@inproceedings{FerreinMeessenLimpertetal.2021, author = {Ferrein, Alexander and Meeßen, Marcus and Limpert, Nicolas and Schiffer, Stefan}, title = {Compiling ROS schooling curricula via contentual taxonomies}, series = {Robotics in Education}, booktitle = {Robotics in Education}, editor = {Lepuschitz, Wilfried}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-67411-3}, doi = {10.1007/978-3-030-67411-3_5}, pages = {49 -- 60}, year = {2021}, abstract = {The Robot Operating System (ROS) is the current de-facto standard in robot middlewares. The steadily increasing size of the user base results in a greater demand for training as well. User groups range from students in academia to industry professionals with a broad spectrum of developers in between. To deliver high quality training and education to any of these audiences, educators need to tailor individual curricula for any such training. In this paper, we present an approach to ease compiling curricula for ROS trainings based on a taxonomy of the teaching contents. The instructor can select a set of dedicated learning units and the system will automatically compile the teaching material based on the dependencies of the units selected and a set of parameters for a particular training. We walk through an example training to illustrate our work.}, language = {en} } @inproceedings{HoegenDonckerRuetters2020, author = {Hoegen, Anne von and Doncker, Rik W. De and R{\"u}tters, Ren{\´e}}, title = {Teaching Digital Control of Operational Amplifier Processes with a LabVIEW Interface and Embedded Hardware}, series = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, booktitle = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.23919/ICEMS50442.2020.9290928}, pages = {1117 -- 1122}, year = {2020}, abstract = {Control engineering theory is hard to grasp for undergraduates during the first semesters, as it deals with the dynamical behavior of systems also in combination with control strategies on an abstract level. Therefore, operational amplifier (OpAmp) processes are reasonable and very effective systems to connect mathematical description with actual system's behavior. In this paper, we present an experiment for a laboratory session in which an embedded system, driven by a LabVIEW human machine interface (HMI) via USB, controls the analog circuits.With this setup we want to show the possibility of firstly, analyzing a first order process and secondly, designing a P-and PI-controller. Thereby, the theory of control engineering is always applied to the empirical results in order to break down the abstract level for the students.}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @inproceedings{MaikeLenzWolf2014, author = {Maike, M{\"u}ller and Lenz, Laura and Wolf, Martin}, title = {Steigerung der Effektivit{\"a}t durch Prozessmodellierungs-Tools - {\"A}nderbarkeit und Transparenz von Prozessen am Beispiel der Business Simulation Apollo 13}, series = {Informatik 2014}, booktitle = {Informatik 2014}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Bonn}, isbn = {978-3-88579-626-8}, issn = {1617-5468}, pages = {357 -- 369}, year = {2014}, abstract = {Die Nutzung von Prozessmodellierungsmethoden oder - werkzeugen kann erheblichen Einfluss auf die Effektivit{\"a}t von Prozessen haben. Das gilt insbesondere f{\"u}r Situationen, in denen Personen unter Stress stehen oder unge{\"u}bt sind. In diesen F{\"a}llen geben Prozessmodelle konkrete Empfehlungen, nach denen sich die handelnden Personen richten k{\"o}nnten. In Experimenten mit der Business-Simulation Apollo 13 haben wir den Effekt eines Einsatzes von Prozessmodellierungsmethoden und -werkzeugen untersucht. Bereits bekannte Theorien (z.B. {\"u}ber geeignete Verh{\"a}ltnisse von Kommunikationsinhalten) konnten best{\"a}tigt werden. Dar{\"u}ber hinaus haben wir eine besondere Bedeutung der {\"U}bertragbarkeit von Prozessmodellen in konkrete Handlungen identifiziert.}, language = {de} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{DowidatKoenigWolf2017, author = {Dowidat, Linda and K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The motivational competence developing game framework}, series = {Mensch und Computer 2017 - Tagungsband}, booktitle = {Mensch und Computer 2017 - Tagungsband}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Regensburg}, doi = {10.18420/muc2017-mci-0130}, pages = {15 -- 26}, year = {2017}, abstract = {Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This 'motivational Competence Developing Game Framework' demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.