@incollection{LeiseAltherrPelz2018, author = {Leise, Philipp and Altherr, Lena and Pelz, Peter F.}, title = {Energy-Efficient design of a water supply system for skyscrapers by mixed-integer nonlinear programming}, series = {Operations Research Proceedings 2017}, booktitle = {Operations Research Proceedings 2017}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-89919-0}, doi = {10.1007/978-3-319-89920-6_63}, year = {2018}, abstract = {The energy-efficiency of technical systems can be improved by a systematic design approach. Technical Operations Research (TOR) employs methods known from Operations Research to find a global optimal layout and operation strategy of technical systems. We show the practical usage of this approach by the systematic design of a decentralized water supply system for skyscrapers. All possible network options and operation strategies are modeled by a Mixed-Integer Nonlinear Program. We present the optimal system found by our approach and highlight the energy savings compared to a conventional system design.}, language = {en} } @inproceedings{RauschFriesenAltherretal.2018, author = {Rausch, Lea and Friesen, John and Altherr, Lena and Pelz, Peter F.}, title = {Using mixed-integer programming for the optimal design of water supply networks for slums}, series = {Operations Research Proceedings 2017}, booktitle = {Operations Research Proceedings 2017}, editor = {Kliewer, Natalia and Ehmke, Jan Fabian and Bornd{\"o}rfer, Ralf}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-89919-0 (Print)}, doi = {10.1007/978-3-319-89920-6_68}, pages = {509 -- 516}, year = {2018}, abstract = {The UN sets the goal to ensure access to water and sanitation for all people by 2030. To address this goal, we present a multidisciplinary approach for designing water supply networks for slums in large cities by applying mathematical optimization. The problem is modeled as a mixed-integer linear problem (MILP) aiming to find a network describing the optimal supply infrastructure. To illustrate the approach, we apply it on a small slum cluster in Dhaka, Bangladesh.}, language = {en} } @inproceedings{RauschLeiseEdereretal.2016, author = {Rausch, Lea and Leise, Philipp and Ederer, Thorsten and Altherr, Lena and Pelz, Peter F.}, title = {A comparison of MILP and MINLP solver performance on the example of a drinking water supply system design problem}, series = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, booktitle = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, editor = {Papadrakakis, M. and Ppadopoulos, V. and Stefanou, G. and Plevris, V.}, isbn = {978-618-82844-0-1}, pages = {8509 -- 8527}, year = {2016}, abstract = {Finding a good system topology with more than a handful of components is a highly non-trivial task. The system needs to be able to fulfil all expected load cases, but at the same time the components should interact in an energy-efficient way. An example for a system design problem is the layout of the drinking water supply of a residential building. It may be reasonable to choose a design of spatially distributed pumps which are connected by pipes in at least two dimensions. This leads to a large variety of possible system topologies. To solve such problems in a reasonable time frame, the nonlinear technical characteristics must be modelled as simple as possible, while still achieving a sufficiently good representation of reality. The aim of this paper is to compare the speed and reliability of a selection of leading mathematical programming solvers on a set of varying model formulations. This gives us empirical evidence on what combinations of model formulations and solver packages are the means of choice with the current state of the art.}, language = {en} } @inproceedings{HueningWacheMagiera2021, author = {H{\"u}ning, Felix and Wache, Franz-Josef and Magiera, David}, title = {Redundant bus systems using dual-mode radio}, series = {Proceedings of Sixth International Congress on Information and Communication Technology}, booktitle = {Proceedings of Sixth International Congress on Information and Communication Technology}, publisher = {Springer}, address = {Singapore}, isbn = {978-981-16-2379-0}, doi = {10.1007/978-981-16-2380-6_73}, pages = {835 -- 842}, year = {2021}, abstract = {Communication via serial bus systems, like CAN, plays an important role for all kinds of embedded electronic and mechatronic systems. To cope up with the requirements for functional