@inproceedings{HueningStuettgen2021, author = {H{\"u}ning, Felix and St{\"u}ttgen, Marcel}, title = {Work in Progress: Interdisciplinary projects in times of COVID-19 crisis - challenges, risks and chances}, series = {2021 IEEE Global Engineering Education Conference (EDUCON)}, booktitle = {2021 IEEE Global Engineering Education Conference (EDUCON)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.1109/EDUCON46332.2021.9454006}, pages = {1175 -- 1179}, year = {2021}, abstract = {Project work and inter disciplinarity are integral parts of today's engineering work. It is therefore important to incorporate these aspects into the curriculum of academic studies of engineering. At the faculty of Electrical Engineering and Information Technology an interdisciplinary project is part of the bachelor program to address these topics. Since the summer term 2020 most courses changed to online mode during the Covid-19 crisis including the interdisciplinary projects. This online mode introduces additional challenges to the execution of the projects, both for the students as well as for the lecture. The challenges, but also the risks and chances of this kind of project courses are subject of this paper, based on five different interdisciplinary projects}, language = {en} } @inproceedings{BitzStreckertHansenetal.2000, author = {Bitz, Andreas and Streckert, J. and Hansen, V.W. and Buschmann, J.}, title = {RF exposure of non restrained animals in an overmoded radial waveguide}, series = {22nd BEMS Annual Meeting, Munich, Germany, 2000}, booktitle = {22nd BEMS Annual Meeting, Munich, Germany, 2000}, publisher = {Bioelectromagnetics Society}, address = {Frederick, MD}, pages = {63}, year = {2000}, language = {en} } @inproceedings{SchwankeHoefkenSchuba2017, author = {Schwanke, Peter and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC}, pages = {1 -- 5}, year = {2017}, abstract = {ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.}, language = {en} } @inproceedings{GranatHoefkenSchuba2017, author = {Granat, Andreas and H{\"o}fken, Hans-Wilhelm and Schuba, Marko}, title = {Intrusion Detection of the ICS Protocol EtherCAT}, pages = {1 -- 5}, year = {2017}, abstract = {Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward - well known office IT security mechanisms can be used - protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.}, language = {en} } @inproceedings{BitzKlompLadd2009, author = {Bitz, Andreas and Klomp, D.W. and Ladd, M.E.}, title = {Experimental and numerical determination of SAR and temperature distribution of a human endorectal coil for MR imaging of the prostate at 7T (903.)}, series = {16th annual ISMRM scientific meeting and exhibition 2008 : Toronto, Ontario, Canada, 3 - 9 May 2008}, booktitle = {16th annual ISMRM scientific meeting and exhibition 2008 : Toronto, Ontario, Canada, 3 - 9 May 2008}, publisher = {Curran}, address = {Red Hook, NY}, isbn = {978-1-61567-196-0}, year = {2009}, language = {en} } @inproceedings{BitzElOuardiStreckertetal.2005, author = {Bitz, Andreas and El Ouardi, A. and Streckert, J. and Hansen, V.}, title = {Efficient calculation of human exposure in front of base station antennas by a combination of the FDTD and Hybrid(2)-method}, series = {Proceedings of the 16th International Zurich Symposium on Electromagnetic Compatibility, Topical Meeting on Biomedical EMC, Zurich, Switzerland, February 2005}, booktitle = {Proceedings of the 16th International Zurich Symposium on Electromagnetic Compatibility, Topical Meeting on Biomedical EMC, Zurich, Switzerland, February 2005}, publisher = {ETH Zentrum}, address = {Z{\"u}rich}, isbn = {3-9521199-9-7}, pages = {115 -- 118}, year = {2005}, language = {en} } @inproceedings{BitzAlaydrusStreckertetal.2002, author = {Bitz, Andreas and Alaydrus, M. and Streckert, J. and Hansen, V.}, title = {Combination of the hybrid/sup [2]/-method and the FDTD-method for solution of boundary value problems with electrically large and high-resolution bodies}, series = {IEEE Antennas and Propagation Society International Symposium (IEEE Cat. No.02CH37313) 2002 : San Antonio, TX, USA, 16-21 June}, booktitle = {IEEE Antennas and Propagation Society International Symposium (IEEE Cat. No.02CH37313) 2002 : San Antonio, TX, USA, 16-21 June}, publisher = {IEEE}, address = {Piscataway, NJ}, isbn = {0-7803-7330-8}, doi = {10.1109/APS.2002.1018209}, pages = {278 -- 281}, year = {2002}, language = {en} } @inproceedings{BitzAlaydrusStreckertetal.2002, author = {Bitz, Andreas and Alaydrus, M. and Streckert, J. and Hansen, V.W.}, title = {Absorption rates inside human body due to radiated electro-magnetic fields of multi-band base station antennas. Boundary value problems with electrically large and high-resolution bodies}, series = {24th BEMS Annual Meeting, Quebec City, Quebec, Canada, 23 - 27 June 2002}, booktitle = {24th BEMS Annual Meeting, Quebec City, Quebec, Canada, 23 - 27 June 2002}, publisher = {Bioelectromagnetics Society}, address = {Frederick, MD}, pages = {40 -- 41}, year = {2002}, language = {en} } @inproceedings{BitzAlaydrusStreckertetal.2001, author = {Bitz, Andreas and Alaydrus, M. and Streckert, J. and Hansen, V.W.}, title = {Base station antennas embedded in complex environments: rf exposure in controlled areas}, series = {23rd BEMS Annual Meeting, St. Paul, Minnesota, USA, 49-50, June 2001}, booktitle = {23rd BEMS Annual Meeting, St. Paul, Minnesota, USA, 49-50, June 2001}, publisher = {Bioelectromagnetics Society}, address = {Frederick, MD}, pages = {49 -- 50}, year = {2001}, language = {en} } @inproceedings{BitzStreckertHansenetal.2001, author = {Bitz, Andreas and Streckert, J. and Hansen, V.W. and Stogbauer, F.}, title = {Shielded RF-exposure system with an integrated LF-measuring system for in vitro experiments with cell-layers}, series = {Proceedings of the Ebea 2001 : 5th International Congress of the European Bioelectromagnetics Association (Ebea) ; 6-8 September 2001, Marina Congress Center, Helsinki, Finland}, booktitle = {Proceedings of the Ebea 2001 : 5th International Congress of the European Bioelectromagnetics Association (Ebea) ; 6-8 September 2001, Marina Congress Center, Helsinki, Finland}, editor = {Hietanen, Maila and Jokela, Kari and Juutilainen, Jukka and Työterveyslaitos,}, publisher = {Finnish Institute of Occupational Health}, address = {Helsinki}, isbn = {9789518024401}, pages = {67 -- 68}, year = {2001}, language = {en} } @inproceedings{BitzStreckertHansenetal.2000, author = {Bitz, Andreas and Streckert, J.R. and Hansen, V.W. and Lerchl, A.}, title = {Freely moving or restrained animals in bioelec-tromagnetic experiments - pros and cons}, series = {AP 2000 : Millennium Conference on Antennas \& Propagation, Davos, Switzerland, 9 - 14 April 2000}, booktitle = {AP 2000 : Millennium Conference on Antennas \& Propagation, Davos, Switzerland, 9 - 14 April 2000}, number = {Band 1}, editor = {Danesy, Dorothea}, publisher = {ESA Publications Division, ESTEC}, address = {Noordwijk}, pages = {489}, year = {2000}, language = {en} } @inproceedings{BitzKobusScheenenetal.2013, author = {Bitz, Andreas and Kobus, Thiele and Scheenen, Tom W. J. and Ladd, Mark E.