@incollection{LeiseAltherrPelz2018, author = {Leise, Philipp and Altherr, Lena and Pelz, Peter F.}, title = {Energy-Efficient design of a water supply system for skyscrapers by mixed-integer nonlinear programming}, series = {Operations Research Proceedings 2017}, booktitle = {Operations Research Proceedings 2017}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-89919-0}, doi = {10.1007/978-3-319-89920-6_63}, year = {2018}, abstract = {The energy-efficiency of technical systems can be improved by a systematic design approach. Technical Operations Research (TOR) employs methods known from Operations Research to find a global optimal layout and operation strategy of technical systems. We show the practical usage of this approach by the systematic design of a decentralized water supply system for skyscrapers. All possible network options and operation strategies are modeled by a Mixed-Integer Nonlinear Program. We present the optimal system found by our approach and highlight the energy savings compared to a conventional system design.}, language = {en} } @inproceedings{AltherrPelzEdereretal.2017, author = {Altherr, Lena and Pelz, Peter F. and Ederer, Thorsten and Pfetsch, Marc E.}, title = {Optimale Getriebe auf Knopfdruck: Gemischt-ganzzahlige nichtlineare Optimierung zur Entscheidungsunterst{\"u}tzung bei der Auslegung von Getrieben f{\"u}r Kraftfahrzeuge}, series = {Antriebstechnisches Kolloquium ATK 2017}, booktitle = {Antriebstechnisches Kolloquium ATK 2017}, editor = {Jacobs, Georg}, isbn = {9783743148970}, pages = {313 -- 325}, year = {2017}, language = {de} } @inproceedings{RauschFriesenAltherretal.2018, author = {Rausch, Lea and Friesen, John and Altherr, Lena and Pelz, Peter F.}, title = {Using mixed-integer programming for the optimal design of water supply networks for slums}, series = {Operations Research Proceedings 2017}, booktitle = {Operations Research Proceedings 2017}, editor = {Kliewer, Natalia and Ehmke, Jan Fabian and Bornd{\"o}rfer, Ralf}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-89919-0 (Print)}, doi = {10.1007/978-3-319-89920-6_68}, pages = {509 -- 516}, year = {2018}, abstract = {The UN sets the goal to ensure access to water and sanitation for all people by 2030. To address this goal, we present a multidisciplinary approach for designing water supply networks for slums in large cities by applying mathematical optimization. The problem is modeled as a mixed-integer linear problem (MILP) aiming to find a network describing the optimal supply infrastructure. To illustrate the approach, we apply it on a small slum cluster in Dhaka, Bangladesh.}, language = {en} } @inproceedings{RauschLeiseEdereretal.2016, author = {Rausch, Lea and Leise, Philipp and Ederer, Thorsten and Altherr, Lena and Pelz, Peter F.}, title = {A comparison of MILP and MINLP solver performance on the example of a drinking water supply system design problem}, series = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, booktitle = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, editor = {Papadrakakis, M. and Ppadopoulos, V. and Stefanou, G. and Plevris, V.}, isbn = {978-618-82844-0-1}, pages = {8509 -- 8527}, year = {2016}, abstract = {Finding a good system topology with more than a handful of components is a highly non-trivial task. The system needs to be able to fulfil all expected load cases, but at the same time the components should interact in an energy-efficient way. An example for a system design problem is the layout of the drinking water supply of a residential building. It may be reasonable to choose a design of spatially distributed pumps which are connected by pipes in at least two dimensions. This leads to a large variety of possible system topologies. To solve such problems in a reasonable time frame, the nonlinear technical characteristics must be modelled as simple as possible, while still achieving a sufficiently good representation of reality. The aim of this paper is to compare the speed and reliability of a selection of leading mathematical programming solvers on a set of varying model formulations. This gives us empirical evidence on what combinations of model formulations and solver packages are the means of choice with the current state of the art.}, language = {en} } @inproceedings{HueningWacheMagiera2021, author = {H{\"u}ning, Felix and Wache, Franz-Josef and Magiera, David}, title = {Redundant bus systems using dual-mode radio}, series = {Proceedings of Sixth International Congress on Information and Communication Technology}, booktitle = {Proceedings of Sixth International Congress on Information and Communication Technology}, publisher = {Springer}, address = {Singapore}, isbn = {978-981-16-2379-0}, doi = {10.1007/978-981-16-2380-6_73}, pages = {835 -- 842}, year = {2021}, abstract = {Communication via serial bus systems, like CAN, plays an important role for all kinds of embedded electronic and mechatronic systems. To cope up with the requirements for functional safety of safety-critical applications, there is a need to enhance the safety features of the communication systems. One measure to achieve a more robust communication is to add redundant data transmission path to the applications. In general, the communication of real-time embedded systems like automotive applications is tethered, and the redundant data transmission lines are also tethered, increasing the size of the wiring harness and the weight of the system. A radio link is preferred as a redundant transmission line as it uses a complementary transmission medium compared to the wired solution and in addition reduces wiring harness size and weight. Standard wireless links like Wi-Fi or Bluetooth cannot meet the requirements for real-time capability with regard to bus communication. Using the new dual-mode radio enables a redundant transmission line meeting all requirements with regard to real-time capability, robustness and transparency for the data bus. In addition, it provides a complementary transmission medium with regard to commonly used tethered links. A CAN bus system is used to demonstrate the redundant data transfer via tethered and wireless CAN.