safety of safety-critical applications, there is a need to enhance the safety features of the communication systems. One measure to achieve a more robust communication is to add redundant data transmission path to the applications. In general, the communication of real-time embedded systems like automotive applications is tethered, and the redundant data transmission lines are also tethered, increasing the size of the wiring harness and the weight of the system. A radio link is preferred as a redundant transmission line as it uses a complementary transmission medium compared to the wired solution and in addition reduces wiring harness size and weight. Standard wireless links like Wi-Fi or Bluetooth cannot meet the requirements for real-time capability with regard to bus communication. Using the new dual-mode radio enables a redundant transmission line meeting all requirements with regard to real-time capability, robustness and transparency for the data bus. In addition, it provides a complementary transmission medium with regard to commonly used tethered links. A CAN bus system is used to demonstrate the redundant data transfer via tethered and wireless CAN.}, language = {en} } @article{Wolf2000, author = {Wolf, Martin}, title = {Groupware related task design}, series = {ACM SIGGROUP Bulletin}, volume = {21}, journal = {ACM SIGGROUP Bulletin}, number = {2}, issn = {2372-7403}, doi = {10.1145/605660.605662}, pages = {5 -- 8}, year = {2000}, abstract = {his report summarizes the results of a workshop on Groupware related task design which took place at the International Conference on Supporting Group Work Group'99, Arizona, from 14 th to 17 th November 1999. The workshop was addressed to people from different viewpoints, backgrounds, and domains: - Researchers dealing with questions of task analysis and task modeling for Groupware application from an academic point of view. They may contribute modelbased design approaches or theoretically oriented work - Practitioners with experience in the design and everyday use of groupware systems. They might refer to the practical side of the topic: "real" tasks, "real" problems, "real" users, etc.}, language = {en} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{DowidatKoenigWolf2017, author = {Dowidat, Linda and K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {The motivational competence developing game framework}, series = {Mensch und Computer 2017 - Tagungsband}, booktitle = {Mensch und Computer 2017 - Tagungsband}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Regensburg}, doi = {10.18420/muc2017-mci-0130}, pages = {15 -- 26}, year = {2017}, abstract = {Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This 'motivational Competence Developing Game Framework' demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.}, language = {en} } @inproceedings{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {Cybersecurity awareness training provided by the competence developing game GHOST}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {81 -- 87}, year = {2018}, abstract = {This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game}, language = {en} } @article{HeuermannEmmrichBongartz2022, author = {Heuermann, Holger and Emmrich, Thomas and Bongartz, Simon}, title = {Microwave spark plug to support ignitions with high compression ratios}, series = {IEEE Transactions on Plasma Science}, journal = {IEEE Transactions on Plasma Science}, number = {Early Access}, publisher = {IEEE}, issn = {1939-9375}, doi = {10.1109/TPS.2022.3183690}, pages = {1 -- 6}, year = {2022}, abstract = {Upcoming gasoline engines should run with a larger number of fuels beginning from petrol over methanol up to gas by a wide range of compression ratios and a homogeneous charge. In this article, the microwave (MW) spark plug, based on a high-speed frequency hopping system, is introduced as a solution, which can support a nitrogen compression ratio up to 1:39 in a chamber and more. First, an overview of the high-speed frequency hopping MW ignition and operation system as well as the large number of applications are presented. Both gives an understanding of this new base technology for MW plasma generation. Focus of the theoretical part is the explanation of the internal construction of the spark plug, on the achievable of the high voltage generation as well as the high efficiency to hold the plasma. In detail, the development process starting with circuit simulations and ending with the numerical multiphysics field simulations is described. The concept is evaluated with a reference prototype covering the frequency range between 2.40 and 2.48 GHz and working over a large power range from 20 to 200 W. A larger number of different measurements starting by vector hot-S11 measurements and ending by combined working scenarios out of hot temperature, high pressure and charge motion are winding up the article. The limits for the successful pressure tests were given by the pressure chamber. Pressures ranged from 1 to 39 bar and charge motion up to 25 m/s as well as temperatures from 30◦ to 125◦.