TY - BOOK A1 - Laumann, Jörg A1 - Feldmann, Markus A1 - Frickel, Jörg A1 - Krahwinkel, Manuel A1 - Kraus, Matthias A1 - Stranghöner, Natalie A1 - Ummenhofer, Thomas T1 - Petersen Stahlbau : Grundlagen der Berechnung und baulichen Ausbildung von Stahlbauten N2 - Die Theorie und Konstruktion der wichtigsten Bereiche der Stahlbautechnik werden von den Grundlagen her entwickelt und durch viele Beispiele praxisbezogen erläutert. Das Buch ist aus Vorlesungen im Grund- und Vertiefungsstudium des Bauingenieurwesens entstanden. Der Inhalt wird zum Teil systematisch, zum Teil exemplarisch dargestellt. Für Konstrukteure und Statiker in den technischen Büros, der Beratenden Ingenieure und der Prüfämter enthält das Buch aufbereitete Berechnungsverfahren und Konstruktionsvorschläge in großer Zahl. KW - Behälterbau KW - Bemessung KW - Brandschutz KW - Brückenbau KW - Festigkeitslehre Y1 - 2022 SN - 978-3-658-20510-2 U6 - https://doi.org/10.1007/978-3-658-20510-2 PB - Springer Vieweg CY - Wiesbaden ET - 5. Auflage ER - TY - CHAP A1 - Bensberg, Frank A1 - Czarnecki, Christian A1 - Grob, Heinz Lothar ED - Bruhn, Manfred ED - Hadwich, Karsten T1 - Wirtschaftlichkeitsbewertung von Smart Services mit vollständigen Finanzplänen T2 - Smart Services: Band 1: Konzepte – Methoden – Prozesse N2 - Dieser Beitrag stellt einen Bewertungsrahmen für Smart Services vor, der auf dem Konzept vollständiger Finanzpläne (VOFI) basiert. Zunächst wird eine IoT-Architektur für Smart Services eingeführt, die die Grundlage für deren Betrachtung aus Sicht der Unternehmensplanung liefert. Hierauf aufbauend wird ein Bewertungsrahmen für die finanzplanorientierte Wirtschaftlichkeitsbewertung von Smart Services geschaffen, mit dem die relevanten Zahlungsfolgen differenziert erfasst werden. Mithilfe des entwickelten VOFI-Systems wird anschließend aufgezeigt, wie mithilfe einer Risikoanalyse die Unsicherheit von Modellparametern berücksichtigt werden kann. Y1 - 2022 SN - 978-3-658-37344-3 (Online) SN - 978-3-658-37343-6 (Print) U6 - https://doi.org/10.1007/978-3-658-37344-3_6 SP - 225 EP - 251 PB - Springer Gabler CY - Wiesbaden ER - TY - JOUR A1 - Baringhaus, Ludwig A1 - Gaigall, Daniel T1 - A goodness-of-fit test for the compound Poisson exponential model JF - Journal of Multivariate Analysis N2 - On the basis of bivariate data, assumed to be observations of independent copies of a random vector (S,N), we consider testing the hypothesis that the distribution of (S,N) belongs to the parametric class of distributions that arise with the compound Poisson exponential model. Typically, this model is used in stochastic hydrology, with N as the number of raindays, and S as total rainfall amount during a certain time period, or in actuarial science, with N as the number of losses, and S as total loss expenditure during a certain time period. The compound Poisson exponential model is characterized in the way that a specific transform associated with the distribution of (S,N) satisfies a certain differential equation. Mimicking the function part of this equation by substituting the empirical counterparts of the transform we obtain an expression the weighted integral of the square of which is used as test statistic. We deal with two variants of the latter, one of which being invariant under scale transformations of the S-part by fixed positive constants. Critical values are obtained by using a parametric bootstrap procedure. The asymptotic behavior of the tests is discussed. A simulation study demonstrates the performance of the tests in the finite sample case. The procedure is applied to rainfall data and to an actuarial dataset. A multivariate extension is also discussed. KW - Bootstrapping KW - Collective risk model Y1 - 2022 U6 - https://doi.org/10.1016/j.jmva.2022.105154 SN - 0047-259X SN - 1095-7243 VL - 195 IS - Article 105154 