}, language = {en} } @article{Wolf2000, author = {Wolf, Martin}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin}, volume = {21}, journal = {ACM SIGGROUP Bulletin}, number = {2}, issn = {2372-7403}, doi = {10.1145/605660.605662}, pages = {5 -- 8}, year = {2000}, abstract = {his report summarizes the results of a workshop on Groupware related task design which took place at the International Conference on Supporting Group Work Group'99, Arizona, from 14 th to 17 th November 1999. The workshop was addressed to people from different viewpoints, backgrounds, and domains: - Researchers dealing with questions of task analysis and task modeling for Groupware application from an academic point of view. They may contribute modelbased design approaches or theoretically oriented work - Practitioners with experience in the design and everyday use of groupware systems. They might refer to the practical side of the topic: "real" tasks, "real" problems, "real" users, etc.}, language = {en} } @inproceedings{NeesStengelMeisteretal.2020, author = {Nees, Franz and Stengel, Ingo and Meister, Vera G. and Barton, Thomas and Herrmann, Frank and M{\"u}ller, Christian and Wolf, Martin}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik / hrsg. von Franz Nees, Ingo Stengel, Vera G. Meister, Thomas Barton, Frank Herrmann, Christian M{\"u}ller, Martin R. Wolf}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-66-2}, doi = {10.15771/978-3-944330-66-2}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13840}, pages = {147 Seiten}, year = {2020}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen KI, Prozessorganisation und Plattformen f{\"u}r Gesch{\"a}ftsprozesse, Sicherheit und Datenschutz sowie Prototypen und Modelle.}, language = {de} } @inproceedings{WolfBartonHerrmannetal.2019, author = {Wolf, Martin and Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung vom 15.09.2019 bis 18.09.2019 an der Fachhochschule f{\"u}r Angewandte Wissenschaften Aachen / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, doi = {10.15771/978-3-944330-62-4}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13026}, pages = {261 Seiten}, year = {2019}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen Projektmanagement, Didaktik in der Wirtschaftsinformatik, IT-Sicherheit, Anwendungsf{\"a}lle, Reifegradmodelle, Plattformen f{\"u}r Gesch{\"a}ftsprozesse und Prototypen.}, language = {de} } @inproceedings{MollKoehlerWolf2019, author = {Moll, Florian and K{\"o}hler, Klemens and Wolf, Martin}, title = {Konzeption von IT-Sicherheitsl{\"o}sungen unter ethischen Gesichtspunkten am Beispiel einer Monitoring-App f{\"u}r mobile Endger{\"a}te}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {61 -- 72}, year = {2019}, abstract = {Die steigende Popularit{\"a}t von mobilen Endger{\"a}ten im privaten und gesch{\"a}ftlichen Umfeld geht mit einem Anstieg an Sicherheitsl{\"u}cken und somit potentiellen Angriffsfl{\"a}chen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes k{\"o}nnen Monitoring-Apps dienen, die unerw{\"u}nschtes Verhalten und Angriffe erkennen. Die automatisierte {\"U}berwachung von Endger{\"a}ten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilit{\"a}t der Nutzer und Nutzerinnen dieser Ger{\"a}te in Bezug auf Privatsph{\"a}re, kann zu einer geringen Akzeptanz und Compliance f{\"u}hren. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess f{\"u}hrt zu h{\"o}herer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt M{\"o}glichkeiten zur Umsetzung.}, language = {de} } @inproceedings{BeckerWolf2019, author = {Becker, Willi and Wolf, Martin}, title = {Entwicklung eines Einf{\"u}hrungskonzepts f{\"u}r IT-Service-Management in KMU}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {129 -- 137}, year = {2019}, abstract = {Obwohl es eine Vielzahl von Einf{\"u}hrungskonzepten f{\"u}r ITSM gibt, hat sich bisher keines dieser Konzepte auf breiter Linie durchgesetzt. Das gilt in erh{\"o}htem Maße f{\"u}r ITSM-Einf{\"u}hrungskonzepte f{\"u}r KMU, wohl nicht zuletzt aufgrund der Tatsache, dass der Mehrwert von ITSM f{\"u}r KMU aufgrund der geringeren Gr{\"o}ße der IT-Organisationen nur entsprechend schwieriger generiert werden kann. Mit diesem Beitrag wird ein Einf{\"u}hrungskonzept f{\"u}r ITSM in KMU systematisch hergeleitet. Daf{\"u}r wurden zun{\"a}chst die Treiber und Barrieren von ITSM untersucht, um daraus ein umfassendes Wirkmodell zu entwickeln. Da mit diesem Wirkungsmodell die Einflussfaktoren auf den Erfolg von ITSM in KMU deutlich werden, konnte auf dieser Basis ein Einf{\"u}hrungskonzept abgeleitet werden, welches insbesondere die positiven Effekte unterst{\"u}tzt bzw. verst{\"a}rkt.}, language = {de} }