}, language = {en} } @inproceedings{OstkottePetersHueningetal.2022, author = {Ostkotte, Sebastian and Peters, Constantin and H{\"u}ning, Felix and Bragard, Michael}, title = {Design, implementation and verification of an rotational incremental position encoder based on the magnetic Wiegand effect}, series = {2022 ELEKTRO (ELEKTRO)}, booktitle = {2022 ELEKTRO (ELEKTRO)}, publisher = {IEEE}, isbn = {978-1-6654-6726-1}, issn = {2691-0616}, doi = {10.1109/ELEKTRO53996.2022.9803477}, pages = {6 Seiten}, year = {2022}, abstract = {This paper covers the use of the magnetic Wiegand effect to design an innovative incremental encoder. First, a theoretical design is given, followed by an estimation of the achievable accuracy and an optimization in open-loop operation. Finally, a successful experimental verification is presented. For this purpose, a permanent magnet synchronous machine is controlled in a field-oriented manner, using the angle information of the prototype.}, language = {en} } @inproceedings{SchubaHoefkenLinzbach2022, author = {Schuba, Marko and H{\"o}fken, Hans-Wilhelm and Linzbach, Sophie}, title = {An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants}, series = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, booktitle = {2021 International Conference on Electrical, Computer and Energy Technologies (ICECET)}, publisher = {IEEE}, isbn = {978-1-6654-4231-2}, doi = {10.1109/ICECET52533.2021.9698746}, pages = {6 Seiten}, year = {2022}, abstract = {Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @inproceedings{AllalBannisterBuismanetal.2022, author = {Allal, D. and Bannister, R. and Buisman, K. and Capriglione, D. and Di Capua, G. and Garc{\´i}a-Patr{\´o}n, M. and Gatzweiler, Thomas and Gellersen, F. and Harzheim, Thomas and Heuermann, Holger and Hoffmann, J. and Izbrodin, A. and Kuhlmann, K. and Lahbacha, K. and Maffucci, A. and Miele, G. and Mubarak, F. and Salter, M. and Pham, T.D. and Sayegh, A. and Singh, D. and Stein, F. and Zeier, M.}, title = {RF measurements for future communication applications: an overview}, series = {2022 IEEE International Symposium on Measurements \& Networking (M\&N)}, booktitle = {2022 IEEE International Symposium on Measurements \& Networking (M\&N)}, publisher = {IEEE}, isbn = {978-1-6654-8362-9}, issn = {2639-5061}, doi = {10.1109/MN55117.2022.9887740}, pages = {1 -- 6}, year = {2022}, abstract = {In this paper research activities developed within the FutureCom project are presented. The project, funded by the European Metrology Programme for Innovation and Research (EMPIR), aims at evaluating and characterizing: (i) active devices, (ii) signal- and power integrity of field programmable gate array (FPGA) circuits, (iii) operational performance of electronic circuits in real-world and harsh environments (e.g. below and above ambient temperatures and at different levels of humidity), (iv) passive inter-modulation (PIM) in communication systems considering different values of temperature and humidity corresponding to the typical operating conditions that we can experience in real-world scenarios. An overview of the FutureCom project is provided here, then the research activities are described.}, language = {en} } @inproceedings{ZaehlBiewendtWolfetal.2022, author = {Z{\"a}hl, Philipp M. and Biewendt, Marcel and Wolf, Martin and Eggert, Mathias}, title = {Requirements for Competence Developing Games in the Environment of SE Competence Development}, series = {Angewandte Forschung in der Wirtschaftsinformatik 2022}, booktitle = {Angewandte Forschung in der Wirtschaftsinformatik 2022}, publisher = {GITO}, address = {Berlin}, isbn = {978-3-95545-409-8}, doi = {10.30844/AKWI_2022_05}, pages = {73 -- 88}, year = {2022}, abstract = {Many of today's factors make software development more and more complex, such as time pressure, new technologies, IT security risks, et cetera. Thus, a good preparation of current as well as future software developers in terms of a good software engineering education becomes progressively important. As current research shows, Competence Developing Games (CDGs) and Serious Games can offer a potential solution. This paper identifies the necessary requirements for CDGs to be conducive in principle, but especially in software engineering (SE) education. For this purpose, the current state of research was summarized in the context of a literature review. Afterwards, some of the identified requirements as well as some additional requirements were evaluated by a survey in terms of subjective relevance.}, language = {en} } @article{WiegnerVolkerMainzetal.2023, author = {Wiegner, Jonas and Volker, Hanno and Mainz, Fabian and Backes, Andreas and Loeken, Michael and H{\"u}ning, Felix}, title = {Energy analysis of a wireless sensor node powered by a Wiegand sensor}, series = {Journal of Sensors and Sensor Systems (JSSS)}, volume = {12}, journal = {Journal of Sensors and Sensor Systems (JSSS)}, number = {1}, publisher = {Copernicus Publ.}, address = {G{\"o}ttingen}, issn = {2194-878X}, doi = {10.5194/jsss-12-85-2023}, pages = {85 -- 92}, year = {2023}, abstract = {This article describes an Internet of things (IoT) sensing device with a wireless interface which is powered by the energy-harvesting method of the Wiegand effect. The Wiegand effect, in contrast to continuous sources like photovoltaic or thermal harvesters, provides small amounts of energy discontinuously in pulsed mode. To enable an energy-self-sufficient operation of the sensing device with this pulsed energy source, the output energy of the Wiegand generator is maximized. This energy is used to power up the system and to acquire and process data like position, temperature or other resistively measurable quantities as well as transmit these data via an ultra-low-power ultra-wideband (UWB) data transmitter. A proof-of-concept system was built to prove the feasibility of the approach. The energy consumption of the system during start-up was analysed, traced back in detail to the individual components, compared to the generated energy and processed to identify further optimization options. Based on the proof of concept, an application prototype was developed.}, language = {en} } @misc{WiegnerVolkerMainzetal.2022, author = {Wiegner, J. and Volker, H. and Mainz, F. and Backes, A. and L{\"o}ken, M. and H{\"u}ning, Felix}, title = {Wiegand-Effect-Powered Wireless IT Sensor Node}, year = {2022}, abstract = {With the growing interest in small distributed sensors for the "Internet of Things", more attention is being paid to energy harvesting techologies. Reducing or eliminating the need for external power sources or batteries make devices more self-sufficient, more reliable, and reduces maintenance requirements. The Wiegand effect is a proven technology for harvesting small amounts of electrical power from mechanical motion.}, language = {en} } @inproceedings{GrundAltherr2023, author = {Grund, Raphael M. and Altherr, Lena}, title = {Development of an open source energy disaggregation tool for the home automation platform Home Assistant}, series = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, booktitle = {Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-01-6}, doi = {10.33968/2023.02}, pages = {11 -- 20}, year = {2023}, abstract = {In order to reduce energy consumption of homes, it is important to make transparent which devices consume how much energy. However, power consumption is often only monitored aggregated at the house energy meter. Disaggregating this power consumption into the contributions of individual devices can be achieved using Machine Learning. Our work aims at making state of the art disaggregation algorithms accessibe for users of the open source home automation platform Home Assistant.