and H{\"u}ning, Felix and Bragard, Michael}, title = {Design, implementation and verification of an rotational incremental position encoder based on the magnetic Wiegand effect}, series = {2022 ELEKTRO (ELEKTRO)}, booktitle = {2022 ELEKTRO (ELEKTRO)}, publisher = {IEEE}, isbn = {978-1-6654-6726-1}, issn = {2691-0616}, doi = {10.1109/ELEKTRO53996.2022.9803477}, pages = {6 Seiten}, year = {2022}, abstract = {This paper covers the use of the magnetic Wiegand effect to design an innovative incremental encoder. First, a theoretical design is given, followed by an estimation of the achievable accuracy and an optimization in open-loop operation. Finally, a successful experimental verification is presented. For this purpose, a permanent magnet synchronous machine is controlled in a field-oriented manner, using the angle information of the prototype.}, language = {en} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{BonneyNagelSchuba2016, author = {Bonney, Gregor and Nagel, Stefan and Schuba, Marko}, title = {Risiko Smart Home - Angriff auf ein Babymonitorsystem}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {371 -- 378}, year = {2016}, abstract = {Unser Zuhause wird zunehmend intelligenter. Smart Homes bieten uns die Steuerung von Haus- oder Unterhaltungstechnik bequem vom Smartphone aus. Junge Familien nutzen die Technologie, um mittels vernetzten Babymonitorsystemen ihren Nachwuchs von {\"u}berall aus im Blick zu haben. Davon auszugehen, dass solche Systeme mit einem Fokus auf Sicherheit entwickelt wurden, um die sehr pers{\"o}nlichen Daten zu sch{\"u}tzen, ist jedoch ein Trugschluss. Die Untersuchung eines handels{\"u}blichen und keineswegs billigen Systems zeigt, dass die Ger{\"a}te sehr einfach kompromittiert und missbraucht werden k{\"o}nnen.}, language = {de} }