}, title = {RF Safety of the Combination of a 31P Tx/Rx Endorectal Coil \& a 1H Tx/Rx Body Array for 31P MRSI of the Prostate at 7T (311.)}, series = {20th Annual ISMRM scientific meeting and exhibition 2012 : Melbourne, Australia, 5 - 11 May 2012}, booktitle = {20th Annual ISMRM scientific meeting and exhibition 2012 : Melbourne, Australia, 5 - 11 May 2012}, number = {Volume 1}, publisher = {Curran}, address = {Red Hook, NY}, isbn = {978-1-62276-943-8}, issn = {1545-4428}, pages = {311}, year = {2013}, language = {en} } @inproceedings{BitzKraffOrzadaetal.2012, author = {Bitz, Andreas and Kraff, O. and Orzada, S. and Maderwald, S. and Brote, I. and Johst, S. and Ladd, E.}, title = {Assessment of RF Safety of Transmit Coils at 7 Tesla by Experimental and Numerical Procedures (490.)}, series = {19th annual ISMRM scientific meeting and exhibition 2011 : Montreal, Quebec, Canada, 7 - 13 May 2011}, booktitle = {19th annual ISMRM scientific meeting and exhibition 2011 : Montreal, Quebec, Canada, 7 - 13 May 2011}, number = {Volume 1}, publisher = {Curran}, address = {Red Hook, NY}, isbn = {978-1-61839-284-8}, pages = {475}, year = {2012}, language = {en} } @inproceedings{BitzKraffOrzadaetal.2010, author = {Bitz, Andreas and Kraff, O. and Orzada, S. and Maderwald, S. and Brote, I. and Ladd, M.}, title = {Experimental and Numerical Assessment of RF Safety of Transmit Coils at 7 Tesla}, series = {ISMRM workshop on MR safety 2010 : RF heating of the human in MRI : workshop series. The Washington County Historic Courthouse, Stillwater, Minnesota, USA, 15 - 17 October 2010}, booktitle = {ISMRM workshop on MR safety 2010 : RF heating of the human in MRI : workshop series. The Washington County Historic Courthouse, Stillwater, Minnesota, USA, 15 - 17 October 2010}, isbn = {978-1-62276-088-6}, pages = {195}, year = {2010}, language = {en} } @inproceedings{SchollBartellaMoluluoetal.2019, author = {Scholl, Ingrid and Bartella, Alex and Moluluo, Cem and Ertural, Berat and Laing, Frederic and Suder, Sebastian}, title = {MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality}, series = {Bildverarbeitung f{\"u}r die Medizin 2019 : Algorithmen - Systeme - Anwendungen}, booktitle = {Bildverarbeitung f{\"u}r die Medizin 2019 : Algorithmen - Systeme - Anwendungen}, publisher = {Springer Vieweg}, address = {Wiesbaden}, isbn = {978-3-658-25326-4}, doi = {10.1007/978-3-658-25326-4_32}, pages = {152 -- 157}, year = {2019}, language = {en} } @inproceedings{SerrorHenzeHacketal.2018, author = {Serror, Martin and Henze, Martin and Hack, Sacha and Schuba, Marko and Wehrle, Klaus}, title = {Towards in-network security for smart homes}, series = {13th International Conference on Availability, Reliability and Security, ARES 2018; Hamburg; Germany; 27 August 2018 through 30 August 2018}, booktitle = {13th International Conference on Availability, Reliability and Security, ARES 2018; Hamburg; Germany; 27 August 2018 through 30 August 2018}, isbn = {978-145036448-5}, doi = {10.1145/3230833.3232802}, pages = {Article numer 3232802}, year = {2018}, language = {en} } @inproceedings{DinghoferHartung2020, author = {Dinghofer, Kai and Hartung, Frank}, title = {Analysis of Criteria for the Selection of Machine Learning Frameworks}, series = {2020 International Conference on Computing, Networking and Communications (ICNC)}, booktitle = {2020 International Conference on Computing, Networking and Communications (ICNC)}, publisher = {IEEE}, address = {New York, NY}, doi = {10.1109/ICNC47757.2020.9049650}, pages = {373 -- 377}, year = {2020}, abstract = {With the many achievements of Machine Learning in the past years, it is likely that the sub-area of Deep Learning will continue to deliver major technological breakthroughs [1]. In order to achieve best results, it is important to know the various different Deep Learning frameworks and their respective properties. This paper provides a comparative overview of some of the most popular frameworks. First, the comparison methods and criteria are introduced and described with a focus on computer vision applications: Features and Uses are examined by evaluating papers and articles, Adoption and Popularity is determined by analyzing a data science study. Then, the frameworks TensorFlow, Keras, PyTorch and Caffe are compared based on the previously described criteria to highlight properties and differences. Advantages and disadvantages are compared, enabling researchers and developers to choose a framework according to their specific needs.}, language = {en} } @inproceedings{Huening2021, author = {H{\"u}ning, Felix}, title = {Sustainable changes beyond covid-19 for a second semester physics course for electrical engineering students}, series = {Blended Learning in Engineering Education: challenging, enlightening - and lasting?}, booktitle = {Blended Learning in Engineering Education: challenging, enlightening - and lasting?}, isbn = {978-2-87352-023-6}, pages = {1424 -- 1428}, year = {2021}, abstract = {The course Physics for Electrical Engineering is part of the curriculum of the bachelor program Electrical Engineering at University of Applied Science Aachen. Before covid-19 the course was conducted in a rather traditional way with all parts (lecture, exercise and lab) face-to-face. This teaching approach changed fundamentally within a week when the covid-19 limitations forced all courses to distance learning. All parts of the course were transformed to pure distance learning including synchronous and asynchronous parts for the lecture, live online-sessions for the exercises and self-paced labs at home. Using these methods, the course was able to impart the required knowledge and competencies. Taking the teacher's observations of the student's learning behaviour and engagement, the formal and informal feedback of the students and the results of the exams into account, the new methods are evaluated with respect to effectiveness, sustainability and suitability for competence transfer. Based on this analysis strong and weak points of the concept and countermeasures to solve the weak points were identified. The analysis further leads to a sustainable teaching approach combining synchronous and asynchronous parts with self-paced learning times that can be used in a very flexible manner for different learning scenarios, pure online, hybrid (mixture of online and presence times) and pure presence teaching.}, language = {en} } @inproceedings{LeiseBreuerAltherretal.2020, author = {Leise, Philipp and Breuer, Tim and Altherr, Lena and Pelz, Peter F.