TY - CHAP A1 - Niemueller, Tim A1 - Zwilling, Frederik A1 - Lakemeyer, Gerhard A1 - Löbach, Matthias A1 - Reuter, Sebastian A1 - Jeschke, Sabina A1 - Ferrein, Alexander T1 - Cyber-Physical System Intelligence T2 - Industrial Internet of Things N2 - Cyber-physical systems are ever more common in manufacturing industries. Increasing their autonomy has been declared an explicit goal, for example, as part of the Industry 4.0 vision. To achieve this system intelligence, principled and software-driven methods are required to analyze sensing data, make goal-directed decisions, and eventually execute and monitor chosen tasks. In this chapter, we present a number of knowledge-based approaches to these problems and case studies with in-depth evaluation results of several different implementations for groups of autonomous mobile robots performing in-house logistics in a smart factory. We focus on knowledge-based systems because besides providing expressive languages and capable reasoning techniques, they also allow for explaining how a particular sequence of actions came about, for example, in the case of a failure. KW - Smart factory KW - Industry 4.0 KW - Multi-robot systems KW - Autonomous mobile robots KW - RoboCup Y1 - 2017 SN - 978-3-319-42559-7 U6 - http://dx.doi.org/10.1007/978-3-319-42559-7_17 N1 - Springer Series in Wireless Technology SP - 447 EP - 472 PB - Springer CY - Cham ER - TY - CHAP A1 - Weber, Niklas A1 - Wolf, Martin ED - Barton, Thomas T1 - Datenerhebung für die CDG-Forschung T2 - Prozesse, Technologie, Anwendungen, Systeme und Management 2017 : angewandte Forschung in der Wirtschaftsinformatik : Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg / Arbeitskreis Wirtschaftsinformatik an Fachhochschulen (AKWI) Y1 - 2017 SN - 978-3-944330-56-3 SP - 218 EP - 227 PB - mana-Buch CY - Heide ER - TY - CHAP A1 - Stopforth, Riaan A1 - Davrajh, Shaniel A1 - Ferrein, Alexander T1 - Design considerations of the duo fugam dual rotor UAV T2 - 2017 Pattern Recognition Association of South Africa and Robotics and Mechatronics (PRASA-RobMech) Y1 - 2017 SN - 978-1-5386-2314-5 U6 - http://dx.doi.org/10.1109/RoboMech.2017.8261115 SP - 7 EP - 13 ER - TY - CHAP A1 - Czarnecki, Christian A1 - Dietze, Christian ED - Maedche, Alexander ED - vom Brocke, Jan ED - Hevner, Alan T1 - Domain-Specific reference modeling in the telecommunications industry T2 - DESRIST 2017: Designing the Digital Transformation N2 - The telecommunications industry is currently going through a major transformation. In this context, the enhanced Telecom Operations Map (eTOM) is a domain-specific process reference model that is offered by the industry organization TM Forum. In practice, eTOM is well accepted and confirmed as de facto standard. It provides process definitions and process flows on different levels of detail. This article discusses the reference modeling of eTOM, i.e., the design, the resulting artifact, and its evaluation based on three project cases. The application of eTOM in three projects illustrates the design approach and concrete models on strategic and operational levels. The article follows the Design Science Research (DSR) paradigm. It contributes with concrete design artifacts to the transformational needs of the telecommunications industry and offers lessons-learned from a general DSR perspective. KW - enhanced Telecom Operations Map (eTOM) KW - Process reference model KW - Process design KW - Map (eTOM) Process reference model Process design Telecommunications industry Y1 - 2017 SN - 978-3-319-59144-5 