TY - CHAP A1 - Zug, Sebastian A1 - Niemueller, Tim A1 - Hochgeschwender, Nico A1 - Seidensticker, Kai A1 - Seidel, Martin A1 - Friedrich, Tim A1 - Neumann, Tobias A1 - Karras, Ulrich A1 - Kraetzschmar, Gerhard K. A1 - Ferrein, Alexander T1 - An Integration Challenge to Bridge the Gap Among Industry-Inspired RoboCup Leagues T2 - RoboCup 2016: Robot World Cup XX. RoboCup 2016. Y1 - 2017 SN - 978-3-319-68792-6 U6 - https://doi.org/10.1007/978-3-319-68792-6_13 N1 - Lecture Notes in Computer Science, LNCS, Vol 9776 SP - 157 EP - 168 PB - Springer CY - Cham ER - TY - CHAP A1 - Stopforth, Riaan A1 - Davrajh, Shaniel A1 - Ferrein, Alexander T1 - South African robotics entity for a collaboration initiative T2 - Pattern Recognition Association of South Africa and Robotics and Mechatronics International Conference (PRASA-RobMech), 2016 Y1 - 2017 SN - 978-1-5090-3335-5 U6 - https://doi.org/10.1109/RoboMech.2016.7813144 N1 - PRASA-RobMech, Nov. 30 2016-Dec. 2 2016, Stellenbosch, South Africa SP - 1 EP - 6 PB - IEEE ER - TY - CHAP A1 - Dowidat, Linda A1 - König, Johannes Alexander A1 - Wolf, Martin R. T1 - The motivational competence developing game framework T2 - Mensch und Computer 2017 - Tagungsband N2 - Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper. KW - Competence Developing Games KW - Serious Games KW - Gamification KW - motivation theories KW - learning theories Y1 - 2017 U6 - https://doi.org/10.18420/muc2017-mci-0130 SP - 15 EP - 26 PB - Gesellschaft für Informatik e.V. CY - Regensburg ER - TY - CHAP A1 - Thurn, Laura A1 - Gebhardt, Andreas T1 - Arousing Enthusiasm for STEM: Teaching 3D Printing Technology T2 - Conference Proceedings: New Perspectives in Science Education Y1 - 2017 SN - 978-88-6292-847-2 SP - 87 EP - 92 PB - liberiauniversitaria.it CY - Padua ER - TY - CHAP A1 - Steuer-Dankert, Linda A1 - Sharma, Mamta Rameshwarlal A1 - Bleck, Wolfgang A1 - Leicht-Scholten, Carmen ED - Farn, C. K. T1 - Innovation through Diversity - Development of a Diversity and Innovation management concept T2 - International Conference on Innovation and Management : IAM23017S : Date: July 4-7, 2017, Osaka, Japan N2 - Acknowledging that a diverse workforce could be a potential source of innovation, the current research deals with the fine details of why diversity management is central to achieving innovation in heterogeneous research groups and how this could be effectively realized in an organization. The types of heterogeneities addressed mainly include gender, qualification, academic discipline and intercultural perspectives. The type of organization being dealt with in this work is a complex association of research institutes at a technical university in Germany (RWTH Aachen University), namely a 'Cluster of Excellence', whereby several institutes of the university work collaboratively in different sub-projects. The 'Cluster of Excellence' is a part of the 'Excellence Initiative' of the German federal and state governments German Research Foundation (DFG) and German Council of Science and Humanities, with the ultimate aim of promoting cutting-edge research. To support interdisciplinary collaboration and thus the performance of the cluster, the development of a diversity and innovation management concept is presently in the conceptual phase and will be described in the frame of this paper. The 3-S-Diversity Model, composed of the three elements: skills, structure and strategy, serves as a basis for the development of the concept. The proposed concept consists of six phases; the first two phases lay the ground work by developing an understanding of the status quo on the forms of diversity in the Cluster of Excellence, the type of organizational structure of the member institutes and the varieties of specialist work cultures of the same. The third and the fourth phases build up on this foundation by means of qualitative and quantitative studies. While the third phase deals with the sensitization of the management level to the close