TY - CHAP A1 - Müller, Tim M. A1 - Altherr, Lena A1 - Leise, Philipp A1 - Pelz, Peter F. T1 - Optimization of pumping systems for buildings: Experimental validation of different degrees of model detail on a modular test rig T2 - Operations Research Proceedings 2019 N2 - Successful optimization requires an appropriate model of the system under consideration. When selecting a suitable level of detail, one has to consider solution quality as well as the computational and implementation effort. In this paper, we present a MINLP for a pumping system for the drinking water supply of high-rise buildings. We investigate the influence of the granularity of the underlying physical models on the solution quality. Therefore, we model the system with a varying level of detail regarding the friction losses, and conduct an experimental validation of our model on a modular test rig. Furthermore, we investigate the computational effort and show that it can be reduced by the integration of domain-specific knowledge. KW - Experimental validation KW - MINLP KW - Engineering optimization KW - Water supply system KW - Network design Y1 - 2020 SN - 978-3-030-48438-5 U6 - https://doi.org/10.1007/978-3-030-48439-2_58 N1 - Annual International Conference of the German Operations Research Society (GOR), Dresden, Germany, September 4-6, 2019 SP - 481 EP - 488 PB - Springer CY - Cham ER - TY - CHAP A1 - Alhwarin, Faraj A1 - Ferrein, Alexander A1 - Scholl, Ingrid T1 - CRVM: Circular Random Variable-based Matcher - A Novel Hashing Method for Fast NN Search in High-dimensional Spaces T2 - Proceedings of the 7th International Conference on Pattern Recognition Applications and Methods, ICPRAM 2018 Y1 - 2018 SN - 978-989-758-276-9 U6 - https://doi.org/10.5220/0006692802140221 SP - 214 EP - 221 ER - TY - CHAP A1 - Alhwarin, Faraj A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Scholl, Ingrid T1 - Optimized KinectFusion Algorithm for 3D Scanning Applications T2 - Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies - Volume 2: BIOIMAGING Y1 - 2018 SN - 978-989-758-278-3 U6 - https://doi.org/10.5220/0006594700500057 SP - 50 EP - 57 ER - TY - CHAP A1 - Hofmann, Till A1 - Mataré, Victor A1 - Schiffer, Stefan A1 - Ferrein, Alexander A1 - Lakemeyer, Gerhard T1 - Constraint-based online transformation of abstract plans into executable robot actions T2 - Proceedings of the 2018 AAAI Spring Symposium on Integrating Representation, Reasoning, Learning, and Execution for Goal Directed Autonomy Y1 - 2018 SP - 549 EP - 553 ER - TY - CHAP A1 - Ferrein, Alexander A1 - Schiffer, Stefan A1 - Kallweit, Stephan T1 - The ROSIN Education Concept - Fostering ROS Industrial-Related Robotics Education in Europe T2 - ROBOT 2017: Third Iberian Robotics Conference Y1 - 2018 SN - 978-3-319-70836-2 U6 - https://doi.org/10.1007/978-3-319-70836-2_31 N1 - Advances in Intelligent Systems and Computing, vol 694; (AISC, volume 694) SP - 370 EP - 381 PB - Springer CY - Cham ER - TY - CHAP A1 - Hofmann, Till A1 - Mataré, Victor A1 - Neumann, Tobias A1 - Schönitz, Sebastian A1 - Henke, Christoph A1 - Limpert, Nicolas A1 - Niemueller, Tim A1 - Ferrein, Alexander A1 - Jeschke, Sabina A1 - Lakemeyer, Gerhard T1 - Enhancing Software and Hardware Reliability for a Successful Participation in the RoboCup Logistics League 2017 Y1 - 2018 SN - 978-3-030-00308-1 U6 - https://doi.org/10.1007/978-3-030-00308-1_40 N1 - Lecture Notes in Computer Science, vol 11175 SP - 486 EP - 497 PB - Springer CY - Cham ER - TY - CHAP A1 - Essingholt, Felix A1 - Meyer, Frederic A1 - Kuhn, Peter A1 - Schmidt, Philip A1 - Benkner, Thorsten A1 - Grabmaier, Anton T1 - Non-invasive heart beat measurement using microwave resonators T2 - Proceedings, Vol. 2, Eurosensors 2018 Conference, Graz, Austria, 9–12 