TY - BOOK A1 - Laack, Walter van T1 - Greater Than the Entire Universe Y1 - 2022 SN - 978-3-936624-52-6 PB - van Laack GmbH CY - Aachen ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - A new model for the description of the heat transfer for plane thermo-active geotechnical systems based on thermal resistances JF - Acta Geotechnica Y1 - 2015 U6 - https://doi.org/10.1007/s11440-014-0311-6 SN - 1861-1133 VL - 10 IS - 2 SP - 219 EP - 229 PB - Springer CY - Berlin ER - TY - JOUR A1 - Kürten, Sylvia A1 - Mottaghy, Darius A1 - Ziegler, Martin T1 - Design of plane energy geostructures based on laboratory tests and numerical modelling JF - Energy and Buildings Y1 - 2015 U6 - https://doi.org/10.1016/j.enbuild.2015.08.039 SN - 0378-7788 VL - 107 SP - 434 EP - 444 PB - Elsevier CY - Amsterdam ER - TY - JOUR A1 - Küppers, Tobias A1 - Steffen, Victoria A1 - Hellmuth, Hendrik A1 - O'Connell, Timothy A1 - Bongaerts, Johannes A1 - Maurer, Karl-Heinz A1 - Wiechert, Wolfgang T1 - Developing a new production host from a blueprint: Bacillus pumilus as an industrial enzyme producer JF - Microbial cell factories Y1 - 2014 U6 - https://doi.org/10.1186/1475-2859-13-46 SN - 1475-2859 (E-Journal) VL - 13 SP - Article No. 46 PB - BioMed Central CY - London ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - https://doi.org/10.1145/3600160.3605167 N1 - ARES 2023: The 18th International Conference on Availability, Reliability and Security. August 29 - September 1, 2023. Benevento, Italy. Article No.: 87 SP - 1 EP - 7 PB - ACM ER - TY - CHAP A1 - Kümmell, Steffen A1 - Hillgärtner, Michael T1 - Inductive charging comfortable and nonvisible charging stations for urbanised areas T2 - E-Mobility in Europe : trends and good practice N2 - For a wide acceptance of E-Mobility, a well-developed charging infrastructure is needed. Conductive charging stations, which are today’s state of the art, are of limited suitability for urbanised areas, since they cause a significant diversification in townscape. Furthermore, they might be destroyed by vandalism. Besides for those urbanistic reasons, inductive charging stations are a much more comfortable alternative, especially in urbanised areas. The usage of conductive charging stations requires more or less bulky charging cables. The handling of those standardised charging cables, especially during poor weather conditions, might cause inconvenience, such as dirty clothing etc. Wireless charging does not require visible and vandalism vulnerable charge sticks. No wired connection between charging station and vehicle is needed, which enable the placement below the surface of parking spaces or other points of interest. Inductive charging seems to be the optimal alternative for E-Mobility, as a high power transfer can be realised with a manageable technical and financial effort. For a well-accepted and working public charging infrastructure in urbanised areas it is essential that the infrastructure fits the vehicles’ needs. Hence, a well-adjusted standardisation of the charging infrastructure is essential. This is carried out by several IEC (International Electrotechnical Commission) and national standardisation committees. To ensure an optimised technical solution for future’s inductive charging infrastructures, several field tests had been carried out and are planned in near future. KW - E-mobility KW - Inductive charging KW - Charging stations KW - Urban areas Y1 - 2015 SN - 978-3-319-13193-1 U6 - https://doi.org/10.1007/978-3-319-13194-8_16 SP - 297 EP - 309 PB - Springer CY - Cham [u.a.] ER - TY - JOUR A1 - Kühn, Raoul-Roman A1 - Haugner, Werner A1 - Staat, Manfred A1 - Sponagel, Stefan T1 - A Two Phase Mixture Model based on Bone Observation N2 - An optimization method is developed to describe the mechanical behaviour of the human cancellous bone. The method is based on a mixture theory. A careful observation of the behaviour of the bone material leads to the hypothesis that the bone density is controlled by the principal stress trajectories (Wolff’s law). The basic idea of the developed method is the coupling of a scalar value via an eigenvalue problem to the principal stress trajectories. On the one hand this theory will permit a prediction of the reaction of the biological bone structure after the implantation of a prosthesis, on the other hand it may be useful in engineering optimization problems. An analytical example shows its efficiency. KW - Knochen KW - Knochenbildung KW - Knochenchirugie KW - Strukturanalyse KW - Schwammknochen KW - Knochendichte KW - Wolffsches Gesetz KW - bone structure KW - bone density KW - Wolff's Law KW - cancellous bone Y1 - 2004 ER - TY - CHAP A1 - Kötter, Jens A1 - Decker, Stefan A1 - Detzler, Raphael A1 - Schäfer, Jochen A1 - Schmitz, Mark A1 - Herrmann, Ulf T1 - Cost Reduction of Solar Fields with HelioTrough Collector Y1 - 2012 N1 - Concentration Solar Power and Chemical Energy Systemes : SolarPaces 2012, September 11 14 2002, Marrakesh, Morroco PB - FLAGSOL CY - Köln ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - Cybersecurity awareness training provided by the competence developing game GHOST T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game KW - Awareness KW - CDG KW - Serious Game KW - tablet game KW - business simulation Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 81 EP - 87 ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - A new definition of competence developing games - and a framework to assess them T2 - ACHI 2016 : The Ninth International Conference on Advances in Computer-Human Interactions N2 - There are different types of games that try to make use of the motivation of a gaming situation in learning contexts. This paper introduces the new terminology ‘Competence Developing Game’ (CDG) as an umbrella term for all games with this intention. Based on this new terminology, an assessment framework has been developed and validated in scope of an empirical study. Now, all different types of CDGs can be evaluated according to a defined and uniform set of assessment criteria and, thus, are comparable according to their characteristics and effectiveness. KW - Serious Games KW - Gamification KW - Business Simulations KW - Assessment Y1 - 2016 SN - 978-1-61208-468-8 N1 - Proceeding of the Ninth International Conference on Advances in Computer-Human Interactions (ACHI 2016), Venice. SP - 95 EP - 97 ER -