@inproceedings{HoegenDonckerRuetters2020, author = {Hoegen, Anne von and Doncker, Rik W. De and R{\"u}tters, Ren{\´e}}, title = {Teaching Digital Control of Operational Amplifier Processes with a LabVIEW Interface and Embedded Hardware}, series = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, booktitle = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.23919/ICEMS50442.2020.9290928}, pages = {1117 -- 1122}, year = {2020}, abstract = {Control engineering theory is hard to grasp for undergraduates during the first semesters, as it deals with the dynamical behavior of systems also in combination with control strategies on an abstract level. Therefore, operational amplifier (OpAmp) processes are reasonable and very effective systems to connect mathematical description with actual system's behavior. In this paper, we present an experiment for a laboratory session in which an embedded system, driven by a LabVIEW human machine interface (HMI) via USB, controls the analog circuits.With this setup we want to show the possibility of firstly, analyzing a first order process and secondly, designing a P-and PI-controller. Thereby, the theory of control engineering is always applied to the empirical results in order to break down the abstract level for the students.}, language = {en} } @inproceedings{UlmerBraunChengetal.2020, author = {Ulmer, Jessica and Braun, Sebastian and Cheng, Chi-Tsun and Dowey, Steve and Wollert, J{\"o}rg}, title = {Gamified Virtual Reality Training Environment for the Manufacturing Industry}, series = {Proceedings of the 2020 19th International Conference on Mechatronics - Mechatronika (ME)}, booktitle = {Proceedings of the 2020 19th International Conference on Mechatronics - Mechatronika (ME)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.1109/ME49197.2020.9286661}, pages = {1 -- 6}, year = {2020}, abstract = {Industry 4.0 imposes many challenges for manufacturing companies and their employees. Innovative and effective training strategies are required to cope with fast-changing production environments and new manufacturing technologies. Virtual Reality (VR) offers new ways of on-the-job, on-demand, and off-premise training. A novel concept and evaluation system combining Gamification and VR practice for flexible assembly tasks is proposed in this paper and compared to existing works. It is based on directed acyclic graphs and a leveling system. The concept enables a learning speed which is adjustable to the users' pace and dynamics, while the evaluation system facilitates adaptive work sequences and allows employee-specific task fulfillment. The concept was implemented and analyzed in the Industry 4.0 model factory at FH Aachen for mechanical assembly jobs.}, language = {de} } @article{MoratFaudeHanssenetal.2020, author = {Morat, Mareike and Faude, Oliver and Hanssen, Henner and Ludyga, Sebastian and Zacher, Jonas and Eibl, Angi and Albracht, Kirsten and Donath, Lars}, title = {Agility Training to Integratively Promote Neuromuscular, Cognitive, Cardiovascular and Psychosocial Function in Healthy Older Adults: A Study Protocol of a One-Year Randomized-Controlled Trial}, series = {International Journal of Environmental Research and Public Health}, volume = {17}, journal = {International Journal of Environmental Research and Public Health}, number = {6}, publisher = {MDPI}, address = {Basel}, issn = {1660-4601}, doi = {10.3390/ijerph17061853}, pages = {1 -- 14}, year = {2020}, abstract = {Exercise training effectively mitigates aging-induced health and fitness impairments. Traditional training recommendations for the elderly focus separately on relevant physiological fitness domains, such as balance, flexibility, strength and endurance. Thus, a more holistic and functional training framework is needed. The proposed agility training concept integratively tackles spatial orientation, stop and go, balance and strength. The presented protocol aims at introducing a two-armed, one-year randomized controlled trial, evaluating the effects of this concept on neuromuscular, cardiovascular, cognitive and psychosocial health outcomes in healthy older adults. Eighty-five participants were enrolled in this ongoing trial. Seventy-nine participants completed baseline testing and were block-randomized to the agility training group or the inactive control group. All participants undergo pre- and post-testing with interim assessment after six months. The intervention group currently receives supervised, group-based agility training twice a week over one year, with progressively demanding perceptual, cognitive and physical exercises. Knee extension strength, reactive balance, dual task gait speed and the Agility Challenge for the Elderly (ACE) serve as primary endpoints and neuromuscular, cognitive, cardiovascular, and psychosocial meassures serve as surrogate secondary outcomes. Our protocol promotes a comprehensive exercise training concept for older adults, that might facilitate stakeholders in health and exercise to stimulate relevant health outcomes without relying on excessively time-consuming physical activity recommendations.