@inproceedings{MuellerAltherrLeiseetal.2020, author = {M{\"u}ller, Tim M. and Altherr, Lena and Leise, Philipp and Pelz, Peter F.}, title = {Optimization of pumping systems for buildings: Experimental validation of different degrees of model detail on a modular test rig}, series = {Operations Research Proceedings 2019}, booktitle = {Operations Research Proceedings 2019}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-48438-5}, doi = {10.1007/978-3-030-48439-2_58}, pages = {481 -- 488}, year = {2020}, abstract = {Successful optimization requires an appropriate model of the system under consideration. When selecting a suitable level of detail, one has to consider solution quality as well as the computational and implementation effort. In this paper, we present a MINLP for a pumping system for the drinking water supply of high-rise buildings. We investigate the influence of the granularity of the underlying physical models on the solution quality. Therefore, we model the system with a varying level of detail regarding the friction losses, and conduct an experimental validation of our model on a modular test rig. Furthermore, we investigate the computational effort and show that it can be reduced by the integration of domain-specific knowledge.}, language = {en} } @inproceedings{AlhwarinFerreinScholl2018, author = {Alhwarin, Faraj and Ferrein, Alexander and Scholl, Ingrid}, title = {CRVM: Circular Random Variable-based Matcher - A Novel Hashing Method for Fast NN Search in High-dimensional Spaces}, series = {Proceedings of the 7th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2018}, booktitle = {Proceedings of the 7th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2018}, isbn = {978-989-758-276-9}, doi = {10.5220/0006692802140221}, pages = {214 -- 221}, year = {2018}, language = {en} } @inproceedings{AlhwarinSchifferFerreinetal.2018, author = {Alhwarin, Faraj and Schiffer, Stefan and Ferrein, Alexander and Scholl, Ingrid}, title = {Optimized KinectFusion Algorithm for 3D Scanning Applications}, series = {Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 2: BIOIMAGING}, booktitle = {Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 2: BIOIMAGING}, isbn = {978-989-758-278-3}, doi = {10.5220/0006594700500057}, pages = {50 -- 57}, year = {2018}, language = {en} } @inproceedings{HofmannMatareSchifferetal.2018, author = {Hofmann, Till and Matar{\´e}, Victor and Schiffer, Stefan and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Constraint-based online transformation of abstract plans into executable robot actions}, series = {Proceedings of the 2018 AAAI Spring Symposium on Integrating Representation, Reasoning, Learning, and Execution for Goal Directed Autonomy}, booktitle = {Proceedings of the 2018 AAAI Spring Symposium on Integrating Representation, Reasoning, Learning, and Execution for Goal Directed Autonomy}, pages = {549 -- 553}, year = {2018}, language = {en} } @inproceedings{FerreinSchifferKallweit2018, author = {Ferrein, Alexander and Schiffer, Stefan and Kallweit, Stephan}, title = {The ROSIN Education Concept - Fostering ROS Industrial-Related Robotics Education in Europe}, series = {ROBOT 2017: Third Iberian Robotics Conference}, booktitle = {ROBOT 2017: Third Iberian Robotics Conference}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-70836-2}, doi = {10.1007/978-3-319-70836-2_31}, pages = {370 -- 381}, year = {2018}, language = {en} } @inproceedings{HofmannMatareNeumannetal.2018, author = {Hofmann, Till and Matar{\´e}, Victor and Neumann, Tobias and Sch{\"o}nitz, Sebastian and Henke, Christoph and Limpert, Nicolas and Niemueller, Tim and Ferrein, Alexander and Jeschke, Sabina and Lakemeyer, Gerhard}, title = {Enhancing Software and Hardware Reliability for a Successful Participation in the RoboCup Logistics League 2017}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-00308-1}, doi = {10.1007/978-3-030-00308-1_40}, pages = {486 -- 497}, year = {2018}, language = {en} } @inproceedings{EssingholtMeyerKuhnetal.2018, author = {Essingholt, Felix and Meyer, Frederic and Kuhn, Peter and Schmidt, Philip and Benkner, Thorsten and Grabmaier, Anton}, title = {Non-invasive heart beat measurement using microwave resonators}, series = {Proceedings, Vol. 2, Eurosensors 2018 Conference, Graz, Austria, 9-12 September 2018}, booktitle = {Proceedings, Vol. 2, Eurosensors 2018 Conference, Graz, Austria, 9-12 September 2018}, publisher = {MDPI}, address = {Basel}, issn = {2504-3900}, doi = {10.3390/proceedings2131002}, pages = {1002}, year = {2018}, language = {en} } @inproceedings{HeuermannHarzheimMuehmel2021, author = {Heuermann, Holger and Harzheim, Thomas and M{\"u}hmel, Marc}, title = {A maritime harmonic radar search and rescue system using passive and active tags}, series = {2020 17th European Radar Conference (EuRAD)}, booktitle = {2020 17th European Radar Conference (EuRAD)}, publisher = {IEEE}, address = {New York, NY}, isbn = {978-2-87487-061-3}, doi = {10.1109/EuRAD48048.2021.00030}, pages = {73 -- 76}, year = {2021}, abstract = {This article introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested attached to life jackets and a rescue boat. This system was able to detect and range the active tags up to a range of 5800 m in tests on the Baltic Sea with an antenna input power of only 100 W. All electronic GHz components of the system, excluding the S-band power amplifier, were custom developed for this purpose. Special attention is given to the performance and conceptual differences between passive and active tags used in the system and integration with a maritime X-band navigation radar is demonstrated.}, language = {en} } @inproceedings{FerreinMeessenLimpertetal.2021, author = {Ferrein, Alexander and Meeßen, Marcus and Limpert, Nicolas and Schiffer, Stefan}, title = {Compiling ROS schooling curricula via contentual taxonomies}, series = {Robotics in Education}, booktitle = {Robotics in Education}, editor = {Lepuschitz, Wilfried}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-67411-3}, doi = {10.1007/978-3-030-67411-3_5}, pages = {49 -- 60}, year = {2021}, abstract = {The Robot Operating System (ROS) is the current de-facto standard in robot middlewares. The steadily increasing size of the user base results in a greater demand for training as well. User groups range from students in academia to industry professionals with a broad spectrum of developers in between. To deliver high quality training and education to any of these audiences, educators need to tailor individual curricula for any such training. In this paper, we present an approach to ease compiling curricula for ROS trainings based on a taxonomy of the teaching contents. The instructor can select a set of dedicated learning units and the system will automatically compile the teaching material based on the dependencies of the units selected and a set of parameters for a particular training. We walk through an example training to illustrate our work.}, language = {en} } @inproceedings{HoegenDonckerRuetters2020, author = {Hoegen, Anne von and Doncker, Rik W. De and R{\"u}tters, Ren{\´e}}, title = {Teaching Digital Control of Operational Amplifier Processes with a LabVIEW Interface and Embedded Hardware}, series = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, booktitle = {2020 23rd International Conference on Electrical Machines and Systems (ICEMS)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.23919/ICEMS50442.2020.9290928}, pages = {1117 -- 1122}, year = {2020}, abstract = {Control engineering theory is hard to grasp for undergraduates during the first semesters, as it deals with the dynamical behavior of systems also in combination with control strategies on an abstract level. Therefore, operational amplifier (OpAmp) processes are reasonable and very effective systems to connect mathematical description with actual system's behavior. In this paper, we present an experiment for a laboratory session in which an embedded system, driven by a LabVIEW human machine interface (HMI) via USB, controls the analog circuits.With this setup we want to show the possibility of firstly, analyzing a first order process and secondly, designing a P-and PI-controller. Thereby, the theory of control engineering is always applied to the empirical results in order to break down the abstract level for the students.}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @inproceedings{MaikeLenzWolf2014, author = {Maike, M{\"u}ller and Lenz, Laura and Wolf, Martin}, title = {Steigerung der Effektivit{\"a}t durch Prozessmodellierungs-Tools - {\"A}nderbarkeit und Transparenz von Prozessen am Beispiel der Business Simulation Apollo 13}, series = {Informatik 2014}, booktitle = {Informatik 2014}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Bonn}, isbn = {978-3-88579-626-8}, issn = {1617-5468}, pages = {357 -- 369}, year = {2014}, abstract = {Die Nutzung von Prozessmodellierungsmethoden oder - werkzeugen kann erheblichen Einfluss auf die Effektivit{\"a}t von Prozessen haben. Das gilt insbesondere f{\"u}r Situationen, in denen Personen unter Stress stehen oder unge{\"u}bt sind. In diesen F{\"a}llen geben Prozessmodelle konkrete Empfehlungen, nach denen sich die handelnden Personen richten k{\"o}nnten. In Experimenten mit der Business-Simulation Apollo 13 haben wir den Effekt eines Einsatzes von Prozessmodellierungsmethoden und -werkzeugen untersucht. Bereits bekannte Theorien (z.B. {\"u}ber geeignete Verh{\"a}ltnisse von Kommunikationsinhalten) konnten best{\"a}tigt werden. Dar{\"u}ber hinaus haben wir eine besondere Bedeutung der {\"U}bertragbarkeit von Prozessmodellen in konkrete Handlungen identifiziert.