@inproceedings{HofmannMatareSchifferetal.2018, author = {Hofmann, Till and Matar{\´e}, Victor and Schiffer, Stefan and Ferrein, Alexander and Lakemeyer, Gerhard}, title = {Constraint-based online transformation of abstract plans into executable robot actions}, series = {Proceedings of the 2018 AAAI Spring Symposium on Integrating Representation, Reasoning, Learning, and Execution for Goal Directed Autonomy}, booktitle = {Proceedings of the 2018 AAAI Spring Symposium on Integrating Representation, Reasoning, Learning, and Execution for Goal Directed Autonomy}, pages = {549 -- 553}, year = {2018}, language = {en} } @inproceedings{FerreinSchifferKallweit2018, author = {Ferrein, Alexander and Schiffer, Stefan and Kallweit, Stephan}, title = {The ROSIN Education Concept - Fostering ROS Industrial-Related Robotics Education in Europe}, series = {ROBOT 2017: Third Iberian Robotics Conference}, booktitle = {ROBOT 2017: Third Iberian Robotics Conference}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-70836-2}, doi = {10.1007/978-3-319-70836-2_31}, pages = {370 -- 381}, year = {2018}, language = {en} } @inproceedings{HofmannMatareNeumannetal.2018, author = {Hofmann, Till and Matar{\´e}, Victor and Neumann, Tobias and Sch{\"o}nitz, Sebastian and Henke, Christoph and Limpert, Nicolas and Niemueller, Tim and Ferrein, Alexander and Jeschke, Sabina and Lakemeyer, Gerhard}, title = {Enhancing Software and Hardware Reliability for a Successful Participation in the RoboCup Logistics League 2017}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-00308-1}, doi = {10.1007/978-3-030-00308-1_40}, pages = {486 -- 497}, year = {2018}, language = {en} } @inproceedings{EssingholtMeyerKuhnetal.2018, author = {Essingholt, Felix and Meyer, Frederic and Kuhn, Peter and Schmidt, Philip and Benkner, Thorsten and Grabmaier, Anton}, title = {Non-invasive heart beat measurement using microwave resonators}, series = {Proceedings, Vol. 2, Eurosensors 2018 Conference, Graz, Austria, 9-12 September 2018}, booktitle = {Proceedings, Vol. 2, Eurosensors 2018 Conference, Graz, Austria, 9-12 September 2018}, publisher = {MDPI}, address = {Basel}, issn = {2504-3900}, doi = {10.3390/proceedings2131002}, pages = {1002}, year = {2018}, language = {en} } @inproceedings{ChristianMontagSchubaetal.2018, author = {Christian, Esser and Montag, Tim and Schuba, Marko and Allhof, Manuel}, title = {Future critical infrastructure and security - cyberattacks on charging stations}, series = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, booktitle = {31st International Electric Vehicle Symposium \& Exhibition and International Electric Vehicle Technology Conference (EVS31 \& EVTeC 2018)}, publisher = {Society of Automotive Engineers of Japan (JSAE)}, address = {Tokyo}, isbn = {978-1-5108-9157-9}, pages = {665 -- 671}, year = {2018}, language = {en} } @inproceedings{KoenigVoelkerWolf2018, author = {K{\"o}nig, Johannes Alexander and V{\"o}lker, Veronika and Wolf, Martin}, title = {The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game's story}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {98 -- 106}, year = {2018}, abstract = {During the development of a Competence Developing Game's (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG's target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories.}, language = {en} } @inproceedings{KoenigWolf2018, author = {K{\"o}nig, Johannes Alexander and Wolf, Martin}, title = {Cybersecurity awareness training provided by the competence developing game GHOST}, series = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, booktitle = {ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions}, isbn = {978-1-61208-616-3}, pages = {81 -- 87}, year = {2018}, abstract = {This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game}, language = {en} } @inproceedings{SchoppHeuermannMarso2017, author = {Schopp, Christoph and Heuermann, Holger and Marso, Michel}, title = {Multiphysical Study of an Atmospheric Microwave Argon Plasma Jet}, series = {IEEE Transactions on Plasma Science}, volume = {45}, booktitle = {IEEE Transactions on Plasma Science}, number = {6}, publisher = {IEEE}, issn = {1939-9375}, doi = {10.1109/TPS.2017.2692735}, pages = {932 -- 937}, year = {2017}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{AltherrPelzEdereretal.2017, author = {Altherr, Lena and Pelz, Peter F. and Ederer, Thorsten and Pfetsch, Marc E.}, title = {Optimale Getriebe auf Knopfdruck: Gemischt-ganzzahlige nichtlineare Optimierung zur Entscheidungsunterst{\"u}tzung bei der Auslegung von Getrieben f{\"u}r Kraftfahrzeuge}, series = {Antriebstechnisches Kolloquium ATK 2017}, booktitle = {Antriebstechnisches Kolloquium ATK 2017}, editor = {Jacobs, Georg}, isbn = {9783743148970}, pages = {313 -- 325}, year = {2017}, language = {de} } @inproceedings{AltherrEdererSchaenzleetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Sch{\"a}nzle, Christian and Lorenz, Ulf and Pelz, Peter F.}, title = {Algorithmic system design using scaling and affinity laws}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1}, pages = {605 -- 611}, year = {2017}, abstract = {Energy-efficient components do not automatically lead to energy-efficient systems. Technical Operations Research (TOR) shifts the focus from the single component to the system as a whole and finds its optimal topology and operating strategy simultaneously. In previous works, we provided a preselected construction kit of suitable components for the algorithm. This approach may give rise to a combinatorial explosion if the preselection cannot be cut down to a reasonable number by human intuition. To reduce the number of discrete decisions, we integrate laws derived from similarity theory into the optimization model. Since the physical characteristics of a production series are similar, it can be described by affinity and scaling laws. Making use of these laws, our construction kit can be modeled more efficiently: Instead of a preselection of components, it now encompasses whole model ranges. This allows us to significantly increase the number of possible set-ups in our model. In this paper, we present how to embed this new formulation into a mixed-integer program and assess the run time via benchmarks. We present our approach on the example of a ventilation system design problem.}, language = {en} } @inproceedings{AltherrEdererFarnetaneetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Farnetane, Lucas S. and P{\"o}ttgen, Philipp and Verg{\´e}, Angela and Pelz, Peter F.}, title = {Multicriterial design of a hydrostatic transmission system via mixed-integer programming}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1_41}, pages = {301 -- 307}, year = {2017}, abstract = {In times of planned obsolescence the demand for sustainability keeps growing. Ideally, a technical system is highly reliable, without failures and down times due to fast wear of single components. At the same time, maintenance should preferably be limited to pre-defined time intervals. Dispersion of load between multiple components can increase a system's reliability and thus its availability inbetween maintenance points. However, this also results in higher investment costs and additional efforts due to higher complexity. Given a specific load profile and resulting wear of components, it is often unclear which system structure is the optimal one. Technical Operations Research (TOR) finds an optimal structure balancing availability and effort. We present our approach by designing a hydrostatic transmission system.