@inproceedings{RekePeterSchulteTiggesetal.2020, author = {Reke, Michael and Peter, Daniel and Schulte-Tigges, Joschua and Schiffer, Stefan and Ferrein, Alexander and Walter, Thomas and Matheis, Dominik}, title = {A Self-Driving Car Architecture in ROS2}, series = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, booktitle = {2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-1-7281-4162-6}, doi = {10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020}, pages = {1 -- 6}, year = {2020}, abstract = {In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions.}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{KoehlerWolf2020, author = {K{\"o}hler, Klemens and Wolf, Martin}, title = {Organisatorische Maßnahmen zu Erh{\"o}hung der IT Sicherheit - Empfehlungen aus der Perspektive der Konflikttheorie}, number = {Preprint}, year = {2020}, abstract = {Die NATO definiert den Cyberspace als die "Umgebung, die durch physische und nicht-physische Bestandteile zum Speichern, {\"A}ndern, und Austauschen von Daten mit Hilfe von Computer-Netzwerken" [NATO CCDCOE]. Dar{\"u}ber hinaus ist es ein Medium menschlicher Interaktion. IT Angriffe sind feindselige, nichtkooperative Interaktionen, die mittels Konflikttheorie beschrieben werden k{\"o}nnen. Durch die Anwendung dieses Gedankengeb{\"a}udes auf IT Sicherheit von Organisationen k{\"o}nnen eine Reihe von Verbesserungen in Unternehmen identifiziert werden.}, language = {de} } @inproceedings{LeiseBreuerAltherretal.2020, author = {Leise, Philipp and Breuer, Tim and Altherr, Lena and Pelz, Peter F.}, title = {Development, validation and assessment of a resilient pumping system}, series = {Proceedings of the Joint International Resilience Conference, JIRC2020}, booktitle = {Proceedings of the Joint International Resilience Conference, JIRC2020}, isbn = {978-90-365-5095-6}, pages = {97 -- 100}, year = {2020}, abstract = {The development of resilient technical systems is a challenging task, as the system should adapt automatically to unknown disturbances and component failures. To evaluate different approaches for deriving resilient technical system designs, we developed a modular test rig that is based on a pumping system. On the basis of this example system, we present metrics to quantify resilience and an algorithmic approach to improve resilience. This approach enables the pumping system to automatically react on unknown disturbances and to reduce the impact of component failures. In this case, the system is able to automatically adapt its topology by activating additional valves. This enables the system to still reach a minimum performance, even in case of failures. Furthermore, timedependent disturbances are evaluated continuously, deviations from the original state are automatically detected and anticipated in the future. This allows to reduce the impact of future disturbances and leads to a more resilient system behaviour.}, language = {en} } @inproceedings{LorenzAltherrPelz2020, author = {Lorenz, Imke-Sophie and Altherr, Lena and Pelz, Peter F.}, title = {Resilience enhancement of critical infrastructure - graph-theoretical resilience analysis of the water distribution system in the German city of Darmstadt}, series = {14th WCEAM Proceedings}, booktitle = {14th WCEAM Proceedings}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-64228-0}, doi = {10.1007/978-3-030-64228-0_13}, pages = {137 -- 149}, year = {2020}, abstract = {Water suppliers are faced with the great challenge of achieving high-quality and, at the same time, low-cost water supply. Since climatic and demographic influences will pose further challenges in the future, the resilience enhancement of water distribution systems (WDS), i.e. the enhancement of their capability to withstand and recover from disturbances, has been in particular focus recently. To assess the resilience of WDS, graph-theoretical metrics have been proposed. In this study, a promising approach is first physically derived analytically and then applied to assess the resilience of the WDS for a district in a major German City. The topology based resilience index computed for every consumer node takes into consideration the resistance of the best supply path as well as alternative supply paths. This resistance of a supply path is derived to be the dimensionless pressure loss in the pipes making up the path. The conducted analysis of a present WDS provides insight into the process of actively influencing the resilience of WDS locally and globally by adding pipes. The study shows that especially pipes added close to the reservoirs and main branching points in the WDS result in a high resilience enhancement of the overall WDS.}, language = {en} } @article{CzarneckiDietze2020, author = {Czarnecki, Christian and Dietze, Christian}, title = {Gestaltungsorientierte Forschung am Beispiel der Referenzmodellierung in der Telekommunikationsindustrie}, series = {HMD Praxis der Wirtschaftsinformatik}, volume = {57}, journal = {HMD Praxis der Wirtschaftsinformatik}, number = {2}, publisher = {Springer Nature}, address = {Cham}, issn = {2198-2775}, doi = {10.1365/s40702-020-00594-y}, pages = {310 -- 323}, year = {2020}, abstract = {Am Beispiel der Telekommunikationsindustrie zeigt der Beitrag eine konkrete Ausgestaltung anwendungsorientierter Forschung, die sowohl f{\"u}r die Praxis als auch f{\"u}r die Wissenschaft nutzen- und erkenntnisbringend ist. Forschungsgegenstand sind die Referenzmodelle des Industriegremiums TM Forum, die von vielen Telekommunikationsunternehmen zur Transformation ihrer Strukturen und Systeme genutzt werden. Es wird die langj{\"a}hrige Forschungst{\"a}tigkeit bei der Weiterentwicklung und Anwendung dieser Referenzmodelle beschrieben. Dabei wird ein konsequent gestaltungsorientierter Forschungsansatz verfolgt. Das Zusammenspiel aus kontinuierlicher Weiterentwicklung in Zusammenarbeit mit einem Industriegremium und der Anwendung in vielf{\"a}ltigen Praxisprojekten f{\"u}hrt zu einer erfolgreichen Symbiose aus praktischer Nutzengenerierung sowie wissenschaftlichem Erkenntnisgewinn. Der Beitrag stellt den gew{\"a}hlten Forschungsansatz anhand konkreter Beispiele vor. Darauf basierend werden Empfehlungen und Herausforderungen f{\"u}r eine gestaltungs- und praxisorientierte Forschung diskutiert.