}, language = {en} } @inproceedings{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {Cybersecurity awareness training provided by the competence developing game GHOST}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {81 -- 87}, year = {2018}, abstract = {This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game}, language = {en} } @inproceedings{NeesStengelMeisteretal.2020, author = {Nees, Franz and Stengel, Ingo and Meister, Vera G. and Barton, Thomas and Herrmann, Frank and M{\"u}ller, Christian and Wolf, Martin}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik / hrsg. von Franz Nees, Ingo Stengel, Vera G. Meister, Thomas Barton, Frank Herrmann, Christian M{\"u}ller, Martin R. Wolf}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-66-2}, doi = {10.15771/978-3-944330-66-2}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13840}, pages = {147 Seiten}, year = {2020}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen KI, Prozessorganisation und Plattformen f{\"u}r Gesch{\"a}ftsprozesse, Sicherheit und Datenschutz sowie Prototypen und Modelle.}, language = {de} } @inproceedings{WolfBartonHerrmannetal.2019, author = {Wolf, Martin and Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung vom 15.09.2019 bis 18.09.2019 an der Fachhochschule f{\"u}r Angewandte Wissenschaften Aachen / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, doi = {10.15771/978-3-944330-62-4}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13026}, pages = {261 Seiten}, year = {2019}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen Projektmanagement, Didaktik in der Wirtschaftsinformatik, IT-Sicherheit, Anwendungsf{\"a}lle, Reifegradmodelle, Plattformen f{\"u}r Gesch{\"a}ftsprozesse und Prototypen.}, language = {de} } @inproceedings{MollKoehlerWolf2019, author = {Moll, Florian and K{\"o}hler, Klemens and Wolf, Martin}, title = {Konzeption von IT-Sicherheitsl{\"o}sungen unter ethischen Gesichtspunkten am Beispiel einer Monitoring-App f{\"u}r mobile Endger{\"a}te}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {61 -- 72}, year = {2019}, abstract = {Die steigende Popularit{\"a}t von mobilen Endger{\"a}ten im privaten und gesch{\"a}ftlichen Umfeld geht mit einem Anstieg an Sicherheitsl{\"u}cken und somit potentiellen Angriffsfl{\"a}chen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes k{\"o}nnen Monitoring-Apps dienen, die unerw{\"u}nschtes Verhalten und Angriffe erkennen. Die automatisierte {\"U}berwachung von Endger{\"a}ten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilit{\"a}t der Nutzer und Nutzerinnen dieser Ger{\"a}te in Bezug auf Privatsph{\"a}re, kann zu einer geringen Akzeptanz und Compliance f{\"u}hren. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess f{\"u}hrt zu h{\"o}herer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt M{\"o}glichkeiten zur Umsetzung.}, language = {de} } @inproceedings{BeckerWolf2019, author = {Becker, Willi and Wolf, Martin}, title = {Entwicklung eines Einf{\"u}hrungskonzepts f{\"u}r IT-Service-Management in KMU}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {129 -- 137}, year = {2019}, abstract = {Obwohl es eine Vielzahl von Einf{\"u}hrungskonzepten f{\"u}r ITSM gibt, hat sich bisher keines dieser Konzepte auf breiter Linie durchgesetzt. Das gilt in erh{\"o}htem Maße f{\"u}r ITSM-Einf{\"u}hrungskonzepte f{\"u}r KMU, wohl nicht zuletzt aufgrund der Tatsache, dass der Mehrwert von ITSM f{\"u}r KMU aufgrund der geringeren Gr{\"o}ße der IT-Organisationen nur entsprechend schwieriger generiert werden kann. Mit diesem Beitrag wird ein Einf{\"u}hrungskonzept f{\"u}r ITSM in KMU systematisch hergeleitet. Daf{\"u}r wurden zun{\"a}chst die Treiber und Barrieren von ITSM untersucht, um daraus ein umfassendes Wirkmodell zu entwickeln. Da mit diesem Wirkungsmodell die Einflussfaktoren auf den Erfolg von ITSM in KMU deutlich werden, konnte auf dieser Basis ein Einf{\"u}hrungskonzept abgeleitet werden, welches insbesondere die positiven Effekte unterst{\"u}tzt bzw. verst{\"a}rkt.}, language = {de} } @inproceedings{BertschMeineckeWolfetal.2019, author = {Bertsch, Timo and Meinecke, Matthias and Wolf, Martin and Schmunk, Karina}, title = {Smart-Living-Services nur gegen Daten? Process-Mining als M{\"o}glichkeit zur Steigerung der Akzeptanz!