}, title = {Development, validation and assessment of a resilient pumping system}, series = {Proceedings of the Joint International Resilience Conference, JIRC2020}, booktitle = {Proceedings of the Joint International Resilience Conference, JIRC2020}, isbn = {978-90-365-5095-6}, pages = {97 -- 100}, year = {2020}, abstract = {The development of resilient technical systems is a challenging task, as the system should adapt automatically to unknown disturbances and component failures. To evaluate different approaches for deriving resilient technical system designs, we developed a modular test rig that is based on a pumping system. On the basis of this example system, we present metrics to quantify resilience and an algorithmic approach to improve resilience. This approach enables the pumping system to automatically react on unknown disturbances and to reduce the impact of component failures. In this case, the system is able to automatically adapt its topology by activating additional valves. This enables the system to still reach a minimum performance, even in case of failures. Furthermore, timedependent disturbances are evaluated continuously, deviations from the original state are automatically detected and anticipated in the future. This allows to reduce the impact of future disturbances and leads to a more resilient system behaviour.}, language = {en} } @inproceedings{LorenzAltherrPelz2019, author = {Lorenz, Imke-Sophie B. and Altherr, Lena and Pelz, Peter F.}, title = {Graph-theoretic resilience analysis of a water distribution system's topology}, series = {World Congress on Resilience, Reliability and Asset Management 2019}, booktitle = {World Congress on Resilience, Reliability and Asset Management 2019}, pages = {106 -- 109}, year = {2019}, abstract = {Water suppliers are faced with the great challenge of achieving high-quality and, at the same time, low-cost water supply. In practice, the focus is set on the most beneficial maintenance measures and/or capacity adaptations of existing water distribution systems (WDS). Since climatic and demographic influences will pose further challenges in the future, the resilience enhancement of WDS, i.e. the enhancement of their capability to withstand and recover from disturbances, has been in particular focus recently. To assess the resilience of WDS, metrics based on graph theory have been proposed. In this study, a promising approach is applied to assess the resilience of the WDS for a district in a major German City. The conducted analysis provides insight into the process of actively influencing the resilience of WDS}, language = {en} } @inproceedings{LeiseAltherr2018, author = {Leise, Philipp and Altherr, Lena}, title = {Optimizing the design and control of decentralized water supply systems - a case-study of a hotel building}, series = {EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization}, booktitle = {EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-97773-7}, doi = {10.1007/978-3-319-97773-7_107}, pages = {1241 -- 1252}, year = {2018}, abstract = {To increase pressure to supply all floors of high buildings with water, booster stations, normally consisting of several parallel pumps in the basement, are used. In this work, we demonstrate the potential of a decentralized pump topology regarding energy savings in water supply systems of skyscrapers. We present an approach, based on Mixed-Integer Nonlinear Programming, that allows to choose an optimal network topology and optimal pumps from a predefined construction kit comprising different pump types. Using domain-specific scaling laws and Latin Hypercube Sampling, we generate different input sets of pump types and compare their impact on the efficiency and cost of the total system design. As a realistic application example, we consider a hotel building with 325 rooms, 12 floors and up to four pressure zones.}, language = {en} } @inproceedings{LeiseAltherrPelz2018, author = {Leise, Philipp and Altherr, Lena and Pelz, Peter F.}, title = {Technical Operations Research (TOR) - Algorithms, not Engineers, Design Optimal Energy Efficient and Resilient Cooling Systems}, series = {FAN2018 - Proceedings of the International Conference on Fan Noise, Aerodynamics, Applications and Systems}, booktitle = {FAN2018 - Proceedings of the International Conference on Fan Noise, Aerodynamics, Applications and Systems}, pages = {1 -- 12}, year = {2018}, abstract = {The overall energy efficiency of ventilation systems can be improved by considering not only single components, but by considering as well the interplay between every part of the system. With the help of the method "TOR" ("Technical Operations Research"), which was developed at the Chair of Fluid Systems at TU Darmstadt, it is possible to improve the energy efficiency of the whole system by considering all possible design choices programmatically. We show the ability of this systematic design approach with a ventilation system for buildings as a use case example. Based on a Mixed-Integer Nonlinear Program (MINLP) we model the ventilation system. We use binary variables to model the selection of different pipe diameters. Multiple fans are model with the help of scaling laws. The whole system is represented by a graph, where the edges represent the pipes and fans and the nodes represents the source of air for cooling and the sinks, that have to be cooled. At the beginning, the human designer chooses a construction kit of different suitable fans and pipes of different diameters and different load cases. These boundary conditions define a variety of different possible system topologies. It is not possible to consider all topologies by hand. With the help of state of the art solvers, on the other side, it is possible to solve this MINLP. Next to this, we also consider the effects of malfunctions in different components. Therefore, we show a first approach to measure the resilience of the shown example use case. Further, we compare the conventional approach with designs that are more resilient. These more resilient designs are derived by extending the before mentioned model with further constraints, that consider explicitly the resilience of the overall system. We show that it is possible to design resilient systems with this method already in the early design stage and compare the energy efficiency and resilience of these different system designs.}, language = {en} } @inproceedings{AltherrPelzEdereretal.2017, author = {Altherr, Lena and Pelz, Peter F. and Ederer, Thorsten and Pfetsch, Marc E.}, title = {Optimale Getriebe auf Knopfdruck: Gemischt-ganzzahlige nichtlineare Optimierung zur Entscheidungsunterst{\"u}tzung bei der Auslegung von Getrieben f{\"u}r Kraftfahrzeuge}, series = {Antriebstechnisches Kolloquium ATK 2017}, booktitle = {Antriebstechnisches Kolloquium ATK 2017}, editor = {Jacobs, Georg}, isbn = {9783743148970}, pages = {313 -- 325}, year = {2017}, language = {de} } @inproceedings{RauschFriesenAltherretal.2018, author = {Rausch, Lea and Friesen, John and Altherr, Lena and Pelz, Peter F.}, title = {Using mixed-integer programming for the optimal design of water supply networks for slums}, series = {Operations Research Proceedings 2017}, booktitle = {Operations Research Proceedings 2017}, editor = {Kliewer, Natalia and Ehmke, Jan Fabian and Bornd{\"o}rfer, Ralf}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-89919-0 (Print)}, doi = {10.1007/978-3-319-89920-6_68}, pages = {509 -- 516}, year = {2018}, abstract = {The UN sets the goal to ensure access to water and sanitation for all people by 2030. To address this goal, we present a multidisciplinary approach for designing water supply networks for slums in large cities by applying mathematical optimization. The problem is modeled as a mixed-integer linear problem (MILP) aiming to find a network describing the optimal supply infrastructure. To illustrate the approach, we apply it on a small slum cluster in Dhaka, Bangladesh.