}, language = {en} } @inproceedings{SchnejiderWisselinkCzarnecki2017, author = {Schnejider, Dominik and Wisselink, Frank and Czarnecki, Christian}, title = {Transformation von Wertsch{\"o}pfungsketten durch das Internet der Dinge - Bewertungsrahmen und Fallstudie}, series = {GI Edition Proceedings Band 275 INFORMATIK 2017}, booktitle = {GI Edition Proceedings Band 275 INFORMATIK 2017}, editor = {Eibl, Maximilian and Gaedke, Martin and Gesellschaft f{\"u}r Informatik e. V. (GI),}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {978-3-88579-669-5}, issn = {1617-5468}, doi = {10.18420/in2017_208}, pages = {2081 -- 2094}, year = {2017}, abstract = {Momentan finden in vielen Branchen umfassende Ver{\"a}nderungen von M{\"a}rkten und Wertsch{\"o}pfungsketten statt, welche auch als Digitale Transformation bezeichnet werden. In diesem Zusammenhang wird das Internet der Dinge (Internet of Things, IoT) als ein wichtiger technischer Enabler der Ver{\"a}nderungen angesehen. Prim{\"a}re Ziele des IoT sind die Steuerung physischer Gegen-st{\"a}nde aus der Distanz und das Erfassen von Informationen aus dem Umfeld dieser Gegenst{\"a}nde. Welche neuen Gesch{\"a}fts-bzw. Partnermodelle entstehen durch die gemeinsame Nutzung von IoT-Daten und Big-Data-Technologien und welcher qualitative Mehrwert wird dadurch geschaffen? Als Antwort wird in diesem Beitrag ein Bewertungsrahmen zur qualitativen Wertsch{\"o}pfungsanalyse von IoT vorgeschlagen. Anhand dieses Bewertungsrahmens wird ein Anwendungsfall untersucht, der in anonymisierter Form an konkrete Praxisprojekte angelehnt ist. Konkret wird ein Anwendungsfall betrachtet, der eine Abfallwirtschaft 2.0 basierend auf dem Einsatz von IoT vorschl{\"a}gt. Aus den Untersuchungsergebnissen gehen beispielsweise Erkenntnisse hervor, wie Gesch{\"a}ftsmodelle auf Basis eines unentgeltlichen Informationsaustauschs durch IoT gestaltet werden k{\"o}nnen.}, language = {de} } @inproceedings{ThomeCzarneckiAuthetal.2017, author = {Thom{\´e}, Tristan Eberhard and Czarnecki, Christian and Auth, Gunnar and Bensberg, Frank}, title = {Erweiterung des Referenzprozessmodells eTOM um die Anforderungen des deutschen IT-Sicherheitsgesetzes}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, editor = {Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {51 -- 60}, year = {2017}, abstract = {Kritische Infrastrukturen sind prim{\"a}re Ziele krimineller Hacker. Der Deutsche Bundestag reagierte darauf am 25. Juli 2015 mit einem Gesetz zur Verbesserung der Sicherheit von ITSystemen, dem IT-Sicherheitsgesetz. Dies verlangt von Betreibern kritischer Infrastrukturen, angemessene Mindeststandards f{\"u}r organisatorische und technische Sicherheit zu implementieren, um den Betrieb und die Verf{\"u}gbarkeit dieser Infrastruktur zu gew{\"a}hrleisten. Telekommunikationsunternehmen sind einerseits von diesem Gesetz in besonderem Maße betroffen und verf{\"u}gen andererseits mit dem Rahmenwerk enhanced Telecom Operations Map (eTOM) {\"u}ber ein international anerkanntes Referenzmodell zur Gestaltung von Gesch{\"a}ftsprozessen in dieser Branche. Da s{\"a}mtliche Telekommunikationsunternehmen in Deutschland verpflichtet sind, das Gesetz innerhalb eines bestimmten Zeitrahmens zu implementieren, pr{\"a}sentiert dieser Beitrag einen Vorschlag zur Erweiterung von eTOM um die relevanten Anforderungen des deutschen IT-Sicherheitsgesetzes.}, language = {de} } @inproceedings{SchneiderWisselinkCzarnecki2017, author = {Schneider, Dominik and Wisselink, Frank and Czarnecki, Christian}, title = {Qualitative Wertsch{\"o}pfungsanalyse von Anwendungsf{\"a}llen des Narrowband Internet of Things}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, editor = {Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {184 -- 193}, year = {2017}, abstract = {Prim{\"a}re Ziele des Internets der Dinge sind die Steuerung physischer Gegenst{\"a}nde aus der Distanz und das Erfassen von Informationen aus dem Umfeld dieser Gegenst{\"a}nde. Dazu werden Hardwarekomponenten in Gegenst{\"a}nde des t{\"a}glichen Lebens und die Umwelt integriert. Mithilfe von Informations- und Kommunikationstechnologien entsteht hieraus das Internet der Dinge (Internet of Things, IoT). Vor einem Jahr wurde mit Narrowband Internet of Things (NB-IoT) eine Technologie die es erm{\"o}glicht, Hardwarekomponenten energieeffizient und unmittelbar {\"u}ber das Mobilfunknetz zu vernetzen. Gegenst{\"a}nde werden dadurch {\"u}ber große Reichweiten eigenst{\"a}ndig kommunikationsf{\"a}hig. Das IoT steht mit NB-IoT vor einem gestiegenen Nutzenpotenzial, da eine zunehmende Anzahl miteinander verbundener Gegenst{\"a}nde und der Austausch gr{\"o}ßerer Datenmengen realisierbar