}, language = {en} } @article{GivanoudiCornelisRasschaertetal.2021, author = {Givanoudi, Stella and Cornelis, Peter and Rasschaert, Geertrui and Wackers, Gideon and Iken, Heiko and Rolka, David and Yongabi, Derick and Robbens, Johan and Sch{\"o}ning, Michael Josef and Heyndrickx, Marc and Wagner, Patrick}, title = {Selective Campylobacter detection and quantification in poultry: A sensor tool for detecting the cause of a common zoonosis at its source}, series = {Sensors and Actuators B: Chemical}, journal = {Sensors and Actuators B: Chemical}, number = {In Press, Journal Pre-proof}, publisher = {Elsevier}, address = {Amsterdam}, issn = {0925-4005}, doi = {10.1016/j.snb.2021.129484}, pages = {Article 129484}, year = {2021}, language = {en} } @incollection{SchubaHoefken2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm}, title = {Cybersicherheit in Produktion, Automotive und intelligenten Geb{\"a}uden}, series = {IT-Sicherheit - Technologien und Best Practices f{\"u}r die Umsetzung im Unternehmen}, booktitle = {IT-Sicherheit - Technologien und Best Practices f{\"u}r die Umsetzung im Unternehmen}, publisher = {Carl Hanser Verlag}, address = {M{\"u}nchen}, isbn = {978-3-446-47223-5}, doi = {10.3139/9783446473478.012}, pages = {193 -- 218}, year = {2022}, language = {de} } @incollection{EnglaenderKaminskiSchuba2022, author = {Engl{\"a}nder, Jacques and Kaminski, Lars and Schuba, Marko}, title = {Informationssicherheitsmanagement}, series = {Digitalisierungs- und Informationsmanagement}, booktitle = {Digitalisierungs- und Informationsmanagement}, publisher = {Springer Vieweg}, address = {Berlin}, isbn = {978-3-662-63757-9}, doi = {10.1007/978-3-662-63758-6_15}, pages = {373 -- 398}, year = {2022}, abstract = {Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und m{\"u}ssen daher entsprechend gesch{\"u}tzt werden. Getrieben durch die erh{\"o}hte Vernetzung von Informationstechnologie, die h{\"o}here Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, r{\"u}cken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsf{\"a}higen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschr{\"a}nken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte f{\"u}r die Bereiche IT-Security, IT-Safety und Datenschutz f{\"u}r vernetzte Produkte, Produktion und Arbeitspl{\"a}tze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller {\"U}berlegungen. In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, {\"u}ber die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien f{\"u}r die Informationssicherheit festlegen k{\"o}nnen.}, language = {de} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @book{Lauth2022, author = {Lauth, Jakob}, title = {Physikalische Chemie kompakt}, publisher = {Springer Spektrum}, address = {Berlin}, isbn = {978-3-662-64587-1}, doi = {https://doi.org/10.1007/978-3-662-64588-8}, pages = {XXIV, 263 Seiten}, year = {2022}, language = {de} } @article{MalinowskiFournierHorbachetal.2022, author = {Malinowski, Daniel and Fournier, Yvan and Horbach, Andreas and Frick, Michael and Magliani, Mirko and Kalverkamp, Sebastian and Hildinger, Martin and Spillner, Jan and Behbahani, Mehdi and Hima, Flutura}, title = {Computational fluid dynamics analysis of endoluminal aortic perfusion}, series = {Perfusion}, volume = {0}, journal = {Perfusion}, number = {0}, publisher = {Sage}, address = {London}, issn = {1477-111X}, doi = {10.1177/02676591221099809}, pages = {1 -- 8}, year = {2022}, abstract = {Introduction: In peripheral percutaneous (VA) extracorporeal membrane oxygenation (ECMO) procedures the femoral arteries perfusion route has inherent disadvantages regarding poor upper body perfusion due to watershed. With the advent of new long flexible cannulas an advancement of the tip up to the ascending aorta has become feasible. To investigate the impact of such long endoluminal cannulas on upper body perfusion, a Computational Fluid Dynamics (CFD) study was performed considering different support levels and three cannula positions. Methods: An idealized literature-based- and a real patient proximal aortic geometry including an endoluminal cannula were constructed. The blood flow was considered continuous. Oxygen saturation was set to 80\% for the blood coming from the heart and to 100\% for the blood leaving the cannula. 50\% and 90\% venoarterial support levels from the total blood flow rate of 6 l/min were investigated for three different positions of the cannula in the aortic arch. Results: For both geometries, the placement of the cannula in the ascending aorta led to a superior oxygenation of all aortic blood vessels except for the left coronary artery. Cannula placements at the aortic arch and descending aorta could support supra-aortic arteries, but not the coronary arteries. All positions were able to support all branches with saturated blood at 90\% flow volume. Conclusions: In accordance with clinical observations CFD analysis reveals, that retrograde advancement of a long endoluminal cannula can considerably improve the oxygenation of the upper body and lead to oxygen saturation distributions similar to those of a central cannulation.}, language = {en} }