}, language = {en} } @inproceedings{RauschLeiseEdereretal.2016, author = {Rausch, Lea and Leise, Philipp and Ederer, Thorsten and Altherr, Lena and Pelz, Peter F.}, title = {A comparison of MILP and MINLP solver performance on the example of a drinking water supply system design problem}, series = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, booktitle = {ECCOMAS Congress 2016 VII European Congress on Computational Methods in Applied Sciences and Engineering}, editor = {Papadrakakis, M. and Ppadopoulos, V. and Stefanou, G. and Plevris, V.}, isbn = {978-618-82844-0-1}, pages = {8509 -- 8527}, year = {2016}, abstract = {Finding a good system topology with more than a handful of components is a highly non-trivial task. The system needs to be able to fulfil all expected load cases, but at the same time the components should interact in an energy-efficient way. An example for a system design problem is the layout of the drinking water supply of a residential building. It may be reasonable to choose a design of spatially distributed pumps which are connected by pipes in at least two dimensions. This leads to a large variety of possible system topologies. To solve such problems in a reasonable time frame, the nonlinear technical characteristics must be modelled as simple as possible, while still achieving a sufficiently good representation of reality. The aim of this paper is to compare the speed and reliability of a selection of leading mathematical programming solvers on a set of varying model formulations. This gives us empirical evidence on what combinations of model formulations and solver packages are the means of choice with the current state of the art.}, language = {en} } @inproceedings{MuellerAltherrAholaetal.2019, author = {M{\"u}ller, Tim M. and Altherr, Lena and Ahola, Marja and Schabel, Samuel and Pelz, Peter F.}, title = {Multi-Criteria optimization of pressure screen systems in paper recycling - balancing quality, yield, energy consumption and system complexity}, series = {EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization}, booktitle = {EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization}, editor = {Rodrigues, H. C.}, publisher = {Springer International Publishing}, address = {Basel}, isbn = {978-3-319-97773-7}, doi = {10.1007/978-3-319-97773-7_105}, year = {2019}, abstract = {The paper industry is the industry with the third highest energy consumption in the European Union. Using recycled paper instead of fresh fibers for papermaking is less energy consuming and saves resources. However, adhesive contaminants in recycled paper are particularly problematic since they reduce the quality of the resulting paper-product. To remove as many contaminants and at the same time obtain as many valuable fibres as possible, fine screening systems, consisting of multiple interconnected pressure screens, are used. Choosing the best configuration is a non-trivial task: The screens can be interconnected in several ways, and suitable screen designs as well as operational parameters have to be selected. Additionally, one has to face conflicting objectives. In this paper, we present an approach for the multi-criteria optimization of pressure screen systems based on Mixed-Integer Nonlinear Programming. We specifically focus on a clear representation of the trade-off between different objectives.}, language = {en} } @inproceedings{AltherrEdererSchaenzleetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Sch{\"a}nzle, Christian and Lorenz, Ulf and Pelz, Peter F.}, title = {Algorithmic system design using scaling and affinity laws}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1}, pages = {605 -- 611}, year = {2017}, abstract = {Energy-efficient components do not automatically lead to energy-efficient systems. Technical Operations Research (TOR) shifts the focus from the single component to the system as a whole and finds its optimal topology and operating strategy simultaneously. In previous works, we provided a preselected construction kit of suitable components for the algorithm. This approach may give rise to a combinatorial explosion if the preselection cannot be cut down to a reasonable number by human intuition. To reduce the number of discrete decisions, we integrate laws derived from similarity theory into the optimization model. Since the physical characteristics of a production series are similar, it can be described by affinity and scaling laws. Making use of these laws, our construction kit can be modeled more efficiently: Instead of a preselection of components, it now encompasses whole model ranges. This allows us to significantly increase the number of possible set-ups in our model. In this paper, we present how to embed this new formulation into a mixed-integer program and assess the run time via benchmarks. We present our approach on the example of a ventilation system design problem.}, language = {en} } @inproceedings{AltherrEdererVergeetal.2015, author = {Altherr, Lena and Ederer, Thorsten and Verg{\´e}, Angela and Pelz, Peter F.}, title = {Algorithmische Struktursynthese eines hydrostatischen Getriebes}, series = {Antriebssysteme 2015 : Elektrik, Mechanik, Fluidtechnik in der Anwendung}, booktitle = {Antriebssysteme 2015 : Elektrik, Mechanik, Fluidtechnik in der Anwendung}, publisher = {VDI-Verlag}, address = {D{\"u}sseldorf}, isbn = {978-3-18-092268-3}, pages = {145 -- 155}, year = {2015}, language = {de} } @inproceedings{SchaenzleAltherrEdereretal.2015, author = {Sch{\"a}nzle, Christian and Altherr, Lena and Ederer, Thorsten and Lorenz, Ulf and Pelz, Peter F.}, title = {As good as it can be: Ventilation system design by a combined scaling and discrete optimization method}, series = {Proceedings of FAN 2015}, booktitle = {Proceedings of FAN 2015}, pages = {1 -- 11}, year = {2015}, abstract = {The understanding that optimized components do not automatically lead to energy-efficient systems sets the attention from the single component on the entire technical system. At TU Darmstadt, a new field of research named Technical Operations Research (TOR) has its origin. It combines mathematical and technical know-how for the optimal design of technical systems. We illustrate our optimization approach in a case study for the design of a ventilation system with the ambition to minimize the energy consumption for a temporal distribution of diverse load demands. By combining scaling laws with our optimization methods we find the optimal combination of fans and show the advantage of the use of multiple fans.}, language = {en} } @inproceedings{AltherrEdererFarnetaneetal.2017, author = {Altherr, Lena and Ederer, Thorsten and Farnetane, Lucas S. and P{\"o}ttgen, Philipp and Verg{\´e}, Angela and Pelz, Peter F.