connection between diversity and innovation; the need to manage them thereafter and find tailor-made methods of doing so, the fourth phase shall mainly focus on the mindset of the employees in this regard. The fifth phase shall consolidate the learnings and the ideas developed in the course of the first four phases into an implementable strategy. The ultimate phase shall be the implementation of this concept in the Cluster. The first three phases have been accomplished successfully and the preliminary results are already available. Y1 - 2017 SN - 2218-6387 SP - Panel C PB - Kuang Hui Chiu CY - Osaka ER - TY - CHAP A1 - Walenta, Robert A1 - Schellekens, Twan A1 - Ferrein, Alexander A1 - Schiffer, Stefan T1 - A decentralised system approach for controlling AGVs with ROS T2 - AFRICON, Proceedings Y1 - 2017 SN - 978-1-5386-2775-4 U6 - https://doi.org/10.1109/AFRCON.2017.8095693 SN - 2153-0033 N1 - AFRICON <2017, 18-20 Sept., Cape Town, South Africa> SP - 1436 EP - 1441 PB - IEEE ER - TY - CHAP A1 - Sauerborn, Markus A1 - Liebenstund, Lena A1 - Raue, Markus A1 - Mang, Thomas A1 - Herrmann, Ulf A1 - Dueing, Andreas T1 - Analytic method for material aging and quality analyzing to forecast long time stability of plastic micro heliostat components T2 - AIP Conference Proceedings Y1 - 2017 U6 - https://doi.org/10.1063/1.4984388 VL - 1850 IS - 1 SP - 030045-1 EP - 030045-8 ER - TY - CHAP A1 - Schreiber, Marc A1 - Kraft, Bodo A1 - Zündorf, Albert T1 - Metrics Driven Research Collaboration: Focusing on Common Project Goals Continuously T2 - 39th International Conference on Software Engineering, May 20-28, 2017 - Buenos Aires, Argentina N2 - Research collaborations provide opportunities for both practitioners and researchers: practitioners need solutions for difficult business challenges and researchers are looking for hard problems to solve and publish. Nevertheless, research collaborations carry the risk that practitioners focus on quick solutions too much and that researchers tackle theoretical problems, resulting in products which do not fulfill the project requirements. In this paper we introduce an approach extending the ideas of agile and lean software development. It helps practitioners and researchers keep track of their common research collaboration goal: a scientifically enriched software product which fulfills the needs of the practitioner’s business model. This approach gives first-class status to application-oriented metrics that measure progress and success of a research collaboration continuously. Those metrics are derived from the collaboration requirements and help to focus on a commonly defined goal. An appropriate tool set evaluates and visualizes those metrics with minimal effort, and all participants will be pushed to focus on their tasks with appropriate effort. Thus project status, challenges and progress are transparent to all research collaboration members at any time. Y1 - 2017 N1 - Software Engineering in Practice (SEIP). ICSE2017 Vorabversion der Autoren ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Peterson, Leif Arne A1 - Röth, Thilo A1 - Uibel, Thomas ED - Uibel, Thormas ED - Peterson, Leif Arne ED - Baumann, Marcus T1 - Holzwerkstoffe in Karosseriestrukturen T2 - Tagungsband Aachener Holzbautagung 2017 Y1 - 2017 SN - 2197-4489 SP - 34 EP - 45 ER - TY - CHAP A1 - Schmidts, Oliver A1 - Boltes, Maik A1 - Kraft, Bodo A1 - Schreiber, Marc T1 - Multi-pedestrian tracking by moving Bluetooth-LE beacons and stationary receivers T2 - 2017 International Conference on Indoor Positioning and Indoor Navigation (IPIN), 18-21 September 2017, Sapporo, Japan Y1 - 2017 N1 - International Conference on Indoor Positioning and Indoor Navigation <8, 2017, Sapporo, Japan> SP - 1 EP - 4 ER - TY - CHAP A1 - Barnat, Miriam A1 - Knutzen, S. ED - Mai, Andreas T1 - Erfolgsstrategien für organisationales Lernen T2 - Hochschulwege 2015 : Wie verändern Projekte die Hochschulen? ; Dokumentation der Tagung in Weimar im März 2015 Y1 - 2017 SN - 978-3-7439-1763-7 SP - 91 EP - 108 PB - tredition CY - Hamburg ER - TY - CHAP A1 - Enning, Manfred A1 - Fratscher, René T1 - Funk-Kommunikation für Güterwagen: Prinzipien und Anwendungsbeispiel T2 - IRSA International Railway Symposium Aachen Y1 - 2017 N1 - IRSA International Railway Symposium <2017, Aachen, Germany> SP - 1 EP - 16 ER - TY - CHAP A1 - Funke, Harald A1 - Keinz, Jan A1 - Hendrick, P. T1 - Experimental Evaluation of the Pollutant and Noise Emissions of the GTCP 36-300 Gas Turbine Operated with Kerosene and a Low NOX Micromix Hydrogen Combustor T2 - 7th European Conference for Aeronautics and Space Sciences, EUCASS 2017 Y1 - 2017 U6 - https://doi.org/10.13009/EUCASS2017-125 ER - TY - CHAP A1 - Altherr, Lena A1 - Pelz, Peter F. A1 - Ederer, Thorsten A1 - Pfetsch, Marc E. ED - Jacobs, Georg T1 - Optimale Getriebe auf Knopfdruck: Gemischt-ganzzahlige nichtlineare Optimierung zur Entscheidungsunterstützung bei der Auslegung von Getrieben für Kraftfahrzeuge T2 - Antriebstechnisches Kolloquium ATK 2017 Y1 - 2017 SN - 9783743148970 N1 - Antriebstechnisches Kolloquium ATK 2017, 07.03-08.03.2017. Aachen, Deutschland SP - 313 EP - 325 ER - TY - CHAP A1 - Altherr, Lena A1 - Ederer, Thorsten A1 - Schänzle, Christian A1 - Lorenz, Ulf A1 - Pelz, Peter F. T1 - Algorithmic system design using scaling and affinity laws T2 - Operations Research Proceedings 2015 N2 - Energy-efficient components do not automatically lead to energy-efficient systems. Technical Operations Research (TOR) shifts the focus from the single component to the system as a whole and finds its optimal topology and operating strategy simultaneously. In previous works, we provided a preselected construction kit of suitable components for the algorithm. This approach may give rise to a combinatorial explosion if the preselection cannot be cut down to a reasonable number by human intuition. To reduce the number of discrete decisions, we integrate laws derived from similarity theory into the optimization model. Since the physical characteristics of a production series are similar, it can be described by affinity and scaling laws. Making use of these laws, our construction kit can be modeled more efficiently: Instead of a preselection of components, it now encompasses whole model ranges. This allows us to significantly increase the number of possible set-ups in our model. In this paper, we present how to embed this new formulation into a mixed-integer program and assess the run time via benchmarks. We present our approach on the example of a ventilation system design problem. KW - Optimal Topology KW - Piecewise Linearization KW - Ventilation System KW - Similarity Theory Y1 - 2017 SN - 978-3-319-42901-4 SN - 978-3-319-42902-1 U6 - https://doi.org/10.1007/978-3-319-42902-1 N1 - International Conference of the German, Austrian and Swiss Operations Research Societies (GOR, ÖGOR, SVOR/ASRO), University of Vienna, Austria, September 1-4, 2015 SP - 605 EP - 611 PB - Springer CY - Cham ER - TY - CHAP A1 - Altherr, Lena A1 - Ederer, Thorsten A1 - Farnetane, Lucas S. A1 - Pöttgen, Philipp A1 - Vergé, Angela A1 - Pelz, Peter F. T1 - Multicriterial design of a hydrostatic transmission system via mixed-integer programming T2 - Operations Research Proceedings 2015 N2 - In times of planned obsolescence the demand for sustainability keeps growing. Ideally, a technical system is highly reliable, without failures and down times due to fast wear of single components. At the same time, maintenance should preferably be limited to pre-defined time intervals. Dispersion of load between multiple components can increase a system’s reliability and thus its availability inbetween maintenance points. However, this also results in higher investment costs and additional efforts due to higher complexity. Given a specific load profile and resulting wear of components, it is often unclear which system structure is the optimal one. Technical Operations Research (TOR) finds an optimal