}, language = {de} } @misc{Czarnecki2020, author = {Czarnecki, Christian}, title = {Buchbesprechung : Anwendungsorientierte Wirtschaftsinformatik - Strategische Planung, Entwicklung und Nutzung von Informationssystemen}, series = {Anwendungen und Konzepte der Wirtschaftsinformatik (AKWI-Journal)}, journal = {Anwendungen und Konzepte der Wirtschaftsinformatik (AKWI-Journal)}, publisher = {Technische Hochschule Wildau}, address = {Wildau}, issn = {2296-4592}, doi = {10.26034/lu.akwi.2020.3264}, pages = {101 -- 101}, year = {2020}, language = {de} } @article{BensbergAuthCzarnecki2020, author = {Bensberg, Frank and Auth, Gunnar and Czarnecki, Christian}, title = {Literaturanalyse mit Text Mining}, series = {E-Learning and Education (eleed)}, journal = {E-Learning and Education (eleed)}, number = {13}, editor = {Haake, J{\"o}rg M.}, publisher = {FernUniversit{\"a}t in Hagen}, address = {Hagen}, issn = {1860-7470}, pages = {1 -- 13}, year = {2020}, abstract = {Die Durchf{\"u}hrung einer systematischen Literaturrecherche ist eine zentrale Kompetenz wissenschaftlichen Arbeitens und bildet daher einen festen Ausbildungsbestandteil von Bachelor- und Masterstudieng{\"a}ngen. In entsprechenden Lehrveranstaltungen werden Studierende zwar mit den grundlegenden Hilfsmitteln zur Suche und Verwaltung von Literatur vertraut gemacht, allerdings werden die Potenziale textanalytischer Methoden und Anwendungssysteme (Text Mining, Text Analytics) dabei zumeist nicht abgedeckt. Folglich werden Datenkompetenzen, die zur systemgest{\"u}tzten Analyse und Erschließung von Literaturdaten erforderlich sind, nicht hinreichend ausgepr{\"a}gt. Um diese Kompetenzl{\"u}cke zu adressieren, ist an der Hochschule Osnabr{\"u}ck eine Lehrveranstaltung konzipiert und projektorientiert umgesetzt worden, die sich insbesondere an Studierende wirtschaftswissenschaftlicher Studieng{\"a}nge richtet. Dieser Beitrag dokumentiert die fachliche sowie technische Ausgestaltung dieser Veranstaltung und zeigt Potenziale f{\"u}r die k{\"u}nftige Weiterentwicklung auf.}, language = {de} } @incollection{SchneiderWisselinkNoelleetal.2020, author = {Schneider, Dominik and Wisselink, Frank and N{\"o}lle, Nikolai and Czarnecki, Christian}, title = {Influence of artificial intelligence on commercial interactions in the consumer market}, series = {Automatisierung und Personalisierung von Dienstleistungen : Methoden - Potenziale - Einsatzfelder}, booktitle = {Automatisierung und Personalisierung von Dienstleistungen : Methoden - Potenziale - Einsatzfelder}, editor = {Bruhn, Manfred and Hadwich, Karsten}, publisher = {Springer Gabler}, address = {Wiesbaden}, isbn = {978-3-658-30167-5 (Print)}, doi = {10.1007/978-3-658-30168-2_7}, pages = {183 -- 205}, year = {2020}, abstract = {Recently, novel AI-based services have emerged in the consumer market. AI-based services can affect the way consumers take commercial decisions. Research on the influence of AI on commercial interactions is in its infancy. In this chapter, a framework creating a first overview of the influence of AI on commercial interactions is introduced. This framework summarizes the findings of comparing numerous customer journeys of novel AI-based services with corresponding non-AI equivalents.}, language = {en} } @article{OrzadaFiedlerBitzetal.2020, author = {Orzada, Stephan and Fiedler, Thomas M. and Bitz, Andreas and Ladd, Mark E. and Quick, Harald H.}, title = {Local SAR compression with overestimation control to reduce maximum relative SAR overestimation and improve multi-channel RF array performance}, series = {Magnetic Resonance Materials in Physics, Biology and Medicine}, journal = {Magnetic Resonance Materials in Physics, Biology and Medicine}, number = {34 (2021)}, publisher = {Springer}, address = {Heidelberg}, isbn = {1352-8661}, doi = {10.1007/s10334-020-00890-0}, pages = {153 -- 164}, year = {2020}, abstract = {Objective In local SAR compression algorithms, the overestimation is generally not linearly dependent on actual local SAR. This can lead to large relative overestimation at low actual SAR values, unnecessarily constraining transmit array performance. Method Two strategies are proposed to reduce maximum relative overestimation for a given number of VOPs. The first strategy uses an overestimation matrix that roughly approximates actual local SAR; the second strategy uses a small set of pre-calculated VOPs as the overestimation term for the compression. Result Comparison with a previous method shows that for a given maximum relative overestimation the number of VOPs can be reduced by around 20\% at the cost of a higher absolute overestimation at high actual local SAR values. Conclusion The proposed strategies outperform a previously published strategy and can improve the SAR compression where maximum relative overestimation constrains the performance of parallel transmission.}, language = {en} }