PB - Elsevier CY - Amsterdam ER - TY - CHAP A1 - Evans, Benjamin A1 - Braun, Sebastian A1 - Ulmer, Jessica A1 - Wollert, Jörg T1 - AAS implementations - current problems and solutions T2 - 20th International Conference on Mechatronics - Mechatronika (ME) N2 - The fourth industrial revolution presents a multitude of challenges for industries, one of which being the increased flexibility required of manufacturing lines as a result of increased consumer demand for individualised products. One solution to tackle this challenge is the digital twin, more specifically the standardised model of a digital twin also known as the asset administration shell. The standardisation of an industry wide communications tool is a critical step in enabling inter-company operations. This paper discusses the current state of asset administration shells, the frameworks used to host them and their problems that need to be addressed. To tackle these issues, we propose an event-based server capable of drastically reducing response times between assets and asset administration shells and a multi-agent system used for the orchestration and deployment of the shells in the field. KW - Industry 4.0 KW - Multi-agent Systems KW - Digital Twin KW - Asset Administration Shell Y1 - 2022 SN - 978-1-6654-1040-3 U6 - https://doi.org/10.1109/ME54704.2022.9982933 N1 - 20th International Conference on Mechatronics - Mechatronika (ME), 07-09 December 2022, Pilsen, Czech Republic PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Wiegner, Jonas A1 - Volker, Hanno A1 - Mainz, Fabian A1 - Backes, Andreas A1 - Löken, Michael A1 - Hüning, Felix T1 - Wiegand-effect-powered wireless IoT sensor node T2 - ITG-Fb. 303: Sensoren und Messsysteme N2 - In this article we describe an Internet-of-Things sensing device with a wireless interface which is powered by the oftenoverlooked harvesting method of the Wiegand effect. The sensor can determine position, temperature or other resistively measurable quantities and can transmit the data via an ultra-low power ultra-wideband (UWB) data transmitter. With this approach we can energy-self-sufficiently acquire, process, and wirelessly transmit data in a pulsed operation. A proof-of-concept system was built up to prove the feasibility of the approach. The energy consumption of the system is analyzed and traced back in detail to the individual components, compared to the generated energy and processed to identify further optimization options. Based on the proof-of-concept, an application demonstrator was developed. Finally, we point out possible use cases. Y1 - 2022 SN - 978-3-8007-5835-7 N1 - Sensoren und Messsysteme - 21. ITG/GMA-Fachtagung, 10.05.2022 - 11.05.2022 in Nürnberg SP - 255 EP - 260 PB - VDE Verlag GmbH CY - Berlin ER - TY - JOUR A1 - Ulmer, Jessica A1 - Braun, Sebastian A1 - Cheng, Chi-Tsun A1 - Dowey, Steve A1 - Wollert, Jörg T1 - Gamification of virtual reality assembly training: Effects of a combined point and level system on motivation and training results JF - International Journal of Human-Computer Studies N2 - Virtual Reality (VR) offers novel possibilities for remote training regardless of the availability of the actual equipment, the presence of specialists, and the training locations. Research shows that training environments that adapt to users' preferences and performance can promote more effective learning. However, the observed results can hardly be traced back to specific adaptive measures but the whole new training approach. This study analyzes the effects of a combined point and leveling VR-based gamification system on assembly training targeting specific training outcomes and users' motivations. The Gamified-VR-Group with 26 subjects received the gamified training, and the Non-Gamified-VR-Group with 27 subjects received the alternative without gamified