September 2018 Y1 - 2018 U6 - https://doi.org/10.3390/proceedings2131002 SN - 2504-3900 SP - 1002 PB - MDPI CY - Basel ER - TY - CHAP A1 - Heuermann, Holger A1 - Harzheim, Thomas A1 - Mühmel, Marc T1 - A maritime harmonic radar search and rescue system using passive and active tags T2 - 2020 17th European Radar Conference (EuRAD) N2 - This article introduces a new maritime search and rescue system based on S-band illumination harmonic radar (HR). Passive and active tags have been developed and tested attached to life jackets and a rescue boat. This system was able to detect and range the active tags up to a range of 5800 m in tests on the Baltic Sea with an antenna input power of only 100 W. All electronic GHz components of the system, excluding the S-band power amplifier, were custom developed for this purpose. Special attention is given to the performance and conceptual differences between passive and active tags used in the system and integration with a maritime X-band navigation radar is demonstrated. KW - Harmonic Radar KW - Rescue System KW - Frequency Doubler KW - Transponder KW - Tag Y1 - 2021 SN - 978-2-87487-061-3 U6 - https://doi.org/10.1109/EuRAD48048.2021.00030 N1 - 17th European Radar Conference, 13th - 15th January 2021, Utrecht, Netherlands SP - 73 EP - 76 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Ferrein, Alexander A1 - Meeßen, Marcus A1 - Limpert, Nicolas A1 - Schiffer, Stefan ED - Lepuschitz, Wilfried T1 - Compiling ROS schooling curricula via contentual taxonomies T2 - Robotics in Education N2 - The Robot Operating System (ROS) is the current de-facto standard in robot middlewares. The steadily increasing size of the user base results in a greater demand for training as well. User groups range from students in academia to industry professionals with a broad spectrum of developers in between. To deliver high quality training and education to any of these audiences, educators need to tailor individual curricula for any such training. In this paper, we present an approach to ease compiling curricula for ROS trainings based on a taxonomy of the teaching contents. The instructor can select a set of dedicated learning units and the system will automatically compile the teaching material based on the dependencies of the units selected and a set of parameters for a particular training. We walk through an example training to illustrate our work. Y1 - 2021 SN - 978-3-030-67411-3 U6 - https://doi.org/10.1007/978-3-030-67411-3_5 N1 - RiE: International Conference on Robotics in Education (RiE); Advances in Intelligent Systems and Computing book series (AISC, volume 1316) SP - 49 EP - 60 PB - Springer CY - Cham ER - TY - CHAP A1 - Hoegen, Anne von A1 - Doncker, Rik W. De A1 - Rütters, René T1 - Teaching Digital Control of Operational Amplifier Processes with a LabVIEW Interface and Embedded Hardware T2 - 2020 23rd International Conference on Electrical Machines and Systems (ICEMS) N2 - Control engineering theory is hard to grasp for undergraduates during the first semesters, as it deals with the dynamical behavior of systems also in combination with control strategies on an abstract level. Therefore, operational amplifier (OpAmp) processes are reasonable and very effective systems to connect mathematical description with actual system’s behavior. In this paper, we present an experiment for a laboratory session in which an embedded system, driven by a LabVIEW human machine interface (HMI) via USB, controls the analog circuits.With this setup we want to show the possibility of firstly, analyzing a first order process and secondly, designing a P-and PI-controller. Thereby, the theory of control engineering is always applied to the empirical results in order to break down the abstract level for the