}, title = {Multicriterial design of a hydrostatic transmission system via mixed-integer programming}, series = {Operations Research Proceedings 2015}, booktitle = {Operations Research Proceedings 2015}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-42901-4}, doi = {10.1007/978-3-319-42902-1_41}, pages = {301 -- 307}, year = {2017}, abstract = {In times of planned obsolescence the demand for sustainability keeps growing. Ideally, a technical system is highly reliable, without failures and down times due to fast wear of single components. At the same time, maintenance should preferably be limited to pre-defined time intervals. Dispersion of load between multiple components can increase a system's reliability and thus its availability inbetween maintenance points. However, this also results in higher investment costs and additional efforts due to higher complexity. Given a specific load profile and resulting wear of components, it is often unclear which system structure is the optimal one. Technical Operations Research (TOR) finds an optimal structure balancing availability and effort. We present our approach by designing a hydrostatic transmission system.}, language = {en} } @inproceedings{OstkottePetersHueningetal.2022, author = {Ostkotte, Sebastian and Peters, Constantin and H{\"u}ning, Felix and Bragard, Michael}, title = {Design, implementation and verification of an rotational incremental position encoder based on the magnetic Wiegand effect}, series = {2022 ELEKTRO (ELEKTRO)}, booktitle = {2022 ELEKTRO (ELEKTRO)}, publisher = {IEEE}, isbn = {978-1-6654-6726-1}, issn = {2691-0616}, doi = {10.1109/ELEKTRO53996.2022.9803477}, pages = {6 Seiten}, year = {2022}, abstract = {This paper covers the use of the magnetic Wiegand effect to design an innovative incremental encoder. First, a theoretical design is given, followed by an estimation of the achievable accuracy and an optimization in open-loop operation. Finally, a successful experimental verification is presented. For this purpose, a permanent magnet synchronous machine is controlled in a field-oriented manner, using the angle information of the prototype.}, language = {en} } @inproceedings{BeckerHoefkenSchuetzetal.2016, author = {Becker, Sebastian and H{\"o}fken, Hans-Wilhelm and Sch{\"u}tz, Philip and Schuba, Marko}, title = {IT-forensische Erkennung modifizierter Android-Apps}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {120 -- 125}, year = {2016}, abstract = {Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbeh{\"o}rden immer h{\"a}ufiger gegen{\"u}berstehen. Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden gef{\"u}hrt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei m{\"u}ssen die Ermittler m{\"o}glichst schnell und gezielt erkennen k{\"o}nnen, ob eine App tats{\"a}chlich schadhaft manipuliert wurde, was manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen zwar bei der generellen Erkennung schadhafter Software, sind aber f{\"u}r die polizeiliche Praxis nicht geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen ber{\"u}cksichtigt und so f{\"u}r den Einsatz in der Strafverfolgung in Frage kommt.}, language = {de} } @inproceedings{BonneyNagelSchuba2016, author = {Bonney, Gregor and Nagel, Stefan and Schuba, Marko}, title = {Risiko Smart Home - Angriff auf ein Babymonitorsystem}, series = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, booktitle = {Proceedings of DACH Security 2016, Klagenfurt, Austria, September 2016}, editor = {Schartner, P.}, pages = {371 -- 378}, year = {2016}, abstract = {Unser Zuhause wird zunehmend intelligenter. Smart Homes bieten uns die Steuerung von Haus- oder Unterhaltungstechnik bequem vom Smartphone aus. Junge Familien nutzen die Technologie, um mittels vernetzten Babymonitorsystemen ihren Nachwuchs von {\"u}berall aus im Blick zu haben. Davon auszugehen, dass solche Systeme mit einem Fokus auf Sicherheit entwickelt wurden, um die sehr pers{\"o}nlichen Daten zu sch{\"u}tzen, ist jedoch ein Trugschluss. Die Untersuchung eines handels{\"u}blichen und keineswegs billigen Systems zeigt, dass die Ger{\"a}te sehr einfach kompromittiert und missbraucht werden k{\"o}nnen.}, language = {de} } @inproceedings{LorenzAltherrPelz2020, author = {Lorenz, Imke-Sophie and Altherr, Lena and Pelz, Peter F.}, title = {Resilience enhancement of critical infrastructure - graph-theoretical resilience analysis of the water distribution system in the German city of Darmstadt}, series = {14th WCEAM Proceedings}, booktitle = {14th WCEAM Proceedings}, publisher = {Springer}, address = {Cham}, isbn = {978-3-030-64228-0}, doi = {10.1007/978-3-030-64228-0_13}, pages = {137 -- 149}, year = {2020}, abstract = {Water suppliers are faced with the great challenge of achieving high-quality and, at the same time, low-cost water supply. Since climatic and demographic influences will pose further challenges in the future, the resilience enhancement of water distribution systems (WDS), i.e. the enhancement of their capability to withstand and recover from disturbances, has been in particular focus recently. To assess the resilience of WDS, graph-theoretical metrics have been proposed. In this study, a promising approach is first physically derived analytically and then applied to assess the resilience of the WDS for a district in a major German City. The topology based resilience index computed for every consumer node takes into consideration the resistance of the best supply path as well as alternative supply paths. This resistance of a supply path is derived to be the dimensionless pressure loss in the pipes making up the path. The conducted analysis of a present WDS provides insight into the process of actively influencing the resilience of WDS locally and globally by adding pipes. The study shows that especially pipes added close to the reservoirs and main branching points in the WDS result in a high resilience enhancement of the overall WDS.}, language = {en} } @inproceedings{SchaenzleAltherrEdereretal.2015, author = {Sch{\"a}nzle, Christian and Altherr, Lena and Ederer, Thorsten and Pelz, Peter}, title = {TOR - Towards the energetically optimal ventilation system}, pages = {1 Seite}, year = {2015}, language = {en} } @inproceedings{NikolovskiRekeElsenetal.2021, author = {Nikolovski, Gjorgji and Reke, Michael and Elsen, Ingo and Schiffer, Stefan}, title = {Machine learning based 3D object detection for navigation in unstructured environments}, series = {2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops)}, booktitle = {2021 IEEE Intelligent Vehicles Symposium Workshops (IV Workshops)}, publisher = {IEEE}, isbn = {978-1-6654-7921-9}, doi = {10.1109/IVWorkshops54471.2021.9669218}, pages = {236 -- 242}, year = {2021}, abstract = {In this paper we investigate the use of deep neural networks for 3D object detection in uncommon, unstructured environments such as in an open-pit mine. While neural nets are frequently used for object detection in regular autonomous driving applications, more