@article{LuftBremenLuft2023, author = {Luft, Angela and Bremen, Sebastian and Luft, Nils}, title = {A cost/benefit and flexibility evaluation framework for additive technologies in strategic factory planning}, series = {Processes}, volume = {11}, journal = {Processes}, number = {7}, publisher = {MDPI}, address = {Basel}, issn = {2227-9717}, doi = {10.3390/pr11071968}, pages = {Artikel 1968}, year = {2023}, abstract = {There is a growing demand for more flexibility in manufacturing to counter the volatility and unpredictability of the markets and provide more individualization for customers. However, the design and implementation of flexibility within manufacturing systems are costly and only economically viable if applicable to actual demand fluctuations. To this end, companies are considering additive manufacturing (AM) to make production more flexible. This paper develops a conceptual model for the impact quantification of AM on volume and mix flexibility within production systems in the early stages of the factory-planning process. Together with the model, an application guideline is presented to help planners with the flexibility quantification and the factory design process. Following the development of the model and guideline, a case study is presented to indicate the potential impact additive technologies can have on manufacturing flexibility Within the case study, various scenarios with different production system configurations and production programs are analyzed, and the impact of the additive technologies on volume and mix flexibility is calculated. This work will allow factory planners to determine the potential impacts of AM on manufacturing flexibility in an early planning stage and design their production systems accordingly.}, language = {en} } @article{PietschKurbel1990, author = {Pietsch, Wolfram and Kurbel, Karl}, title = {A Cooperative Work Environment for Evolutionary Software Development / Kurbel, K., Pietsch, W.}, series = {Multi-user interfaces and applications : proceedings of the IFIP WG 8.4 Conference on Multi-User Interfaces and Applications, Heraklion, Crete, Greece, 24 - 26 September, 1990 / ed. by Simon Gibbs ...}, journal = {Multi-user interfaces and applications : proceedings of the IFIP WG 8.4 Conference on Multi-User Interfaces and Applications, Heraklion, Crete, Greece, 24 - 26 September, 1990 / ed. by Simon Gibbs ...}, publisher = {North-Holland Publ.}, address = {Amsterdam [u.a.]}, isbn = {0-444-88760-1}, pages = {115 -- 127}, year = {1990}, language = {en} } @article{HaegerBongaertsSiegert2022, author = {Haeger, Gerrit and Bongaerts, Johannes and Siegert, Petra}, title = {A convenient ninhydrin assay in 96-well format for amino acid-releasing enzymes using an air-stable reagent}, series = {Analytical Biochemistry}, journal = {Analytical Biochemistry}, number = {624}, publisher = {Elsevier}, address = {Amsterdam}, issn = {1096-0309}, doi = {10.1016/j.ab.2022.114819}, pages = {Artikel 114819}, year = {2022}, abstract = {An improved and convenient ninhydrin assay for aminoacylase activity measurements was developed using the commercial EZ Nin™ reagent. Alternative reagents from literature were also evaluated and compared. The addition of DMSO to the reagent enhanced the solubility of Ruhemann's purple (RP). Furthermore, we found that the use of a basic, aqueous buffer enhances stability of RP. An acidic protocol for the quantification of lysine was developed by addition of glacial acetic acid. The assay allows for parallel processing in a 96-well format with measurements microtiter plates.}, language = {en} } @article{GerlingPoolPredel1983, author = {Gerling, Ulrich and Pool, M. J. and Predel, Bruno}, title = {A contribution to the associate model for binary liquid alloys = Ein Beitrag zum Assoziat-Modell f{\"u}r bin{\"a}re fl{\"u}ssige Legierungen}, series = {Zeitschrift f{\"u}r Metallkunde : international journal of materials research and advanced techniques. Bd. 74, H. 9}, journal = {Zeitschrift f{\"u}r Metallkunde : international journal of materials research and advanced techniques. Bd. 74, H. 9}, issn = {0044-3093 ; 0179-4841}, pages = {616 -- 619}, year = {1983}, language = {en} } @article{BreitbachSchubert2004, author = {Breitbach, Gerd and Schubert, F.}, title = {A contribution to stress prediction in coatings for gas turbine blades}, series = {Archive of applied mechanics. 73 (2004), H. 9-10}, journal = {Archive of applied mechanics. 73 (2004), H. 9-10}, isbn = {0939-1533}, pages = {682 -- 689}, year = {2004}, language = {en} } @article{DitzhausGaigall2018, author = {Ditzhaus, Marc and Gaigall, Daniel}, title = {A consistent goodness-of-fit test for huge dimensional and functional data}, series = {Journal of Nonparametric Statistics}, volume = {30}, journal = {Journal of Nonparametric Statistics}, number = {4}, publisher = {Taylor \& Francis}, address = {Abingdon}, issn = {1029-0311}, doi = {10.1080/10485252.2018.1486402}, pages = {834 -- 859}, year = {2018}, abstract = {A nonparametric goodness-of-fit test for random variables with values in a separable Hilbert space is investigated. To verify the null hypothesis that the data come from a specific distribution, an integral type test based on a Cram{\´e}r-von-Mises statistic is suggested. The convergence in distribution of the test statistic under the null hypothesis is proved and the test's consistency is concluded. Moreover, properties under local alternatives are discussed. Applications are given for data of huge but finite dimension and for functional data in infinite dimensional spaces. A general approach enables the treatment of incomplete data. In simulation studies the test competes with alternative proposals.}, language = {en} } @article{Koehler2020, author = {K{\"o}hler, Klemens}, title = {A conflict theory perspective of IT attacks - consequences for IT security education}, number = {Preprint}, year = {2020}, abstract = {Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games.}, language = {en} } @article{DigelDachwaldArtmannetal.2009, author = {Digel, Ilya and Dachwald, Bernd and Artmann, Gerhard and Linder, Peter and Funke, O.}, title = {A concept of a probe for particle analysis and life detection in icy environments}, pages = {1 -- 24}, year = {2009}, language = {en} } @article{BhattaraiStaat2019, author = {Bhattarai, Aroj and Staat, Manfred}, title = {A computational study of organ relocation after laparoscopic pectopexy to repair posthysterectomy vaginal vault prolapse}, series = {Computer Methods in Biomechanics and Biomedical Engineering: Imaging \& Visualization}, journal = {Computer Methods in Biomechanics and Biomedical Engineering: Imaging \& Visualization}, publisher = {Taylor \& Francis}, address = {London}, issn = {2168-1171}, doi = {10.1080/21681163.2019.1670095}, year = {2019}, language = {en} } @article{GerhardtCooperWhitbreadetal.1985, author = {Gerhardt, Hans Joachim and Cooper, K.-R. and Whitbread, R. and Gary, K.-P. (u.a.)}, title = {A comparison of aerodynamic drag measurements on model trucks in closed-jet and open-jet wind tunnels}, pages = {261 -- 274}, year = {1985}, language = {en} }