TY - CHAP A1 - Czarnecki, Christian A1 - Dietze, Christian ED - Maedche, Alexander ED - vom Brocke, Jan ED - Hevner, Alan T1 - Domain-Specific reference modeling in the telecommunications industry T2 - DESRIST 2017: Designing the Digital Transformation N2 - The telecommunications industry is currently going through a major transformation. In this context, the enhanced Telecom Operations Map (eTOM) is a domain-specific process reference model that is offered by the industry organization TM Forum. In practice, eTOM is well accepted and confirmed as de facto standard. It provides process definitions and process flows on different levels of detail. This article discusses the reference modeling of eTOM, i.e., the design, the resulting artifact, and its evaluation based on three project cases. The application of eTOM in three projects illustrates the design approach and concrete models on strategic and operational levels. The article follows the Design Science Research (DSR) paradigm. It contributes with concrete design artifacts to the transformational needs of the telecommunications industry and offers lessons-learned from a general DSR perspective. KW - enhanced Telecom Operations Map (eTOM) KW - Process reference model KW - Process design KW - Map (eTOM) Process reference model Process design Telecommunications industry Y1 - 2017 SN - 978-3-319-59144-5 SN - 978-3-319-59143-8 U6 - https://doi.org/10.1007/978-3-319-59144-5_19 N1 - Designing the Digital Transformation 12th International Conference, DESRIST 2017, Karlsruhe, Germany, May 30 - June 1, 2017. SP - 313 EP - 329 PB - Springer CY - Cham ER - TY - BOOK A1 - Czarnecki, Christian A1 - Dietze, Christian T1 - Reference architecture for the telecommunications industry: Transformation of strategy, organization, processes, data, and applications N2 - This book reflects the tremendous changes in the telecommunications industry in the course of the past few decades – shorter innovation cycles, stiffer competition and new communication products. It analyzes the transformation of processes, applications and network technologies that are now expected to take place under enormous time pressure. The International Telecommunication Union (ITU) and the TM Forum have provided reference solutions that are broadly recognized and used throughout the value chain of the telecommunications industry, and which can be considered the de facto standard. The book describes how these reference solutions can be used in a practical context: it presents the latest insights into their development, highlights lessons learned from numerous international projects and combines them with well-founded research results in enterprise architecture management and reference modeling. The complete architectural transformation is explained, from the planning and set-up stage to the implementation. Featuring a wealth of examples and illustrations, the book offers a valuable resource for telecommunication professionals, enterprise architects and project managers alike. KW - Enterprise architecture KW - Enterprise transformation KW - Reference modelling KW - TM Forum KW - Telecommunication Y1 - 2017 SN - 978-3-319-46755-9 (Print) SN - 978-3-319-83578-5 (Print) SN - 978-3-319-46757-3 (PDF) U6 - https://doi.org/10.1007/978-3-319-46757-3 PB - Springer CY - Cham ER - TY - JOUR A1 - Czarnecki, Christian A1 - Geier, Jari A1 - Pflug, Karolin T1 - Netzvirtualisierung durch SDN und NFV : Unternehmensprozesse auf dem Prüfstand JF - LANline N2 - Kundenanforderungen an Netzwerke haben sich in den vergangenen Jahren stark verändert. Mit NFV und SDN sind Unternehmen technisch in der Lage, diesen gerecht zu werden. Die Provider stehen jedoch vor großen Herausforderungen: Insbesondere Produkte und Prozesse müssen angepasst und agiler werden, um die Stärken von NFV und SDN zum Kundenvorteil auszuspielen. Y1 - 2017 SN - 0942-4172 PB - AWI Aktuelles Wissen Verl.-Ges. CY - Trostberg ER - TY - CHAP A1 - Dowidat, Linda A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - The motivational competence developing game framework T2 - Mensch und Computer 2017 - Tagungsband N2 - Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper. KW - Competence Developing Games KW - Serious Games KW - Gamification KW - motivation theories KW - learning theories Y1 - 2017 U6 - https://doi.org/10.18420/muc2017-mci-0130 SP - 15 EP - 26 PB - Gesellschaft für Informatik e.V. CY - Regensburg ER - TY - CHAP A1 - Endress, Tim A1 - Bragard, Michael T1 - Recording of efficiency-maps of low-power electric drive systems using a flexible matlab-based test bench T2 - 2017 IEEE 58th International Scientific Conference on Power and Electrical Engineering of Riga Technical University (RTUCON) N2 - This paper introduces a hardware setup to measure efficiency maps of low-power electric motors and their associated inverters. Here, the power of the device under test (DUT) ranges from some Watts to a few hundred Watts. The torque and speed of the DUT are measured independent of voltage and current in multiple load points. A Matlab-based software approach in combination with an open Texas-Instruments (TI) hardware setup ensures flexibility. Exemplarily, the efficiency field of a Permanent Magnet Synchronous Machine (PMSM) is measured to proof the concept. Brushless-DC (BLDC) motors can be tested as well. The nomenclature in this paper is based on the new European standard DIN EN 50598. Special attention is paid to the calculation of the measurement error. Y1 - 2017 SN - 978-1-5386-3846-0 U6 - https://doi.org/10.1109/RTUCON.2017.8124775 PB - IEEE CY - New York ER - TY - JOUR A1 - Fiedler, Thomas M. A1 - Ladd, Mark E. A1 - Bitz, Andreas T1 - SAR Simulations & Safety JF - NeuroImage Y1 - 2017 U6 - https://doi.org/10.1016/j.neuroimage.2017.03.035 SN - 1053-8119 IS - Epub ahead of print PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Fiedler, Thomas M. A1 - Ladd, Mark E. A1 - Bitz, Andreas T1 - RF safety assessment of a bilateral four-channel transmit/receive 7 Tesla breast coil: SAR versus temperature limits JF - Medical Physics Y1 - 2017 U6 - https://doi.org/10.1002/mp.12034 N1 - This article is corrected by: Errata: Erratum: “RF safety assessment of a bilateral four-channel transmit/receive 7 Tesla breast coil: SAR versus tissue temperature limits” [Med. Phys. 44(1), 143–157 (2017)] Volume 44, Issue 2, 772 VL - 44 IS - 1 SP - 143 EP - 157 ER - TY - CHAP A1 - Galdi, Chiara A1 - Hartung, Frank A1 - Dugelay, Jean-Luc T1 - Videos versus still images: Asymmetric sensor pattern noise comparison on mobile phones T2 - Electronic Imaging N2 - Nowadays, the most employed devices for recoding videos or capturing images are undoubtedly the smartphones. Our work investigates the application of source camera identification on mobile phones. We present a dataset entirely collected by mobile phones. The dataset contains both still images and videos collected by 67 different smartphones. Part of the images consists in photos of uniform backgrounds, especially collected for the computation of the RSPN. Identifying the source camera given a video is particularly challenging due to the strong video compression. The experiments reported in this paper, show the large variation in performance when testing an highly accurate technique on still images and videos. KW - Image Forensics KW - Mobile Phones KW - Image Database Y1 - 2017 U6 - https://doi.org/10.2352/ISSN.2470-1173.2017.7.MWSF-331 SN - 2470-1173 N1 - IS&T International Symposium on Electronic Imaging 2017 Media Watermarking, Security, and Forensics 2017 SP - 100 EP - 103 PB - Society for Imaging Science and Technology CY - Springfield, Virginia ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - BOOK A1 - Gunnar, Auth A1 - Barton, Thomas A1 - Beigel, Stefan A1 - Bensberg, Frank A1 - Brehm, Lars A1 - Wolf, Martin R. ED - Barton, Thomas ED - Herrmann, Frank ED - Meister, Vera G. ED - Müller, Christian ED - Seel, Christian T1 - Prozesse, Technologie, Anwendungen, Systeme und Management 2017 BT - Angewandte Forschung in der Wirtschaftsinformatik. Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg / Arbeitskreis Wirtschaftsinformatik an Fachhochschulen (AKWI) Y1 - 2017 SN - 978-3-944330-56-3 PB - Mana-Buch CY - Heide ER -