}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {216 -- 226}, year = {2019}, abstract = {Seit Jahren etablieren sich Technologien in unserem Alltag, die mit Hilfe von smarten Komponenten neue Services und Vernetzungsm{\"o}glichkeiten schaffen. Dieses Paper beschreibt die Ergebnisse einer Studie, die die Akzeptanz von IoT-gest{\"u}tzten, smarten Services im privaten Umfeld untersucht. Dabei wird eine zentrale Datenverarbeitung mit automatisierter Erstellung smarter Services der dezentralen Datenverarbeitung mit manueller Serviceerstellung in sieben Kategorien gegen{\"u}bergestellt. Die Auswertung der Studie legt die Forschungsfrage nahe, ob das Nutzerverhalten im Kontext Smart Living nicht auch mit einem dezentralen L{\"o}sungsansatz, und somit unabh{\"a}ngig von großen Unternehmen, analysiert werden kann. Hierf{\"u}r wird im zweiten Teil des Papers die Anwendbarkeit von Process-Mining im Bereich Smart Living untersucht und prototypisch getestet.}, language = {de} } @inproceedings{KoenigKaiserWolf2019, author = {K{\"o}nig, Johannes Alexander and Kaiser, Steffen and Wolf, Martin}, title = {Entwicklung und Evaluierung eines Regeleditors f{\"u}r die grafische Erstellung von „Smart Living Environment"-Services}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {234 -- 243}, year = {2019}, abstract = {In diesem Paper wird die Entwicklung und Evaluation eines grafischen Regeleditors f{\"u}r das Erstellen von „Smart Living Environments"-Services vorgestellt. Daf{\"u}r werden zun{\"a}chst die Deduktion und Implementierung des grafischen Regeleditors erl{\"a}utert. Anschließend wird eine Probandenstudie vorgestellt, in welcher der Mehrwert bezogen auf die Aspekte Zeit, Fehleranf{\"a}lligkeit und Gebrauchstauglichkeit festgestellt wird.}, language = {de} } @inproceedings{WolfKoenig2017, author = {Wolf, Martin and K{\"o}nig, Johannes Alexander}, title = {Competence Developing Games - Ein {\"U}berblick}, series = {INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft f{\"u}r Informatik}, booktitle = {INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft f{\"u}r Informatik}, editor = {Eibl, Maximilian and Gaedke, Martin}, organization = {Gesellschaft f{\"u}r Informatik}, isbn = {978-3-88579-669-5}, doi = {10.18420/in2017_32}, pages = {385 -- 391}, year = {2017}, abstract = {Es existieren verschiedenste Arten von Spielen, die versuchen, die Motivation einer Spielsituation in einen ernsten Kontext zu {\"u}berf{\"u}hren. In diesem Artikel wird der {\"U}berbegriff „Competence Developing Games" definiert und anhand von Beispielen erl{\"a}utert. Daf{\"u}r werden Erkennungskriterien vorgestellt, entsprechende Spieltypen erl{\"a}utert und eine Zuordnung durch-gef{\"u}hrt.}, language = {de} } @inproceedings{WalterElsenMuelleretal.1999, author = {Walter, Peter and Elsen, Ingo and M{\"u}ller, Holger and Kraiss, Karl-Friedrich}, title = {3D object recognition with a specialized mixtures of experts architecture}, series = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, booktitle = {IJCNN'99. International Joint Conference on Neural Networks. Proceedings}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-5529-6}, issn = {1098-7576}, doi = {10.1109/IJCNN.1999.836243}, pages = {3563 -- 3568}, year = {1999}, abstract = {Aim of the AXON2 project (Adaptive Expert System for Object Recogniton using Neuml Networks) is the development of an object recognition system (ORS) capable of recognizing isolated 3d objects from arbitrary views. Commonly, classification is based on a single feature extracted from the original image. Here we present an architecture adapted from the Mixtures of Eaqerts algorithm which uses multiple neuml networks to integmte different features. During tmining each neural network specializes in a subset of objects or object views appropriate to the properties of the corresponding feature space. In recognition mode the system dynamically chooses the most relevant features and combines them with maximum eficiency. The remaining less relevant features arz not computed and do therefore not decelerate the-recognition process. Thus, the algorithm is well suited for ml-time applications.}, language = {en} } @inproceedings{Elsen1998, author = {Elsen, Ingo}, title = {A pixel based approach to view based object recognition with self-organizing neural networks}, series = {IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society}, booktitle = {IECON'98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-4503-7}, doi = {10.1109/IECON.1998.724032}, pages = {2040 -- 2044}, year = {1998}, abstract = {This paper addresses the pixel based classification of three dimensional objects from arbitrary views. To perform this task a coding strategy, inspired by the biological model of human vision, for pixel data is described. The coding strategy ensures that the input data is invariant against shift, scale and rotation of the object in the input domain. The image data is used as input to a class of self organizing neural networks, the Kohonen-maps or self-organizing feature maps (SOFM). To verify this approach two test sets have been generated: the first set, consisting of artificially generated images, is used to examine the classification properties of the SOFMs; the second test set examines the clustering capabilities of the SOFM when real world image data is applied to the network after it has been preprocessed to be invariant against shift, scale and rotation. It is shown that the clustering capability of the SOFM is strongly dependant on the invariance coding of the images.