}, language = {de} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{DowidatKoenigWolf2017, author = {Dowidat, Linda and K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The motivational competence developing game framework}, series = {Mensch und Computer 2017 - Tagungsband}, booktitle = {Mensch und Computer 2017 - Tagungsband}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Regensburg}, doi = {10.18420/muc2017-mci-0130}, pages = {15 -- 26}, year = {2017}, abstract = {Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This 'motivational Competence Developing Game Framework' demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.}, language = {en} } @inproceedings{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {Cybersecurity awareness training provided by the competence developing game GHOST}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {81 -- 87}, year = {2018}, abstract = {This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game}, language = {en} } @inproceedings{NeesStengelMeisteretal.2020, author = {Nees, Franz and Stengel, Ingo and Meister, Vera G. and Barton, Thomas and Herrmann, Frank and M{\"u}ller, Christian and Wolf, Martin}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik / hrsg. von Franz Nees, Ingo Stengel, Vera G. Meister, Thomas Barton, Frank Herrmann, Christian M{\"u}ller, Martin R. Wolf}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-66-2}, doi = {10.15771/978-3-944330-66-2}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13840}, pages = {147 Seiten}, year = {2020}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen KI, Prozessorganisation und Plattformen f{\"u}r Gesch{\"a}ftsprozesse, Sicherheit und Datenschutz sowie Prototypen und Modelle.}, language = {de} } @inproceedings{WolfBartonHerrmannetal.2019, author = {Wolf, Martin and Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, title = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung vom 15.09.2019 bis 18.09.2019 an der Fachhochschule f{\"u}r Angewandte Wissenschaften Aachen / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, doi = {10.15771/978-3-944330-62-4}, url = {http://nbn-resolving.de/urn:nbn:de:kobv:526-opus4-13026}, pages = {261 Seiten}, year = {2019}, abstract = {Tagungsbeitr{\"a}ge aus den Bereichen Projektmanagement, Didaktik in der Wirtschaftsinformatik, IT-Sicherheit, Anwendungsf{\"a}lle, Reifegradmodelle, Plattformen f{\"u}r Gesch{\"a}ftsprozesse und Prototypen.}, language = {de} } @inproceedings{MollKoehlerWolf2019, author = {Moll, Florian and K{\"o}hler, Klemens and Wolf, Martin}, title = {Konzeption von IT-Sicherheitsl{\"o}sungen unter ethischen Gesichtspunkten am Beispiel einer Monitoring-App f{\"u}r mobile Endger{\"a}te}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {61 -- 72}, year = {2019}, abstract = {Die steigende Popularit{\"a}t von mobilen Endger{\"a}ten im privaten und gesch{\"a}ftlichen Umfeld geht mit einem Anstieg an Sicherheitsl{\"u}cken und somit potentiellen Angriffsfl{\"a}chen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes k{\"o}nnen Monitoring-Apps dienen, die unerw{\"u}nschtes Verhalten und Angriffe erkennen. Die automatisierte {\"U}berwachung von Endger{\"a}ten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilit{\"a}t der Nutzer und Nutzerinnen dieser Ger{\"a}te in Bezug auf Privatsph{\"a}re, kann zu einer geringen Akzeptanz und Compliance f{\"u}hren. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess f{\"u}hrt zu h{\"o}herer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt M{\"o}glichkeiten zur Umsetzung.}, language = {de} } @inproceedings{BeckerWolf2019, author = {Becker, Willi and Wolf, Martin}, title = {Entwicklung eines Einf{\"u}hrungskonzepts f{\"u}r IT-Service-Management in KMU}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian M{\"u}ller, Christian Seel}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-62-4}, pages = {129 -- 137}, year = {2019}, abstract = {Obwohl es eine Vielzahl von Einf{\"u}hrungskonzepten f{\"u}r ITSM gibt, hat sich bisher keines dieser Konzepte auf breiter Linie durchgesetzt. Das gilt in erh{\"o}htem Maße f{\"u}r ITSM-Einf{\"u}hrungskonzepte f{\"u}r KMU, wohl nicht zuletzt aufgrund der Tatsache, dass der Mehrwert von ITSM f{\"u}r KMU aufgrund der geringeren Gr{\"o}ße der IT-Organisationen nur entsprechend schwieriger generiert werden kann. Mit diesem Beitrag wird ein Einf{\"u}hrungskonzept f{\"u}r ITSM in KMU systematisch hergeleitet. Daf{\"u}r wurden zun{\"a}chst die Treiber und Barrieren von ITSM untersucht, um daraus ein umfassendes Wirkmodell zu entwickeln. Da mit diesem Wirkungsmodell die Einflussfaktoren auf den Erfolg von ITSM in KMU deutlich werden, konnte auf dieser Basis ein Einf{\"u}hrungskonzept abgeleitet werden, welches insbesondere die positiven Effekte unterst{\"u}tzt bzw. verst{\"a}rkt.}, language = {de} }