students. Y1 - 2020 U6 - https://doi.org/10.23919/ICEMS50442.2020.9290928 N1 - 23rd International Conference on Electrical Machines and Systems (ICEMS), 24-27 November 2020, Hamamatsu, Japan SP - 1117 EP - 1122 PB - IEEE CY - New York, NY ER - TY - CHAP A1 - Schuba, Marko A1 - Höfken, Hans-Wilhelm A1 - Linzbach, Sophie T1 - An ICS Honeynet for Detecting and Analyzing Cyberattacks in Industrial Plants T2 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET) N2 - Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed KW - Conpot KW - honeypot KW - honeynet KW - ICS KW - cybersecurity Y1 - 2022 SN - 978-1-6654-4231-2 SN - 978-1-6654-4232-9 U6 - https://doi.org/10.1109/ICECET52533.2021.9698746 N1 - 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET). 09-10 December 2021. Cape Town, South Africa. PB - IEEE ER - TY - CHAP A1 - Christian, Esser A1 - Montag, Tim A1 - Schuba, Marko A1 - Allhof, Manuel T1 - Future critical infrastructure and security - cyberattacks on charging stations T2 - 31st International Electric Vehicle Symposium & Exhibition and International Electric Vehicle Technology Conference (EVS31 & EVTeC 2018) Y1 - 2018 SN - 978-1-5108-9157-9 SP - 665 EP - 671 PB - Society of Automotive Engineers of Japan (JSAE) CY - Tokyo ER - TY - CHAP A1 - Maike, Müller A1 - Lenz, Laura A1 - Wolf, Martin T1 - Steigerung der Effektivität durch Prozessmodellierungs-Tools - Änderbarkeit und Transparenz von Prozessen am Beispiel der Business Simulation Apollo 13 T2 - Informatik 2014 N2 - Die Nutzung von Prozessmodellierungsmethoden oder - werkzeugen kann erheblichen Einfluss auf die Effektivität von Prozessen haben. Das gilt insbesondere für Situationen, in denen Personen unter Stress stehen oder ungeübt sind. In diesen Fällen geben Prozessmodelle konkrete Empfehlungen, nach denen sich die handelnden Personen richten könnten. In Experimenten mit der Business-Simulation Apollo 13 haben wir den Effekt eines Einsatzes von Prozessmodellierungsmethoden und -werkzeugen untersucht. Bereits bekannte Theorien (z.B. über geeignete Verhältnisse von Kommunikationsinhalten) konnten bestätigt werden. Darüber hinaus haben wir eine besondere Bedeutung der Übertragbarkeit von Prozessmodellen in konkrete Handlungen identifiziert. Y1 - 2014 SN - 978-3-88579-626-8 SN - 1617-5468 SP - 357 EP - 369 PB - Gesellschaft für Informatik e.V. CY - Bonn ER - TY - CHAP A1 - König, Johannes Alexander A1 - Völker, Veronika A1 - Wolf, Martin T1 - The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game’s story T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - During the development of a Competence Developing Game’s (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG’s target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories. KW - Competence Developing Game KW - Serious Game KW - Video Game KW - Story KW - Player Types Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 98 EP - 106 ER - TY - CHAP A1 - Dowidat, Linda A1 - König, Johannes Alexander A1 - Wolf, Martin T1 - The motivational competence developing game framework T2 - Mensch und Computer 2017 - Tagungsband N2 - Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper. KW - Competence Developing Games KW - Serious Games KW - Gamification KW - motivation theories KW - learning theories Y1 - 2017 U6 - https://doi.org/10.18420/muc2017-mci-0130 SP - 15 EP - 26 PB - Gesellschaft für Informatik e.V. CY - Regensburg ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin T1 - Cybersecurity awareness training provided by the competence developing game GHOST T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game KW - Awareness KW - CDG KW - Serious Game KW - tablet game KW - business simulation Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 81 EP - 87 ER - TY - CHAP A1 - Nees, Franz A1 - Stengel, Ingo A1 - Meister, Vera G. A1 - Barton, Thomas A1 - Herrmann, Frank A1 - Müller, Christian A1 - Wolf, Martin T1 - Angewandte Forschung in der Wirtschaftsinformatik 2020 : Tagungsband zur 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik / hrsg. von Franz Nees, Ingo Stengel, Vera G. Meister, Thomas Barton, Frank Herrmann, Christian Müller, Martin R. Wolf N2 - Tagungsbeiträge aus den Bereichen KI, Prozessorganisation und Plattformen für Geschäftsprozesse, Sicherheit und Datenschutz sowie Prototypen und Modelle. Y1 - 2020 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:kobv:526-opus4-13840 SN - 978-3-944330-66-2 N1 - 33. AKWI-Jahrestagung am 14.09.2020, ausgerichtet von der Hochschule Karlsruhe - Wirtschaft und Technik PB - mana-Buch CY - Heide ER - TY - CHAP A1 - Wolf, Martin A1 - Barton, Thomas A1 - Herrmann, Frank A1 - Meister, Vera G. A1 - Müller, Christian A1 - Seel, Christian T1 - Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung vom 15.09.2019 bis 18.09.2019 an der Fachhochschule für Angewandte Wissenschaften Aachen / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian Müller, Christian Seel N2 - Tagungsbeiträge aus den Bereichen Projektmanagement, Didaktik in der Wirtschaftsinformatik, IT-Sicherheit, Anwendungsfälle, Reifegradmodelle, Plattformen für Geschäftsprozesse und Prototypen. Y1 - 2019 U6 - http://nbn-resolving.de/urn/resolver.pl?urn:nbn:de:kobv:526-opus4-13026 SN - 978-3-944330-62-4 PB - mana-Buch CY - Heide ER - TY - CHAP A1 - Moll, Florian A1 - Köhler, Klemens A1 - Wolf, Martin T1 - Konzeption von IT-Sicherheitslösungen unter ethischen Gesichtspunkten am Beispiel einer Monitoring-App für mobile Endgeräte T2 - Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung N2 - Die steigende Popularität von mobilen Endgeräten im privaten und geschäftlichen Umfeld geht mit einem Anstieg an Sicherheitslücken und somit potentiellen Angriffsflächen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes können Monitoring-Apps dienen, die unerwünschtes Verhalten und Angriffe erkennen. Die automatisierte Überwachung von Endgeräten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilität der Nutzer und Nutzerinnen dieser Geräte in Bezug auf Privatsphäre, kann zu einer geringen Akzeptanz und Compliance führen. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess führt zu höherer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt Möglichkeiten zur Umsetzung. Y1 - 2019 SN - 978-3-944330-62-4 SP - 61 EP - 72 PB - mana-Buch CY - Heide ER - TY - CHAP A1 - Becker, Willi A1 - Wolf, Martin T1 - Entwicklung eines Einführungskonzepts für IT-Service-Management in KMU T2 - Angewandte Forschung in der Wirtschaftsinformatik 2019 : Tagungsband zur 32. AKWI-Jahrestagung / hrsg. von Martin R. Wolf, Thomas Barton, Frank Herrmann, Vera G. Meister, Christian Müller, Christian Seel N2 - Obwohl es eine Vielzahl von Einführungskonzepten für ITSM gibt, hat sich bisher keines dieser Konzepte auf breiter Linie durchgesetzt. Das gilt in erhöhtem Maße für ITSM-Einführungskonzepte für KMU, wohl nicht zuletzt aufgrund der Tatsache, dass der Mehrwert von ITSM für KMU aufgrund der geringeren Größe der IT-Organisationen nur entsprechend schwieriger generiert werden kann. Mit diesem Beitrag wird ein Einführungskonzept für ITSM in KMU systematisch hergeleitet. Dafür wurden zunächst die Treiber und Barrieren von ITSM untersucht, um daraus ein umfassendes Wirkmodell zu entwickeln. Da mit diesem Wirkungsmodell die Einflussfaktoren auf den Erfolg von ITSM in KMU deutlich werden, konnte auf dieser Basis ein Einführungskonzept abgeleitet werden, welches insbesondere die positiven Effekte unterstützt bzw. verstärkt. Y1 - 2019 SN - 978-3-944330-62-4 SP - 129 EP - 137 PB - mana-Buch CY - Heide ER -