sind. Damit sind aus wirtschaftlicher Sicht neue, innovative Anwendungsf{\"a}lle des IoT m{\"o}glich, die auch bereits in der Praxis diskutiert werden. In diesem Beitrag wird anhand eines konkreten Anwendungsfalls untersucht, welche neuen Gesch{\"a}fts- bzw. Partnermodelle durch die gemeinsame Nutzung von NB-IoT-Daten und Big Data-Technologien entstehen und welcher qualitative Mehrwert f{\"u}r die an einem Anwendungsfall beteiligten Stakeholder geschaffen wird. Dazu wird - einem konstruktionsorientierten Forschungsansatz folgend - ein Bewertungsrahmen zur qualitativen Wertsch{\"o}pfungsanalyse von NB-IoT entwickelt, der u.a. auf der Schablone nach Cockburn und dem Business Model Canvas basiert. Anhand dieses Bewertungsrahmens wird ein Anwendungsfall untersucht, der in anonymisierter Form an konkrete Praxisprojekte angelehnt ist. Konkret wird ein Anwendungsfall betrachtet, der einen Fahrradverleih 2.0 basierend auf dem Einsatz von NB-IoT vorschl{\"a}gt. Aus den Untersuchungsergebnissen gehen beispielsweise Erkenntnisse hervor, wie Gesch{\"a}ftsmodelle auf}, language = {de} } @inproceedings{CzarneckiDietze2017, author = {Czarnecki, Christian and Dietze, Christian}, title = {Domain-Specific reference modeling in the telecommunications industry}, series = {DESRIST 2017: Designing the Digital Transformation}, booktitle = {DESRIST 2017: Designing the Digital Transformation}, editor = {Maedche, Alexander and vom Brocke, Jan and Hevner, Alan}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-59144-5}, doi = {10.1007/978-3-319-59144-5_19}, pages = {313 -- 329}, year = {2017}, abstract = {The telecommunications industry is currently going through a major transformation. In this context, the enhanced Telecom Operations Map (eTOM) is a domain-specific process reference model that is offered by the industry organization TM Forum. In practice, eTOM is well accepted and confirmed as de facto standard. It provides process definitions and process flows on different levels of detail. This article discusses the reference modeling of eTOM, i.e., the design, the resulting artifact, and its evaluation based on three project cases. The application of eTOM in three projects illustrates the design approach and concrete models on strategic and operational levels. The article follows the Design Science Research (DSR) paradigm. It contributes with concrete design artifacts to the transformational needs of the telecommunications industry and offers lessons-learned from a general DSR perspective.}, language = {en} } @inproceedings{StopforthDavrajhFerrein2017, author = {Stopforth, Riaan and Davrajh, Shaniel and Ferrein, Alexander}, title = {South African robotics entity for a collaboration initiative}, series = {Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2016}, booktitle = {Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2016}, publisher = {IEEE}, isbn = {978-1-5090-3335-5}, doi = {10.1109/RoboMech.2016.7813144}, pages = {1 -- 6}, year = {2017}, language = {en} } @inproceedings{WalentaSchellekensFerreinetal.2017, author = {Walenta, Robert and Schellekens, Twan and Ferrein, Alexander and Schiffer, Stefan}, title = {A decentralised system approach for controlling AGVs with ROS}, series = {AFRICON, Proceedings}, booktitle = {AFRICON, Proceedings}, publisher = {IEEE}, isbn = {978-1-5386-2775-4}, issn = {2153-0033}, doi = {10.1109/AFRCON.2017.8095693}, pages = {1436 -- 1441}, year = {2017}, language = {en} } @inproceedings{NiemuellerNeumannHenkeetal.2017, author = {Niemueller, Tim and Neumann, Tobias and Henke, Christoph and Sch{\"o}nitz, Sebastian and Reuter, Sebastian and Ferrein, Alexander and Jeschke, Sabina and Lakemeyer, Gerhard}, title = {International Harting Open Source Award 2016: Fawkes for the RoboCup Logistics League}, series = {RoboCup 2016: RoboCup 2016: Robot World Cup XX. RoboCup 2016}, booktitle = {RoboCup 2016: RoboCup 2016: Robot World Cup XX. RoboCup 2016}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-68792-6}, doi = {10.1007/978-3-319-68792-6_53}, pages = {634 -- 642}, year = {2017}, language = {en} }