TY - CHAP A1 - Hüning, Felix A1 - Mund, Cindy T1 - Integration of agile development in standard labs T2 - 51st Annual Conference of the European Society for Engineering Education (SEFI) N2 - In addition to the technical content, modern courses at university should also teach professional skills to enhance the competencies of students towards their future work. The competency driven approach including technical as well as professional skills makes it necessary to find a suitable way for the integration into the corresponding module in a scalable and flexible manner. Agile development, for example, is essential for the development of modern systems and applications and makes use of dedicated professional skills of the team members, like structured group dynamics and communication, to enable the fast and reliable development. This paper presents an easy to integrate and flexible approach to integrate Scrum, an agile development method, into the lab of an existing module. Due to the different role models of Scrum the students have an individual learning success, gain valuable insight into modern system development and strengthen their communication and organization skills. The approach is implemented and evaluated in the module Vehicle Systems, but it can be transferred easily to other technical courses as well. The evaluation of the implementation considers feedback of all stakeholders, students, supervisor and lecturers, and monitors the observations during project lifetime. KW - professional skills KW - active learning KW - lab work KW - Agile development Y1 - 2023 U6 - https://doi.org/10.21427/NK4Z-WS73 N1 - 51st Annual Conference of the European Society for Engineering Education, Technological University Dublin, 10th-14th September, 2023 ER - TY - CHAP A1 - Steuer-Dankert, Linda T1 - A crazy little thing called sustainability T2 - 51st Annual Conference of the European Society for Engineering Education (SEFI) N2 - Achieving the 17 Sustainable Development Goals (SDGs) set by the United Nations (UN) in 2015 requires global collaboration between different stakeholders. Industry, and in particular engineers who shape industrial developments, have a special role to play as they are confronted with the responsibility to holistically reflect sustainability in industrial processes. This means that, in addition to the technical specifications, engineers must also question the effects of their own actions on an ecological, economic and social level in order to ensure sustainable action and contribute to the achievement of the SDGs. However, this requires competencies that enable engineers to apply all three pillars of sustainability to their own field of activity and to understand the global impact of industrial processes. In this context, it is relevant to understand how industry already reflects sustainability and to identify competences needed for sustainable development. KW - Transformative Competencies KW - Future Skills KW - Transdisciplinarity KW - Interdisciplinarity KW - Sustainability Y1 - 2023 U6 - https://doi.org/10.21427/9CQR-VC94 N1 - 51st Annual Conference of the European Society for Engineering Education, Technological University Dublin, 10th-14th September, 2023 ER - TY - CHAP A1 - Grund, Raphael M. A1 - Altherr, Lena ED - Reiff-Stephan, Jörg ED - Jäkel, Jens ED - Schwarz, André T1 - Development of an open source energy disaggregation tool for the home automation platform Home Assistant T2 - Tagungsband AALE 2023 : mit Automatisierung gegen den Klimawandel N2 - In order to reduce energy consumption of homes, it is important to make transparent which devices consume how much energy. However, power consumption is often only monitored aggregated at the house energy meter. Disaggregating this power consumption into the contributions of individual devices can be achieved using Machine Learning. Our work aims at making state of the art disaggregation algorithms accessibe for users of the open source home automation platform Home Assistant. KW - Home Automation Platform KW - Home Assistant KW - Open Source KW - Machine Learning KW - Energy Disaggregation Y1 - 2023 SN - 978-3-910103-01-6 U6 - https://doi.org/10.33968/2023.02 N1 - 19. AALE-Konferenz. Luxemburg, 08.03.-10.03.2023. BTS Connected Buildings & Cities Luxemburg (Tagungsband unter https://doi.org/10.33968/2023.01) SP - 11 EP - 20 PB - le-tex publishing services GmbH CY - Leipzig ER - TY - CHAP A1 - Becker, Tim A1 - Bragard, Michael T1 - Low-Voltage DC Training Lab for Electric Drives - Optimizing the Balancing Act Between High Student Throughput and Individual Learning Speed T2 - 2024 IEEE Global Engineering Education Conference (EDUCON) N2 - After a brief introduction of conventional laboratory structures, this work focuses on an innovative and universal approach for a setup of a training laboratory for electric machines and drive systems. The novel approach employs a central 48 V DC bus, which forms the backbone of the structure. Several sets of DC machine, asynchronous machine and synchronous machine are connected to this bus. The advantages of the novel system structure are manifold, both from a didactic and a technical point of view: Student groups can work on their own performance level in a highly parallelized and at the same time individualized way. Additional training setups (similar or different) can easily be added. Only the total power dissipation has to be provided, i.e. the DC bus balances the power flow between the student groups. Comparative results of course evaluations of several cohorts of students are shown. KW - Synchronous machines KW - Power dissipation KW - Throughput KW - Low voltage KW - DC machines KW - Manifolds KW - Training Y1 - 2024 U6 - https://doi.org/10.1109/EDUCON60312.2024.10578902 SN - 2165-9559 SN - 2165-9567 (eISSN) N1 - 2024 IEEE Global Engineering Education Conference (EDUCON), 08-11 May 2024, Kos Island, Greece PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Wittig, M. A1 - Rütters, René A1 - Bragard, Michael ED - Reiff-Stephan, Jörg ED - Jäkel, Jens ED - Schwarz, André T1 - Application of RL in control systems using the example of a rotatory inverted pendulum T2 - Tagungsband AALE 2024 : Fit für die Zukunft: praktische Lösungen für die industrielle Automation N2 - In this paper, the use of reinforcement learning (RL) in control systems is investigated using a rotatory inverted pendulum as an example. The control behavior of an RL controller is compared to that of traditional LQR and MPC controllers. This is done by evaluating their behavior under optimal conditions, their disturbance behavior, their robustness and their development process. All the investigated controllers are developed using MATLAB and the Simulink simulation environment and later deployed to a real pendulum model powered by a Raspberry Pi. The RL algorithm used is Proximal Policy Optimization (PPO). The LQR controller exhibits an easy development process, an average to good control behavior and average to good robustness. A linear MPC controller could show excellent results under optimal operating conditions. However, when subjected to disturbances or deviations from the equilibrium point, it showed poor performance and sometimes instable behavior. Employing a nonlinear MPC Controller in real time was not possible due to the high computational effort involved. The RL controller exhibits by far the most versatile and robust control behavior. When operated in the simulation environment, it achieved a high control accuracy. When employed in the real system, however, it only shows average accuracy and a significantly greater performance loss compared to the simulation than the traditional controllers. With MATLAB, it is not yet possible to directly post-train the RL controller on the Raspberry Pi, which is an obstacle to the practical application of RL in a prototyping or teaching setting. Nevertheless, RL in general proves to be a flexible and powerful control method, which is well suited for complex or nonlinear systems where traditional controllers struggle. KW - Rotatory Inverted Pendulum KW - MPC KW - LQR KW - PPO KW - Reinforcement Learning Y1 - 2024 SN - 978-3-910103-02-3 U6 - https://doi.org/10.33968/2024.53 N1 - 20. AALE-Konferenz. Bielefeld, 06.03.-08.03.2024. (Tagungsband unter https://doi.org/10.33968/2024.29) SP - 241 EP - 248 PB - le-tex publishing services GmbH CY - Leipzig ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - https://doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - CHAP A1 - Chajan, Eduard A1 - Schulte-Tigges, Joschua A1 - Reke, Michael A1 - Ferrein, Alexander A1 - Matheis, Dominik A1 - Walter, Thomas T1 - GPU based model-predictive path control for self-driving vehicles T2 - IEEE Intelligent Vehicles Symposium (IV) N2 - One central challenge for self-driving cars is a proper path-planning. Once a trajectory has been found, the next challenge is to accurately and safely follow the precalculated path. The model-predictive controller (MPC) is a common approach for the lateral control of autonomous vehicles. The MPC uses a vehicle dynamics model to predict the future states of the vehicle for a given prediction horizon. However, in order to achieve real-time path control, the computational load is usually large, which leads to short prediction horizons. To deal with the computational load, the control algorithm can be parallelized on the graphics processing unit (GPU). In contrast to the widely used stochastic methods, in this paper we propose a deterministic approach based on grid search. Our approach focuses on systematically discovering the search area with different levels of granularity. To achieve this, we split the optimization algorithm into multiple iterations. The best sequence of each iteration is then used as an initial solution to the next iteration. The granularity increases, resulting in smooth and predictable steering angle sequences. We present a novel GPU-based algorithm and show its accuracy and realtime abilities with a number of real-world experiments. KW - Heuristic algorithms KW - Computational modeling KW - model-predictive control KW - GPU KW - autonomous driving Y1 - 2021 SN - 978-1-7281-5394-0 U6 - https://doi.org/10.1109/IV48863.2021.9575619 N1 - 2021 IEEE Intelligent Vehicles Symposium (IV), July 11-17, 2021. Nagoya, Japan SP - 1243 EP - 1248 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Schwanke, Peter A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Security Analysis of the ADS Protocol of a Beckhoff CX2020 PLC N2 - ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Stöbe, Rolf A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko A1 - Breuer, Michael T1 - Artificial ageing of mobile devices using a simulated GSM/GPRS network T2 - Eighth International Conference on Availability, Reliability and Security (ARES) : 2-6 Sept. 2013, Regensburg Y1 - 2013 SP - 493 EP - 497 PB - IEEE ER - TY - CHAP A1 - Reke, Michael A1 - Peter, Daniel A1 - Schulte-Tigges, Joschua A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Walter, Thomas A1 - Matheis, Dominik T1 - A Self-Driving Car Architecture in ROS2 T2 - 2020 International SAUPEC/RobMech/PRASA Conference, Cape Town, South Africa N2 - In this paper we report on an architecture for a self-driving car that is based on ROS2. Self-driving cars have to take decisions based on their sensory input in real-time, providing high reliability with a strong demand in functional safety. In principle, self-driving cars are robots. However, typical robot software, in general, and the previous version of the Robot Operating System (ROS), in particular, does not always meet these requirements. With the successor ROS2 the situation has changed and it might be considered as a solution for automated and autonomous driving. Existing robotic software based on ROS was not ready for safety critical applications like self-driving cars. We propose an architecture for using ROS2 for a self-driving car that enables safe and reliable real-time behaviour, but keeping the advantages of ROS such as a distributed architecture and standardised message types. First experiments with an automated real passenger car at lower and higher speed-levels show that our approach seems feasible for autonomous driving under the necessary real-time conditions. Y1 - 2020 SN - 978-1-7281-4162-6 U6 - https://doi.org/10.1109/SAUPEC/RobMech/PRASA48453.2020.9041020 N1 - 2020 International SAUPEC/RobMech/PRASA Conference, 29-31 Jan. 2020, Cape Town, South Africa SP - 1 EP - 6 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Schnell, Michael A1 - Brandes, Sinja A1 - Gligorevic, Snjezana A1 - Walter, Michael A1 - Rihacek, Christoph A1 - Sajatovic, Miodrag A1 - Haindl, Bernhard T1 - Interference mitigation for broadband L-DACS T2 - 27th IEEE/AIAA Digital Avionics Systems Conference : DASC 2008 : 26-30 Oct. 2008, St. Paul, Minn. Y1 - 2008 SN - 978-1-4244-2207-4 ; 978-1-4244-2208-1 SP - 2B2-1 EP - 2B2-12 ER - TY - CHAP A1 - Lindenlauf, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Cold Boot Attacks on DDR2 and DDR3 SDRAM T2 - 10th International Conference on Availability, Reliability and Security (ARES) 2015 Y1 - 2015 U6 - https://doi.org/10.1109/ARES.2015.28 SP - 287 EP - 292 ER - TY - CHAP A1 - Granat, Andreas A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Intrusion Detection of the ICS Protocol EtherCAT N2 - Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level. Y1 - 2017 N1 - International Conference on Computer, Network Security and Communication Engineering (CNSCE 2017), March 26-27, 2017, Bangkok, Thailand SP - 1 EP - 5 ER - TY - CHAP A1 - Gligorevic, Snjezana A1 - Jost, T. A1 - Walter, Michael T1 - Scatterer based airport surface channel model T2 - IEEE/AIAA 28th Digital Avionics Systems Conference : DASC '09 ; 23 - 29 [i.e. 25 - 29] Oct. 2009, Orlando, Fla. Y1 - 2009 SN - 978-1-4244-4078-8 SP - 4C2-1 EP - 4C2-10 ER - TY - CHAP A1 - Logen, Steffen A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Simplifying RAM Forensics : A GUI and Extensions for the Volatility Framework T2 - 2012 Seventh International Conference on Availability, Reliability and Security (ARES), 20-24 August 2012, Prague, Czech Republic N2 - The Volatility Framework is a collection of tools for the analysis of computer RAM. The framework offers a multitude of analysis options and is used by many investigators worldwide. Volatility currently comes with a command line interface only, which might be a hinderer for some investigators to use the tool. In this paper we present a GUI and extensions for the Volatility Framework, which on the one hand simplify the usage of the tool and on the other hand offer additional functionality like storage of results in a database, shortcuts for long Volatility Framework command sequences, and entirely new commands based on correlation of data stored in the database. Y1 - 2012 SN - 978-1-4673-2244-7 U6 - https://doi.org/10.1109/ARES.2012.12 SP - 620 EP - 624 PB - IEEE CY - New York ER - TY - CHAP A1 - Vladova, Gergana A1 - Ullrich, André A1 - Sultanow, Eldar A1 - Tobolla, Marinho A1 - Sebrak, Sebastian A1 - Czarnecki, Christian A1 - Brockmann, Carsten T1 - Visual analytics for knowledge management T2 - INFORMATIK 2023 - Designing Futures: Zukünfte gestalten N2 - The management of knowledge in organizations considers both established long-term processes and cooperation in agile project teams. Since knowledge can be both tacit and explicit, its transfer from the individual to the organizational knowledge base poses a challenge in organizations. This challenge increases when the fluctuation of knowledge carriers is exceptionally high. Especially in large projects in which external consultants are involved, there is a risk that critical, company-relevant knowledge generated in the project will leave the company with the external knowledge carrier and thus be lost. In this paper, we show the advantages of an early warning system for knowledge management to avoid this loss. In particular, the potential of visual analytics in the context of knowledge management systems is presented and discussed. We present a project for the development of a business-critical software system and discuss the first implementations and results. Y1 - 2023 SN - 978-3-88579-731-9 U6 - https://doi.org/10.18420/inf2023_187 SN - 1617-5468 N1 - INFORMATIK 2023, 26. - 29. September 2023, Berlin SP - 1851 EP - 1870 PB - GI - Gesellschaft für Informatik CY - Bonn ER - TY - CHAP A1 - Chircu, Alina A1 - Czarnecki, Christian A1 - Friedmann, Daniel A1 - Pomaskow, Johanna A1 - Sultanow, Eldar T1 - Towards a Digital Twin of Society T2 - Proceedings of the 56th Hawaii International Conference on System Sciences 2023 N2 - This paper describes the potential for developing a digital twin of society- a dynamic model that can be used to observe, analyze, and predict the evolution of various societal aspects. Such a digital twin can help governmental agencies and policy makers in interpreting trends, understanding challenges, and making decisions regarding investments or policies necessary to support societal development and ensure future prosperity. The paper reviews related work regarding the digital twin paradigm and its applications. The paper presents a motivating case study- an analysis of opportunities and challenges faced by the German federal employment agency, Bundesagentur f¨ur Arbeit (BA), proposes solutions using digital twins, and describes initial proofs of concept for such solutions. KW - Digital twin KW - Digital transformation KW - Prototype KW - Society KW - Stress testing Y1 - 2023 SN - 978-0-9981331-6-4 N1 - 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023 SP - 6748 EP - 6757 PB - University of Hawai'i CY - Honolulu ER - TY - CHAP A1 - Scholl, Ingrid A1 - Bartella, Alexander K. A1 - Moluluo, Cem A1 - Ertural, Berat A1 - Laing, Frederic A1 - Suder, Sebastian T1 - MedicVR : Acceleration and Enhancement Techniques for Direct Volume Rendering in Virtual Reality T2 - Bildverarbeitung für die Medizin 2019 : Algorithmen – Systeme – Anwendungen Y1 - 2019 SN - 978-3-658-25326-4 U6 - https://doi.org/10.1007/978-3-658-25326-4_32 SP - 152 EP - 157 PB - Springer Vieweg CY - Wiesbaden ER - TY - CHAP A1 - Broenner, Simon A1 - Höfken, Hans-Wilhelm A1 - Schuba, Marko T1 - Streamlining extraction and analysis of android RAM images T2 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP N2 - The Android operating system powers the majority of the world’s mobile devices and has been becoming increasingly important in day-to-day digital forensics. Therefore, technicians and analysts are in need of reliable methods for extracting and analyzing memory images from live Android systems. This paper takes different existing, extraction methods and derives a universal, reproducible, reliably documented method for both extraction and analysis. In addition the VOLIX II front-end for the Volatility Framework is extended with additional functionality to make the analysis of Android memory images easier for technically non-adept users. Y1 - 2016 SN - 978-989-758-167-0 U6 - https://doi.org/10.5220/0005652802550264 SP - 255 EP - 264 PB - SciTePress CY - Setúbal ER - TY - CHAP A1 - Kramer, Pia A1 - Bragard, Michael A1 - Ritz, Thomas A1 - Ferfer, Ute A1 - Schiffers, Tim T1 - Visualizing, Enhancing and Predicting Students’ Success through ECTS Monitoring T2 - 2024 IEEE Global Engineering Education Conference (EDUCON) N2 - This paper serves as an introduction to the ECTS monitoring system and its potential applications in higher education. It also emphasizes the potential for ECTS monitoring to become a proactive system, supporting students by predicting academic success and identifying groups of potential dropouts for tailored support services. The use of the nearest neighbor analysis is suggested for improving data analysis and prediction accuracy. KW - Monitoring KW - Engineering education KW - Data visualization KW - Accuracy KW - Data analysis Y1 - 2024 U6 - https://doi.org/10.1109/EDUCON60312.2024.10578652 SN - 2165-9559 SN - 2165-9567 (eISSN) N1 - 2024 IEEE Global Engineering Education Conference (EDUCON), 08-11 May 2024, Kos Island, Greece PB - IEEE CY - New York, NY ER -