}, language = {en} } @inproceedings{ElsenKraissKrumbiegel1997, author = {Elsen, Ingo and Kraiss, Karl-Friedrich and Krumbiegel, Dirk}, title = {Pixel based 3D object recognition with bidirectional associative memories}, series = {International Conference on Neural Networks 1997}, booktitle = {International Conference on Neural Networks 1997}, publisher = {IEEE}, address = {New York}, isbn = {0-7803-4122-8}, pages = {1679 -- 1684}, year = {1997}, abstract = {This paper addresses the pixel based recognition of 3D objects with bidirectional associative memories. Computational power and memory requirements for this approach are identified and compared to the performance of current computer architectures by benchmarking different processors. It is shown, that the performance of special purpose hardware, like neurocomputers, is between one and two orders of magnitude higher than the performance of mainstream hardware. On the other hand, the calculation of small neural networks is performed more efficiently on mainstream processors. Based on these results a novel concept is developed, which is tailored for the efficient calculation of bidirectional associative memories. The computational efficiency is further enhanced by the application of algorithms and storage techniques which are matched to characteristics of the application at hand.}, language = {en} } @inproceedings{ChircuCzarneckiFriedmannetal.2023, author = {Chircu, Alina and Czarnecki, Christian and Friedmann, Daniel and Pomaskow, Johanna and Sultanow, Eldar}, title = {Towards a Digital Twin of Society}, series = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, booktitle = {Proceedings of the 56th Hawaii International Conference on System Sciences 2023}, publisher = {University of Hawai'i}, address = {Honolulu}, isbn = {978-0-9981331-6-4}, pages = {6748 -- 6757}, year = {2023}, abstract = {This paper describes the potential for developing a digital twin of society- a dynamic model that can be used to observe, analyze, and predict the evolution of various societal aspects. Such a digital twin can help governmental agencies and policy makers in interpreting trends, understanding challenges, and making decisions regarding investments or policies necessary to support societal development and ensure future prosperity. The paper reviews related work regarding the digital twin paradigm and its applications. The paper presents a motivating case study- an analysis of opportunities and challenges faced by the German federal employment agency, Bundesagentur f¨ur Arbeit (BA), proposes solutions using digital twins, and describes initial proofs of concept for such solutions.}, language = {en} } @inproceedings{AltherrConzenElsenetal.2023, author = {Altherr, Lena and Conzen, Max and Elsen, Ingo and Frauenrath, Tobias and Lyrmann, Andreas}, title = {Sensor retrofitting of existing buildings in an interdisciplinary teaching project at university level}, series = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, booktitle = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-01-6}, doi = {10.33968/2023.04}, pages = {31 -- 40}, year = {2023}, abstract = {Existing residential buildings have an average lifetime of 100 years. Many of these buildings will exist for at least another 50 years. To increase the efficiency of these buildings while keeping costs at reasonable rates, they can be retrofitted with sensors that deliver information to central control units for heating, ventilation and electricity. This retrofitting process should happen with minimal intervention into existing infrastructure and requires new approaches for sensor design and data transmission. At FH Aachen University of Applied Sciences, students of different disciplines work together to learn how to design, build, deploy and operate such sensors. The presented teaching project already created a low power design for a combined CO2, temperature and humidity measurement device that can be easily integrated into most home automation systems}, language = {en} }