elements. Both groups conducted their VR training at least three times before assembling the actual structure. The study found that a level system that gradually increases the difficulty and error probability in VR can significantly lower real-world error rates, self-corrections, and support usages. According to our study, a high error occurrence at the highest training level reduced the Gamified-VR-Group's feeling of competence compared to the Non-Gamified-VR-Group, but at the same time also led to lower error probabilities in real-life. It is concluded that a level system with a variable task difficulty should be combined with carefully balanced positive and negative feedback messages. This way, better learning results, and an improved self-evaluation can be achieved while not causing significant impacts on the participants' feeling of competence. KW - Gamification KW - Virtual reality KW - Assembly KW - User study KW - Level system Y1 - 2022 U6 - https://doi.org/10.1016/j.ijhcs.2022.102854 SN - 1071-5819 VL - 165 IS - Art. No. 102854 PB - Elsevier CY - Amsterdam ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm T1 - Cybersicherheit in Produktion, Automotive und intelligenten Gebäuden T2 - IT-Sicherheit - Technologien und Best Practices für die Umsetzung im Unternehmen Y1 - 2022 SN - 978-3-446-47223-5 SN - 978-3-446-47347-8 U6 - https://doi.org/10.3139/9783446473478.012 SP - 193 EP - 218 PB - Carl Hanser Verlag CY - München ER - TY - CHAP A1 - Engländer, Jacques A1 - Kaminski, Lars A1 - Schuba, Marko T1 - Informationssicherheitsmanagement T2 - Digitalisierungs- und Informationsmanagement N2 - Daten und Informationen sind die wichtigsten Ressourcen vieler Unternehmen und müssen daher entsprechend geschützt werden. Getrieben durch die erhöhte Vernetzung von Informationstechnologie, die höhere Offenheit infolge datengetriebener Dienstleistungen und eine starke Zunahme an Datenquellen, rücken die Gefahren von Informationsdiebstahl, -manipulation und -verlust in den Fokus von produzierenden Unternehmen. Auf dem Weg zum lern- und wandlungsfähigen Unternehmen kann dies zu einem großen Hindernis werden, da einerseits zu hohe Sicherheitsanforderungen neue Entwicklungen beschränken, andererseits wegen des Mangels an ausreichenden Informationssicherheitskonzepten Unternehmen weniger Innovationen wagen. Deshalb bedarf es individuell angepasster Konzepte für die Bereiche IT-Security, IT-Safety und Datenschutz für vernetzte Produkte, Produktion und Arbeitsplätze. Bei der Entwicklung und Durchsetzung dieser Konzepte steht der Faktor Mensch im Zentrum aller Überlegungen. In diesem Kapitel wird dargestellt, wie der Faktor Mensch bei der Erstellung von Informationssicherheitskonzepten in verschiedenen Phasen zu beachten ist. Beginnend mit der Integration von Informationssystemen und damit verbundenen Sicherheitsmaßnahmen, über die Administration, bis hin zur Anwendung durch den Endnutzer, werden Methoden beschrieben, die den Menschen, verbunden mit seinem Mehrwert wie auch den Risiken, einschließen. Dabei werden sowohl Grundlagen aufgezeigt als auch Konzepte vorgestellt, mit denen Entscheider in der Unternehmens-IT Leitlinien für die Informationssicherheit festlegen können. KW - Informationssicherheitsmanagement KW - Cybersicherheit KW - Cybersecurity KW - Informationssicherheit KW - IT-Sicherheit Y1 - 2022 SN - 978-3-662-63757-9 SN - 978-3-662-63758-6 U6 - https://doi.org/10.1007/978-3-662-63758-6_15 SP - 373 EP - 398 PB - Springer Vieweg CY - Berlin ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - https://doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - BOOK A1 - Lauth, Jakob T1 - Physikalische Chemie kompakt KW - Physikalische Chemie Y1 - 2022 SN - 978-3-662-64587-1 U6 - https://doi.org/https://doi.org/10.1007/978-3-662-64588-8 PB - Springer Spektrum CY - Berlin ER -