}, language = {en} } @inproceedings{WittigRuettersBragard2024, author = {Wittig, M. and R{\"u}tters, Ren{\´e} and Bragard, Michael}, title = {Application of RL in control systems using the example of a rotatory inverted pendulum}, series = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, booktitle = {Tagungsband AALE 2024 : Fit f{\"u}r die Zukunft: praktische L{\"o}sungen f{\"u}r die industrielle Automation}, editor = {Reiff-Stephan, J{\"o}rg and J{\"a}kel, Jens and Schwarz, Andr{\´e}}, publisher = {le-tex publishing services GmbH}, address = {Leipzig}, isbn = {978-3-910103-02-3}, doi = {10.33968/2024.53}, pages = {241 -- 248}, year = {2024}, abstract = {In this paper, the use of reinforcement learning (RL) in control systems is investigated using a rotatory inverted pendulum as an example. The control behavior of an RL controller is compared to that of traditional LQR and MPC controllers. This is done by evaluating their behavior under optimal conditions, their disturbance behavior, their robustness and their development process. All the investigated controllers are developed using MATLAB and the Simulink simulation environment and later deployed to a real pendulum model powered by a Raspberry Pi. The RL algorithm used is Proximal Policy Optimization (PPO). The LQR controller exhibits an easy development process, an average to good control behavior and average to good robustness. A linear MPC controller could show excellent results under optimal operating conditions. However, when subjected to disturbances or deviations from the equilibrium point, it showed poor performance and sometimes instable behavior. Employing a nonlinear MPC Controller in real time was not possible due to the high computational effort involved. The RL controller exhibits by far the most versatile and robust control behavior. When operated in the simulation environment, it achieved a high control accuracy. When employed in the real system, however, it only shows average accuracy and a significantly greater performance loss compared to the simulation than the traditional controllers. With MATLAB, it is not yet possible to directly post-train the RL controller on the Raspberry Pi, which is an obstacle to the practical application of RL in a prototyping or teaching setting. Nevertheless, RL in general proves to be a flexible and powerful control method, which is well suited for complex or nonlinear systems where traditional controllers struggle.}, language = {en} } @article{FaganBitzBjoerkmanBurtscheretal.2021, author = {Fagan, Andrew J. and Bitz, Andreas and Bj{\"o}rkman-Burtscher, Isabella M. and Collins, Christopher M. and Kimbrell, Vera and Raaijmakers, Alexander J. E.}, title = {7T MR Safety}, series = {Journal of Magnetic Resonance Imaging (JMRI)}, volume = {53}, journal = {Journal of Magnetic Resonance Imaging (JMRI)}, number = {2}, publisher = {Wiley}, address = {Weinheim}, issn = {1522-2586}, doi = {10.1002/jmri.27319}, pages = {333 -- 346}, year = {2021}, language = {en} } @article{FiedlerLaddClemensetal.2020, author = {Fiedler, Thomas M. and Ladd, Mark E. and Clemens, Markus and Bitz, Andreas}, title = {Safety of subjects during radiofrequency exposure in ultra-high-field magnetic resonance imaging}, series = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, volume = {2}, journal = {IEEE Letters on Electromagnetic Compatibility Practice and Applications}, number = {3}, publisher = {IEEE}, address = {New York, NY}, isbn = {2637-6423}, doi = {10.1109/LEMCPA.2020.3029747}, pages = {1 -- 8}, year = {2020}, abstract = {Magnetic resonance imaging (MRI) is one of the most important medical imaging techniques. Since the introduction of MRI in the mid-1980s, there has been a continuous trend toward higher static magnetic fields to obtain i.a. a higher signal-to-noise ratio. The step toward ultra-high-field (UHF) MRI at 7 Tesla and higher, however, creates several challenges regarding the homogeneity of the spin excitation RF transmit field and the RF exposure of the subject. In UHF MRI systems, the wavelength of the RF field is in the range of the diameter of the human body, which can result in inhomogeneous spin excitation and local SAR hotspots. To optimize the homogeneity in a region of interest, UHF MRI systems use parallel transmit systems with multiple transmit antennas and time-dependent modulation of the RF signal in the individual transmit channels. Furthermore, SAR increases with increasing field strength, while the SAR limits remain unchanged. Two different approaches to generate the RF transmit field in UHF systems using antenna arrays close and remote to the body are investigated in this letter. Achievable imaging performance is evaluated compared to typical clinical RF transmit systems at lower field strength. The evaluation has been performed under consideration of RF exposure based on local SAR and tissue temperature. Furthermore, results for thermal dose as an alternative RF exposure metric are presented.}, language = {en} }