structure balancing availability and effort. We present our approach by designing a hydrostatic transmission system. Y1 - 2017 SN - 978-3-319-42901-4 SN - 978-3-319-42902-1 U6 - https://doi.org/10.1007/978-3-319-42902-1_41 N1 - International Conference of the German, Austrian and Swiss Operations Research Societies (GOR, ÖGOR, SVOR/ASRO), University of Vienna, Austria, September 1-4, 2015 SP - 301 EP - 307 PB - Springer CY - Cham ER - TY - CHAP A1 - Schnejider, Dominik A1 - Wisselink, Frank A1 - Czarnecki, Christian ED - Eibl, Maximilian ED - Gaedke, Martin ED - Gesellschaft für Informatik e. V. (GI), T1 - Transformation von Wertschöpfungsketten durch das Internet der Dinge – Bewertungsrahmen und Fallstudie T2 - GI Edition Proceedings Band 275 INFORMATIK 2017 N2 - Momentan finden in vielen Branchen umfassende Veränderungen von Märkten und Wertschöpfungsketten statt, welche auch als Digitale Transformation bezeichnet werden. In diesem Zusammenhang wird das Internet der Dinge (Internet of Things, IoT) als ein wichtiger technischer Enabler der Veränderungen angesehen. Primäre Ziele des IoT sind die Steuerung physischer Gegen-stände aus der Distanz und das Erfassen von Informationen aus dem Umfeld dieser Gegenstände. Welche neuen Geschäfts-bzw. Partnermodelle entstehen durch die gemeinsame Nutzung von IoT-Daten und Big-Data-Technologien und welcher qualitative Mehrwert wird dadurch geschaffen? Als Antwort wird in diesem Beitrag ein Bewertungsrahmen zur qualitativen Wertschöpfungsanalyse von IoT vorgeschlagen. Anhand dieses Bewertungsrahmens wird ein Anwendungsfall untersucht, der in anonymisierter Form an konkrete Praxisprojekte angelehnt ist. Konkret wird ein Anwendungsfall betrachtet, der eine Abfallwirtschaft 2.0 basierend auf dem Einsatz von IoT vorschlägt. Aus den Untersuchungsergebnissen gehen beispielsweise Erkenntnisse hervor, wie Geschäftsmodelle auf Basis eines unentgeltlichen Informationsaustauschs durch IoT gestaltet werden können. KW - Digitale Transformation KW - Unternehmensarchitekturen KW - Unternehmensarchitekturen Internet der Dinge KW - Geschäftsmodelle KW - Wertschöpfungskettenanalyse Y1 - 2017 SN - 978-3-88579-669-5 U6 - https://doi.org/10.18420/in2017_208 SN - 1617-5468 N1 - Unternehmensarchitektur in Forschung und Praxis, Chemnitz, 25.-29. September 2017 SP - 2081 EP - 2094 PB - Köllen CY - Bonn ER - TY - CHAP A1 - Thomé, Tristan Eberhard A1 - Czarnecki, Christian A1 - Auth, Gunnar A1 - Bensberg, Frank ED - Barton, Thomas ED - Herrmann, Frank ED - Meister, Vera G. ED - Müller, Christian ED - Seel, Christian T1 - Erweiterung des Referenzprozessmodells eTOM um die Anforderungen des deutschen IT-Sicherheitsgesetzes T2 - Prozesse, Technologie, Anwendungen, Systeme und Management 2017. Angewandte Forschung in der Wirtschaftsinformatik N2 - Kritische Infrastrukturen sind primäre Ziele krimineller Hacker. Der Deutsche Bundestag reagierte darauf am 25. Juli 2015 mit einem Gesetz zur Verbesserung der Sicherheit von ITSystemen, dem IT-Sicherheitsgesetz. Dies verlangt von Betreibern kritischer Infrastrukturen, angemessene Mindeststandards für organisatorische und technische Sicherheit zu implementieren, um den Betrieb und die Verfügbarkeit dieser Infrastruktur zu gewährleisten. Telekommunikationsunternehmen sind einerseits von diesem Gesetz in besonderem Maße betroffen und verfügen andererseits mit dem Rahmenwerk enhanced Telecom Operations Map (eTOM) über ein international anerkanntes Referenzmodell zur Gestaltung von Geschäftsprozessen in dieser Branche. Da sämtliche Telekommunikationsunternehmen in Deutschland verpflichtet sind, das Gesetz innerhalb eines bestimmten Zeitrahmens zu implementieren, präsentiert dieser Beitrag einen Vorschlag zur Erweiterung von eTOM um die relevanten Anforderungen des deutschen IT-Sicherheitsgesetzes. Y1 - 2017 SN - 978-3-944330-56-3 N1 - Tagungsband zur 30. AKWI-Jahrestagung vom 17.09.2017 bis 20.09.2017 an der Hochschule Aschaffenburg SP - 51 EP - 60 PB - mana-Buch CY - Heide ER -