TY - CHAP A1 - Harzheim, Thomas A1 - Heuermann, Holger T1 - Phase Repeatable Synthesizers as a New Harmonic Phase Standard for Nonlinear Network Analysis T2 - IEEE Transactions on Microwave Theory and Techniques Y1 - 2018 U6 - https://doi.org/10.1109/TMTT.2018.2817513 SP - 1 EP - 8 PB - IEEE ER - TY - CHAP A1 - Schiffer, Stefan A1 - Ferrein, Alexander T1 - A System Layout for Cognitive Service Robots T2 - Cognitive Robot Architectures. Proceedings of EUCognition 2016 Y1 - 2017 SN - 1613-0073 N1 - CEUR-WS Vol-1855 SP - 44 EP - 45 ER - TY - CHAP A1 - Zug, Sebastian A1 - Niemueller, Tim A1 - Hochgeschwender, Nico A1 - Seidensticker, Kai A1 - Seidel, Martin A1 - Friedrich, Tim A1 - Neumann, Tobias A1 - Karras, Ulrich A1 - Kraetzschmar, Gerhard K. A1 - Ferrein, Alexander T1 - An Integration Challenge to Bridge the Gap Among Industry-Inspired RoboCup Leagues T2 - RoboCup 2016: Robot World Cup XX. RoboCup 2016. Y1 - 2017 SN - 978-3-319-68792-6 U6 - https://doi.org/10.1007/978-3-319-68792-6_13 N1 - Lecture Notes in Computer Science, LNCS, Vol 9776 SP - 157 EP - 168 PB - Springer CY - Cham ER - TY - CHAP A1 - Stopforth, Riaan A1 - Davrajh, Shaniel A1 - Ferrein, Alexander T1 - South African robotics entity for a collaboration initiative T2 - Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2016 Y1 - 2017 SN - 978-1-5090-3335-5 U6 - https://doi.org/10.1109/RoboMech.2016.7813144 N1 - PRASA-RobMech, Nov. 30 2016-Dec. 2 2016, Stellenbosch, South Africa SP - 1 EP - 6 PB - IEEE ER - TY - CHAP A1 - Dowidat, Linda A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - The motivational competence developing game framework T2 - Mensch und Computer 2017 - Tagungsband N2 - Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper. KW - Competence Developing Games KW - Serious Games KW - Gamification KW - motivation theories KW - learning theories Y1 - 2017 U6 - https://doi.org/10.18420/muc2017-mci-0130 SP - 15 EP - 26 PB - Gesellschaft für Informatik e.V. CY - Regensburg ER - TY - CHAP A1 - Walenta, Robert A1 - Schellekens, Twan A1 - Ferrein, Alexander A1 - Schiffer, Stefan T1 - A decentralised system approach for controlling AGVs with ROS T2 - AFRICON, Proceedings Y1 - 2017 SN - 978-1-5386-2775-4 U6 - https://doi.org/10.1109/AFRCON.2017.8095693 SN - 2153-0033 N1 - AFRICON <2017, 18-20 Sept., Cape Town, South Africa> SP - 1436 EP - 1441 PB - IEEE ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Altherr, Lena A1 - Pelz, Peter F. A1 - Ederer, Thorsten A1 - Pfetsch, Marc E. ED - Jacobs, Georg T1 - Optimale Getriebe auf Knopfdruck: Gemischt-ganzzahlige nichtlineare Optimierung zur Entscheidungsunterstützung bei der Auslegung von Getrieben für Kraftfahrzeuge T2 - Antriebstechnisches Kolloquium ATK 2017 Y1 - 2017 SN - 9783743148970 N1 - Antriebstechnisches Kolloquium ATK 2017, 07.03-08.03.2017. Aachen, Deutschland SP - 313 EP - 325 ER - TY - CHAP A1 - Altherr, Lena A1 - Ederer, Thorsten A1 - Schänzle, Christian A1 - Lorenz, Ulf A1 - Pelz, Peter F. T1 - Algorithmic system design using scaling and affinity laws T2 - Operations Research Proceedings 2015 N2 - Energy-efficient components do not automatically lead to energy-efficient systems. Technical Operations Research (TOR) shifts the focus from the single component to the system as a whole and finds its optimal topology and operating strategy simultaneously. In previous works, we provided a preselected construction kit of suitable components for the algorithm. This approach may give rise to a combinatorial explosion if the preselection cannot be cut down to a reasonable number by human intuition. To reduce the number of discrete decisions, we integrate laws derived from similarity theory into the optimization model. Since the physical characteristics of a production series are similar, it can be described by affinity and scaling laws. Making use of these laws, our construction kit can be modeled more efficiently: Instead of a preselection of components, it now encompasses whole model ranges. This allows us to significantly increase the number of possible set-ups in our model. In this paper, we present how to embed this new formulation into a mixed-integer program and assess the run time via benchmarks. We present our approach on the example of a ventilation system design problem. KW - Optimal Topology KW - Piecewise Linearization KW - Ventilation System KW - Similarity Theory Y1 - 2017 SN - 978-3-319-42901-4 SN - 978-3-319-42902-1 U6 - https://doi.org/10.1007/978-3-319-42902-1 N1 - International Conference of the German, Austrian and Swiss Operations Research Societies (GOR, ÖGOR, SVOR/ASRO), University of Vienna, Austria, September 1-4, 2015 SP - 605 EP - 611 PB - Springer CY - Cham ER -