unusual driving scenarios aside street traffic pose additional challenges. For one, the collection of appropriate data sets to train the networks is an issue. For another, testing the performance of trained networks often requires tailored integration with the particular domain as well. While there exist different solutions for these problems in regular autonomous driving, there are only very few approaches that work for special domains just as well. We address both the challenges above in this work. First, we discuss two possible ways of acquiring data for training and evaluation. That is, we evaluate a semi-automated annotation of recorded LIDAR data and we examine synthetic data generation. Using these datasets we train and test different deep neural network for the task of object detection. Second, we propose a possible integration of a ROS2 detector module for an autonomous driving platform. Finally, we present the performance of three state-of-the-art deep neural networks in the domain of 3D object detection on a synthetic dataset and a smaller one containing a characteristic object from an open-pit mine.}, language = {en} } @inproceedings{AmirBauckhageChircuetal.2022, author = {Amir, Malik and Bauckhage, Christian and Chircu, Alina and Czarnecki, Christian and Knopf, Christian and Piatkowski, Nico and Sultanow, Eldar}, title = {What can we expect from quantum (digital) twins?}, series = {Wirtschaftsinformatik 2022 Proceedings}, booktitle = {Wirtschaftsinformatik 2022 Proceedings}, publisher = {AIS Electronic Library (AISeL)}, pages = {1 -- 14}, year = {2022}, abstract = {Digital twins enable the modeling and simulation of real-world entities (objects, processes or systems), resulting in improvements in the associated value chains. The emerging field of quantum computing holds tremendous promise forevolving this virtualization towards Quantum (Digital) Twins (QDT) and ultimately Quantum Twins (QT). The quantum (digital) twin concept is not a contradiction in terms - but instead describes a hybrid approach that can be implemented using the technologies available today by combining classicalcomputing and digital twin concepts with quantum processing. This paperpresents the status quo of research and practice on quantum (digital) twins. It alsodiscuses their potential to create competitive advantage through real-timesimulation of highly complex, interconnected entities that helps companies better address changes in their environment and differentiate their products andservices.}, language = {en} } @inproceedings{RitschelStenzelCzarneckietal.2021, author = {Ritschel, Konstantin and Stenzel, Adina and Czarnecki, Christian and Hong, Chin-Gi}, title = {Realizing robotic process automation potentials: an architectural perspective on a real-life implementation case}, series = {GI Edition Proceedings Band 314 "INFORMATIK 2021" Computer Science \& Sustainability}, booktitle = {GI Edition Proceedings Band 314 "INFORMATIK 2021" Computer Science \& Sustainability}, editor = {Gesellschaft f{\"u}r Informatik e.V. (GI),}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885797081}, issn = {1617-5468}, doi = {10.18420/informatik2021-108}, pages = {1303 -- 1311}, year = {2021}, abstract = {The initial idea of Robotic Process Automation (RPA) is the automation of business processes through a simple emulation of user input and output by software robots. Hence, it can be assumed that no changes of the used software systems and existing Enterprise Architecture (EA) is required. In this short, practical paper we discuss this assumption based on a real-life implementation project. We show that a successful RPA implementation might require architectural work during analysis, implementation, and migration. As practical paper we focus on exemplary lessons-learned and new questions related to RPA and EA.}, language = {en} } @inproceedings{AuthCzarneckiBensberg2019, author = {Auth, Gunnar and Czarnecki, Christian and Bensberg, Frank}, title = {Impact of robotic process automation on enterprise architectures}, series = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, booktitle = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, editor = {Draude, Claude and Lange, Martin and Sick, Bernhard and Gesellschaft f{\"u}r Informatik e.V. (GI),}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796893}, issn = {1617-5468}, doi = {10.18420/inf2019_ws05}, pages = {59 -- 65}, year = {2019}, abstract = {The initial idea of Robotic Process Automation (RPA) is the automation of business processes through the presentation layer of existing application systems. For this simple emulation of user input and output by software robots, no changes of the systems and architecture is required. However, considering strategic aspects of aligning business and technology on an enterprise level as well as the growing capabilities of RPA driven by artificial intelligence, interrelations between RPA and Enterprise Architecture (EA) become visible and pose new questions. In this paper we discuss the relationship between RPA and EA in terms of perspectives and implications. As workin- progress we focus on identifying new questions and research opportunities related to RPA and EA.}, language = {en} } @inproceedings{BrockmannSultanowCzarnecki2019, author = {Brockmann, Carsten and Sultanow, Eldar and Czarnecki, Christian}, title = {Is enterprise architecture still relevant in the digital age?}, series = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, booktitle = {GI Edition Proceedings Band 295 INFORMATIK 2019, Workshop-Beitr{\"a}ge}, editor = {Draude, Claude and Lange, Martin and Sick, Bernhard}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796893}, issn = {1617-5468}, doi = {10.18420/inf2019_ws01}, pages = {21 -- 21}, year = {2019}, language = {en} } @inproceedings{BensbergAuthCzarneckietal.2018, author = {Bensberg, Frank and Auth, Gunnar and Czarnecki, Christian and W{\"o}rndle, Christopher}, title = {Transforming literature-intensive research processes through text analytics - design, implementation and lessons learned}, editor = {Kemal İlter, H.}, doi = {10.6084/m9.figshare.7582073.v1}, pages = {9 Seiten}, year = {2018}, abstract = {The continuing growth of scientific publications raises the question how research processes can be digitalized and thus realized more productively. Especially in information technology fields, research practice is characterized by a rapidly growing volume of publications. For the search process various information systems exist. However, the analysis of the published content is still a highly manual task. Therefore, we propose a text analytics system that allows a fully digitalized analysis of literature sources. We have realized a prototype by using EBSCO Discovery Service in combination with IBM Watson Explorer and demonstrated the results in real-life research projects. Potential addressees are research institutions, consulting firms, and decision-makers in politics and business practice.}, language = {en} } @inproceedings{BrockmannSultanowCzarnecki2018, author = {Brockmann, Carsten and Sultanow, Eldar and Czarnecki, Christian}, title = {Enterprise architectures between agility and traditional methodologies}, series = {GI Edition Proceedings Band 285 Workshops der INFORMATIK 2018}, booktitle = {GI Edition Proceedings Band 285 Workshops der INFORMATIK 2018}, editor = {Czarnecki, Christian and Brockmann, Carsten and Sultanow, Eldar and Koschmider, Agnes and Selzer, Annika and Gesellschaft f{\"u}r Informatik e. V.,}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796794}, issn = {1617-5468}, pages = {1 Seite}, year = {2018}, abstract = {For this year's workshop on Enterpirse Architecture in Research and Practice we have received eight submissions from which four have passed the rigorous peer-review. The acceptance quote of 50\% assures that only advancements in the field are included in our workshop.}, language = {en} } @inproceedings{SchnejiderWisselinkCzarnecki2017, author = {Schnejider, Dominik and Wisselink, Frank and Czarnecki, Christian}, title = {Transformation von Wertsch{\"o}pfungsketten durch das Internet der Dinge - Bewertungsrahmen und Fallstudie}, series = {GI Edition Proceedings Band 275 INFORMATIK 2017}, booktitle = {GI Edition Proceedings Band 275 INFORMATIK 2017}, editor = {Eibl, Maximilian and Gaedke, Martin and Gesellschaft f{\"u}r Informatik e. V. (GI),}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {978-3-88579-669-5}, issn = {1617-5468}, doi = {10.18420/in2017_208}, pages = {2081 -- 2094}, year = {2017}, abstract = {Momentan finden in vielen Branchen umfassende Ver{\"a}nderungen von M{\"a}rkten und Wertsch{\"o}pfungsketten statt, welche auch als Digitale Transformation bezeichnet werden. In diesem Zusammenhang wird das Internet der Dinge (Internet of Things, IoT) als ein wichtiger technischer Enabler der Ver{\"a}nderungen angesehen. Prim{\"a}re Ziele des IoT sind die Steuerung physischer Gegen-st{\"a}nde aus der Distanz und das Erfassen von Informationen aus dem Umfeld dieser Gegenst{\"a}nde. Welche neuen Gesch{\"a}fts-bzw. Partnermodelle entstehen durch die gemeinsame Nutzung von IoT-Daten und Big-Data-Technologien und welcher qualitative Mehrwert wird dadurch geschaffen? Als Antwort wird in diesem Beitrag ein Bewertungsrahmen zur qualitativen Wertsch{\"o}pfungsanalyse von IoT vorgeschlagen. Anhand dieses Bewertungsrahmens wird ein Anwendungsfall untersucht, der in anonymisierter Form an konkrete Praxisprojekte angelehnt ist. Konkret wird ein Anwendungsfall betrachtet, der eine Abfallwirtschaft 2.0 basierend auf dem Einsatz von IoT vorschl{\"a}gt. Aus den Untersuchungsergebnissen gehen beispielsweise Erkenntnisse hervor, wie Gesch{\"a}ftsmodelle auf Basis eines unentgeltlichen Informationsaustauschs durch IoT gestaltet werden k{\"o}nnen.}, language = {de} } @inproceedings{ThomeCzarneckiAuthetal.2017, author = {Thom{\´e}, Tristan Eberhard and Czarnecki, Christian and Auth, Gunnar and Bensberg, Frank}, title = {Erweiterung des Referenzprozessmodells eTOM um die Anforderungen des deutschen IT-Sicherheitsgesetzes}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, editor = {Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {51 -- 60}, year = {2017}, abstract = {Kritische Infrastrukturen sind prim{\"a}re Ziele krimineller Hacker. Der Deutsche Bundestag reagierte darauf am 25. Juli 2015 mit einem Gesetz zur Verbesserung der Sicherheit von ITSystemen, dem IT-Sicherheitsgesetz. Dies verlangt von Betreibern kritischer Infrastrukturen, angemessene Mindeststandards f{\"u}r organisatorische und technische Sicherheit zu implementieren, um den Betrieb und die Verf{\"u}gbarkeit dieser Infrastruktur zu gew{\"a}hrleisten. Telekommunikationsunternehmen sind einerseits von diesem Gesetz in besonderem Maße betroffen und verf{\"u}gen andererseits mit dem Rahmenwerk enhanced Telecom Operations Map (eTOM) {\"u}ber ein international anerkanntes Referenzmodell zur Gestaltung von Gesch{\"a}ftsprozessen in dieser Branche. Da s{\"a}mtliche Telekommunikationsunternehmen in Deutschland verpflichtet sind, das Gesetz innerhalb eines bestimmten Zeitrahmens zu implementieren, pr{\"a}sentiert dieser Beitrag einen Vorschlag zur Erweiterung von eTOM um die relevanten Anforderungen des deutschen IT-Sicherheitsgesetzes.}, language = {de} } @inproceedings{SchneiderWisselinkCzarnecki2017, author = {Schneider, Dominik and Wisselink, Frank and Czarnecki, Christian}, title = {Qualitative Wertsch{\"o}pfungsanalyse von Anwendungsf{\"a}llen des Narrowband Internet of Things}, series = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, booktitle = {Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik}, editor = {Barton, Thomas and Herrmann, Frank and Meister, Vera G. and M{\"u}ller, Christian and Seel, Christian}, publisher = {mana-Buch}, address = {Heide}, isbn = {978-3-944330-56-3}, pages = {184 -- 193}, year = {2017}, abstract = {Prim{\"a}re Ziele des Internets der Dinge sind die Steuerung physischer Gegenst{\"a}nde aus der Distanz und das Erfassen von Informationen aus dem Umfeld dieser Gegenst{\"a}nde. Dazu werden Hardwarekomponenten in Gegenst{\"a}nde des t{\"a}glichen Lebens und die Umwelt integriert. Mithilfe von Informations- und Kommunikationstechnologien entsteht hieraus das Internet der Dinge (Internet of Things, IoT). Vor einem Jahr wurde mit Narrowband Internet of Things (NB-IoT) eine Technologie die es erm{\"o}glicht, Hardwarekomponenten energieeffizient und unmittelbar {\"u}ber das Mobilfunknetz zu vernetzen. Gegenst{\"a}nde werden dadurch {\"u}ber große Reichweiten eigenst{\"a}ndig kommunikationsf{\"a}hig. Das IoT steht mit NB-IoT vor einem gestiegenen Nutzenpotenzial, da eine zunehmende Anzahl miteinander verbundener Gegenst{\"a}nde und der Austausch gr{\"o}ßerer Datenmengen realisierbar sind. Damit sind aus wirtschaftlicher Sicht neue, innovative Anwendungsf{\"a}lle des IoT m{\"o}glich, die auch bereits in der Praxis diskutiert werden. In diesem Beitrag wird anhand eines konkreten Anwendungsfalls untersucht, welche neuen Gesch{\"a}fts- bzw. Partnermodelle durch die gemeinsame Nutzung von NB-IoT-Daten und Big Data-Technologien entstehen und welcher qualitative Mehrwert f{\"u}r die an einem Anwendungsfall beteiligten Stakeholder geschaffen wird. Dazu wird - einem konstruktionsorientierten Forschungsansatz folgend - ein Bewertungsrahmen zur qualitativen Wertsch{\"o}pfungsanalyse von NB-IoT entwickelt, der u.a. auf der Schablone nach Cockburn und dem Business Model Canvas basiert. Anhand dieses Bewertungsrahmens wird ein Anwendungsfall untersucht, der in anonymisierter Form an konkrete Praxisprojekte angelehnt ist. Konkret wird ein Anwendungsfall betrachtet, der einen Fahrradverleih 2.0 basierend auf dem Einsatz von NB-IoT vorschl{\"a}gt. Aus den Untersuchungsergebnissen gehen beispielsweise Erkenntnisse hervor, wie Gesch{\"a}ftsmodelle auf}, language = {de} } @inproceedings{CzarneckiDietze2017, author = {Czarnecki, Christian and Dietze, Christian}, title = {Domain-Specific reference modeling in the telecommunications industry}, series = {DESRIST 2017: Designing the Digital Transformation}, booktitle = {DESRIST 2017: Designing the Digital Transformation}, editor = {Maedche, Alexander and vom Brocke, Jan and Hevner, Alan}, publisher = {Springer}, address = {Cham}, isbn = {978-3-319-59144-5}, doi = {10.1007/978-3-319-59144-5_19}, pages = {313 -- 329}, year = {2017}, abstract = {The telecommunications industry is currently going through a major transformation. In this context, the enhanced Telecom Operations Map (eTOM) is a domain-specific process reference model that is offered by the industry organization TM Forum. In practice, eTOM is well accepted and confirmed as de facto standard. It provides process definitions and process flows on different levels of detail. This article discusses the reference modeling of eTOM, i.e., the design, the resulting artifact, and its evaluation based on three project cases. The application of eTOM in three projects illustrates the design approach and concrete models on strategic and operational levels. The article follows the Design Science Research (DSR) paradigm. It contributes with concrete design artifacts to the transformational needs of the telecommunications industry and offers lessons-learned from a general DSR perspective.}, language = {en} } @inproceedings{Czarnecki2016, author = {Czarnecki, Christian}, title = {Design und Nutzung einer industriespezifischen Referenzarchitektur f{\"u}r die Telekommunikationsindustrie}, series = {GI Edition Proceedings Band 259 INFORMATIK 2016. 26.-30. September 2016 Klagenfurt}, booktitle = {GI Edition Proceedings Band 259 INFORMATIK 2016. 26.-30. September 2016 Klagenfurt}, editor = {Mayr, Heinrich C. and Pinzger, Martin and Gesellschaft f{\"u}r Informatik e. V. (GI),}, publisher = {K{\"o}llen}, address = {Bonn}, isbn = {9783885796534}, issn = {1617-5468}, pages = {807 -- 814}, year = {2016}, abstract = {Zur Unterst{\"u}tzung des Transformationsbedarfs von Telekommunikationsunternehmen sind die Referenzmodelle des TM Forums in der Praxis weltweit anerkannt. Dabei findet jedoch meist eine losgel{\"o}ste Nutzung f{\"u}r spezifische Einzelthemen statt. Daher f{\"u}hrt dieser Artikel die bestehenden Inhalte in einer industriespezifischen, {\"u}bergreifenden Referenzarchitektur zusammen. Der Fokus liegt auf den Ebenen Aufbauorganisation, Prozesse, Applikationen und Daten. Dar{\"u}ber hinaus werden inhaltliche Architekturdom{\"a}nen zur Strukturierung angeboten. Die Referenzarchitektur ist hierarchisch aufgebaut und wird hier beispielhaft f{\"u}r ausgew{\"a}hlte, aggregierte Inhalte beschrieben. Als erste Evaluation wird die Anwendung der Referenzarchitektur in drei Praxisprojekten erl{\"a}utert.}, language = {de} } @inproceedings{BensbergAuthCzarnecki2018, author = {Bensberg, Frank and Auth, Gunnar and Czarnecki, Christian}, title = {Unterst{\"u}tzung von Wissenstransferprozessen durch Erschließung von Literaturdatenbanken - ein gestaltungsorientierter Ansatz auf Basis von Text Analytics}, series = {Wissenstransfer in der Wirtschaftsinformatik Fachgespr{\"a}ch im Rahmen der MKWI 2018}, booktitle = {Wissenstransfer in der Wirtschaftsinformatik Fachgespr{\"a}ch im Rahmen der MKWI 2018}, editor = {Hofmann, Georg Rainer and Alm, Wolfgang}, publisher = {IMI-Verlag ; Hochschule Aschaffenburg, Information Management Institut}, address = {Aschaffenburg}, isbn = {9783981844207}, pages = {6 -- 15}, year = {2018}, abstract = {Angesichts des anhaltenden Wachstums wissenschaftlicher Ver{\"o}ffentlichungen werden Instrumente ben{\"o}tigt, um Literaturanalysen durch Digitalisierung produktiver zu gestalten. Dieser Beitrag stellt einen Ansatz vor, der bibliographische Daten aus der Literaturdatenbank EBSCO Discovery Service mithilfe von Text-Analytics-Methoden erschließt. Die L{\"o}sung basiert auf dem Textanalysesystem IBM Watson Explorer und eignet sich f{\"u}r explorative Literaturanalysen, um beispielsweise den Status quo emergierender Technologiefelder in der Literatur zu reflektieren. Die generierten Ergebnisse sind in den Kontext der zunehmenden Werkzeugunterst{\"u}tzung des Literaturrechercheprozesses einzuordnen und k{\"o}nnen f{\"u}r intra- sowie interinstitutionelle Wissenstransferprozesse in Forschungs- und Beratungskontexten genutzt werden.}, language = {de} } @inproceedings{NursinskiStolbergGangatharanCzarnecki2016, author = {Nursinski-Stolberg, Andr{\´e} and Gangatharan, Kiritharan and Czarnecki, Christian}, title = {Development of a subject-oriented reference process model for the telecommunications industry}, series = {GI Edition Proceedings Band 259 INFORMATIK 2016}, booktitle = {GI Edition Proceedings Band 259 INFORMATIK 2016}, editor = {Mayr, Heinrich C. and Pinzger, Martin}, publisher = {Gesellschaft f{\"u}r Informatik e.V.}, address = {Bonn}, isbn = {9783885796534}, issn = {1617-5468}, pages = {699 -- 712}, year = {2016}, abstract = {Generally the usage of reference models can be structured top-down or bottom-up. The practical need of agile change and flexible organizational implementation requires a consistent mapping to an operational level. In this context, well-established reference process models are typically structured top-down. The subject-oriented Business Process Management (sBPM) offers a modeling concept that is structured bottom-up and concentrates on the process actors on an operational level. This paper applies sBPM to the enhanced Telecom Operations Map (eTOM), a well-accepted reference process model in the telecommunications industry. The resulting design artifact is a concrete example for a combination of a bottom-up and top-down developed reference model. The results are evaluated and confirmed in practical context through the involvement of the industry body TMForum.}, language = {en} } @inproceedings{CzarneckiWinkelmannSpiliopoulou2012, author = {Czarnecki, Christian and Winkelmann, Axel and Spiliopoulou, Myra}, title = {Transformation in Telecommunication - Analyse und Clustering von Real-life Projekten}, series = {Multikonferenz Wirtschaftsinformatik 2012}, booktitle = {Multikonferenz Wirtschaftsinformatik 2012}, editor = {Mattfeld, Dirk Christian and Robra-Bissantz, Susanne}, publisher = {Gito}, address = {Berlin}, isbn = {9783942183635}, pages = {985 -- 998}, year = {2012}, abstract = {Die Ver{\"a}nderungen des Telekommunikationsmarktes haben in der Praxis zu einer Vielzahl von Transformationsprojekten gef{\"u}hrt. Was geh{\"o}rt aber zu einem "Transformationsprojekt", welche Prozesse und Systeme werden ver{\"a}ndert? Zur Beantwortung dieser Frage haben wir 184 Berichte zu Projekten analysiert, die als "Transformationsprojekte" bezeichnet waren. F{\"u}r die Analyse haben wir einen Kodierungsrahmen konzipiert und anhand dessen die Berichte mit einem hierarchischen Clustering-Verfahren in Themen gruppiert. Die Ergebnisse liefern Hinweise {\"u}ber die in der Praxis gesetzten Schwerpunkte und Priorit{\"a}ten. Sie k{\"o}nnen somit als Unterst{\"u}tzung f{\"u}r Unternehmen dienen, die ein Transformationsprojekt planen. Sie weisen zudem darauf hin, in welchen Bereichen eines Unternehmens Unterst{\"u}tzung durch wissenschaftlich erprobte Werkzeuge und Modelle n{\"o}tig ist.}, language = {de} }