SN - 978-3-319-59143-8 U6 - http://dx.doi.org/10.1007/978-3-319-59144-5_19 N1 - Designing the Digital Transformation 12th International Conference, DESRIST 2017, Karlsruhe, Germany, May 30 - June 1, 2017. SP - 313 EP - 329 PB - Springer CY - Cham ER - TY - BOOK A1 - Mühl, Thomas T1 - Elektrische Messtechnik : Grundlagen, Messverfahren, Anwendungen Y1 - 2017 SN - 978-3-658-15719-7 U6 - http://dx.doi.org/10.1007/978-3-658-15720-3 N1 - Signatur: 21 XXA 15(5) PB - Springer Vieweg CY - Wiesbaden ET - 5., überarbeitete und erweiterte Auflage ER - TY - CHAP A1 - Thomé, Tristan Eberhard A1 - Czarnecki, Christian A1 - Auth, Gunnar A1 - Bensberg, Frank ED - Barton, Thomas ED - Herrmann, Frank ED - Meister, Vera G. ED - Müller, Christian ED - Seel, Christian T1 - Erweiterung des Referenzprozessmodells eTOM um die Anforderungen des deutschen IT-Sicherheitsgesetzes T2 - Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik N2 - Kritische Infrastrukturen sind primäre Ziele krimineller Hacker. Der Deutsche Bundestag reagierte darauf am 25. Juli 2015 mit einem Gesetz zur Verbesserung der Sicherheit von ITSystemen, dem IT-Sicherheitsgesetz. Dies verlangt von Betreibern kritischer Infrastrukturen, angemessene Mindeststandards für organisatorische und technische Sicherheit zu implementieren, um den Betrieb und die Verfügbarkeit dieser Infrastruktur zu gewährleisten. Telekommunikationsunternehmen sind einerseits von diesem Gesetz in besonderem Maße betroffen und verfügen andererseits mit dem Rahmenwerk enhanced Telecom Operations Map (eTOM) über ein international anerkanntes Referenzmodell zur Gestaltung von Geschäftsprozessen in dieser Branche. Da sämtliche Telekommunikationsunternehmen in Deutschland verpflichtet sind, das Gesetz innerhalb eines bestimmten Zeitrahmens zu implementieren, präsentiert dieser Beitrag einen Vorschlag zur Erweiterung von eTOM um die relevanten Anforderungen des deutschen IT-Sicherheitsgesetzes. Y1 - 2017 SN - 978-3-944330-56-3 N1 - Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg SP - 51 EP - 60 PB - mana-Buch CY - Heide ER - TY - CHAP A1 - Niemueller, Tim A1 - Neumann, Tobias A1 - Henke, Christoph A1 - Schönitz, Sebastian A1 - Reuter, Sebastian A1 - Ferrein, Alexander A1 - Jeschke, Sabina A1 - Lakemeyer, Gerhard T1 - Improvements for a robust production in the RoboCup logistics league 2016 T2 - RoboCup 2016: Robot World Cup XX. RoboCup 2016. Y1 - 2017 SN - 978-3-319-68792-6 U6 - http://dx.doi.org/10.1007/978-3-319-68792-6_49 SP - 589 EP - 600 PB - Springer CY - Cham ER - TY - JOUR A1 - Noureddine, Yacine A1 - Kraff, Oliver A1 - Ladd, Mark E. A1 - Wrede, Karsten H. A1 - Chen, Bixia A1 - Quick, Harald H. A1 - Schaefers, Gregor A1 - Bitz, Andreas T1 - In vitro and in silico assessment of RF-induced heating around intracranial aneurysm clips at 7 Tesla JF - Magnetic Resonance in Medicine Y1 - 2017 U6 - http://dx.doi.org/10.1002/mrm.26650 SN - 1522-2594 IS - Early view PB - Wiley CY - Weinheim ER - TY - CHAP A1 - Niemueller, Tim A1 - Neumann, Tobias A1 - Henke, Christoph A1 - Schönitz, Sebastian A1 - Reuter, Sebastian A1 - Ferrein, Alexander A1 - Jeschke, Sabina A1 - Lakemeyer, Gerhard T1 - International Harting Open Source Award 2016: Fawkes for the RoboCup Logistics League T2 - RoboCup 2016: RoboCup 2016: Robot World Cup XX. RoboCup 2016 Y1 - 2017 SN - 978-3-319-68792-6 U6 - http://dx.doi.org/10.1007/978-3-319-68792-6_53 N1 - Lecture Notes in Computer Science, LNCS, Vol 9776 SP - 634 EP - 642 PB - Springer CY - Cham ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER -