TY - CHAP A1 - Leise, Philipp A1 - Altherr, Lena A1 - Pelz, Peter F. T1 - Energy-Efficient design of a water supply system for skyscrapers by mixed-integer nonlinear programming T2 - Operations Research Proceedings 2017 N2 - The energy-efficiency of technical systems can be improved by a systematic design approach. Technical Operations Research (TOR) employs methods known from Operations Research to find a global optimal layout and operation strategy of technical systems. We show the practical usage of this approach by the systematic design of a decentralized water supply system for skyscrapers. All possible network options and operation strategies are modeled by a Mixed-Integer Nonlinear Program. We present the optimal system found by our approach and highlight the energy savings compared to a conventional system design. KW - Engineering optimization KW - Global optimization KW - Energy efficiency KW - Water KW - Network Y1 - 2018 SN - 978-3-319-89919-0 U6 - http://dx.doi.org/10.1007/978-3-319-89920-6_63 PB - Springer CY - Cham ER - TY - CHAP A1 - Leise, Philipp A1 - Altherr, Lena T1 - Optimizing the design and control of decentralized water supply systems – a case-study of a hotel building T2 - EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization N2 - To increase pressure to supply all floors of high buildings with water, booster stations, normally consisting of several parallel pumps in the basement, are used. In this work, we demonstrate the potential of a decentralized pump topology regarding energy savings in water supply systems of skyscrapers. We present an approach, based on Mixed-Integer Nonlinear Programming, that allows to choose an optimal network topology and optimal pumps from a predefined construction kit comprising different pump types. Using domain-specific scaling laws and Latin Hypercube Sampling, we generate different input sets of pump types and compare their impact on the efficiency and cost of the total system design. As a realistic application example, we consider a hotel building with 325 rooms, 12 floors and up to four pressure zones. KW - Engineering optimization KW - Energy efficiency KW - Water KW - Pump System KW - Latin Hypercube Sampling Y1 - 2018 SN - 978-3-319-97773-7 SN - 978-3-319-97772-0 U6 - http://dx.doi.org/10.1007/978-3-319-97773-7_107 N1 - EngOpt 2018 Proceedings of the 6th International Conference on Engineering Optimization. 17-19 September 2018. Lisboa, Portugal SP - 1241 EP - 1252 PB - Springer CY - Cham ER - TY - CHAP A1 - Leise, Philipp A1 - Altherr, Lena T1 - Experimental evaluation of resilience metrics in a fluid system T2 - Mastering Uncertainty in Mechanical Engineering Y1 - 2021 SN - 978-3-030-78356-3 N1 - Unterkapitel des Kapitels "Strategies for Mastering Uncertainty" SP - 442 EP - 447 PB - Springer CY - Cham ER - TY - CHAP A1 - Leingartner, Max A1 - Maurer, Johannes A1 - Steinbauer, Gerald A1 - Ferrein, Alexander T1 - Evaluation of sensors and mapping approaches for disasters in tunnels T2 - IEEE International Symposium on Safety, Security, and Rescue Robotics : SSRR : 21-26 Oct. 2013, Linkoping, Sweden Y1 - 2013 SN - 978-1-4799-0879-0 SP - 1 EP - 7 ER - TY - JOUR A1 - Leingartner, Max A1 - Maurer, Johannes A1 - Ferrein, Alexander A1 - Steinbauer, Gerald T1 - Evaluation of Sensors and Mapping Approaches for Disasters in Tunnels JF - Journal of Field Robotics N2 - Ground or aerial robots equipped with advanced sensing technologies, such as three-dimensional laser scanners and advanced mapping algorithms, are deemed useful as a supporting technology for first responders. A great deal of excellent research in the field exists, but practical applications at real disaster sites are scarce. Many projects concentrate on equipping robots with advanced capabilities, such as autonomous exploration or object manipulation. In spite of this, realistic application areas for such robots are limited to teleoperated reconnaissance or search. In this paper, we investigate how well state-of-the-art and off-the-shelf components and algorithms are suited for reconnaissance in current disaster-relief scenarios. The basic idea is to make use of some of the most common sensors and deploy some widely used algorithms in a disaster situation, and to evaluate how well the components work for these scenarios. We acquired the sensor data from two field experiments, one from a disaster-relief operation in a motorway tunnel, and one from a mapping experiment in a partly closed down motorway tunnel. Based on these data, which we make publicly available, we evaluate state-of-the-art and off-the-shelf mapping approaches. In our analysis, we integrate opinions and replies from first responders as well as from some algorithm developers on the usefulness of the data and the limitations of the deployed approaches, respectively. We discuss the lessons we learned during the two missions. These lessons are interesting for the community working in similar areas of urban search and rescue, particularly reconnaissance and search. Y1 - 2016 U6 - http://dx.doi.org/10.1002/rob.21611 SN - 1556-4967 VL - 33 IS - 8 SP - 1037 EP - 1057 PB - Wiley-VCH CY - Weinheim ER - TY - CHAP A1 - Land, Ingmar A1 - A., Peter A1 - Gligorevic, Snjezana T1 - Computation of symbol-wise mutual information in transmission systems with logAPP decoders and application to EXIT charts T2 - 5th International ITG Conference on Source and Channel Coding (SCC) : January 14 - 16, 2004, Erlangen ; conference record. (ITG-Fachbericht ; 181) Y1 - 2004 SN - 3-8007-2802-8 SP - 195 EP - 202 PB - VDE-Verl. CY - Berlin [u.a.] ER - TY - JOUR A1 - Lagemaat, Miriam W. A1 - Vos, Eline K. A1 - Maas, Marnix C. A1 - Bitz, Andreas A1 - Orzada, Stephan A1 - Uden, Mark J. van A1 - Kobus, Thiele A1 - Heerschap, Arend A1 - Scheenen, Tom W. J. T1 - Phosphorus magnetic resonance spectroscopic imaging at 7 T in patients with prostate cancer JF - Investigative Radiology N2 - Objectives The aim of this study was to identify characteristics of phosphorus (³¹P) spectra of the human prostate and to investigate changes of individual phospholipid metabolites in prostate cancer through in vivo ³¹P magnetic resonance spectroscopic imaging (MRSI) at 7 T. Materials and Methods In this institutional review board–approved study, 15 patients with biopsy-proven prostate cancer underwent T₂-weighted magnetic resonance imaging and 3-dimensional ³¹P MRSI at 7 T. Voxels were selected at the tumor location, in normal-appearing peripheral zone tissue, normal-appearing transition zone tissue, and in the base of the prostate close to the seminal vesicles. Phosphorus metabolite ratios were determined and compared between tissue types. Results Signals of phosphoethanolamine (PE) and phosphocholine (PC) were present and well resolved in most ³¹P spectra in the prostate. Glycerophosphocholine signals were observable in 43% of the voxels in malignant tissue, but in only 10% of the voxels in normal-appearing tissue away from the seminal vesicles. In many spectra, independent of tissue type, 2 peaks resonated in the chemical shift range of inorganic phosphate, possibly representing 2 separate pH compartments. The PC/PE ratio in the seminal vesicles was highly elevated compared with the prostate in 5 patients. A considerable overlap of ³¹P metabolite ratios was found between prostate cancer and normal-appearing prostate tissue, preventing direct discrimination of these tissues. The only 2 patients with high Gleason scores tumors (≥4+5) presented with high PC and glycerophosphocholine levels in their cancer lesions. Conclusions Phosphorus MRSI at 7 T shows distinct features of phospholipid metabolites in the prostate gland and its surrounding structures. In this exploratory study, no differences in ³¹P metabolite ratios were observed between prostate cancer and normal-appearing prostate tissue possibly because of the partial volume effects of small tumor foci in large MRSI voxels. Y1 - 2014 U6 - http://dx.doi.org/10.1097/RLI.0000000000000012 SN - 1536-0210 VL - 49 IS - 5 SP - 363 EP - 372 PB - Lippincott Williams & Wilkins CY - Philadelphia, Pa. ER - TY - JOUR A1 - Lagemaat, Miriam W. A1 - Maas, Marnix C. A1 - Vos, Eline K. A1 - Bitz, Andreas A1 - Orzada, Stephan A1 - Weiland, Elisabeth A1 - Uden, Mark J. van A1 - Kobus, Thiele A1 - Heerschap, Arend A1 - Scheenen, Tom W. J. T1 - (31) P MR spectroscopic imaging of the human prostate at 7 T: T1 relaxation times, Nuclear Overhauser Effect, and spectral characterization JF - Magnetic Resonance in Medicine Y1 - 2015 U6 - http://dx.doi.org/10.1002/mrm.25209 SN - 1522-2594 VL - 73 IS - 3 SP - 909 EP - 920 PB - Wiley CY - Weinheim ER - TY - JOUR A1 - Lagemaat, Miriam W. A1 - Breukels, Vincent A1 - Vos, Eline K. A1 - B., Adam A1 - Uden, Mark J. van A1 - Orzada, Stephan A1 - Bitz, Andreas A1 - Maas, Marnix C. A1 - Scheenen, Tom W. J. T1 - ¹H MR spectroscopic imaging of the prostate at 7T using spectral-spatial pulses JF - Magnetic Resonance in Medicine N2 - Purpose To assess the feasibility of prostate ¹H MR spectroscopic imaging (MRSI) using low-power spectral-spatial (SPSP) pulses at 7T, exploiting accurate spectral selection and spatial selectivity simultaneously. Methods A double spin-echo sequence was equipped with SPSP refocusing pulses with a spectral selectivity of 1 ppm. Three-dimensional prostate ¹H-MRSI at 7T was performed with the SPSP-MRSI sequence using an 8-channel transmit array coil and an endorectal receive coil in three patients with prostate cancer and in one healthy subject. No additional water or lipid suppression pulses were used. Results Prostate ¹H-MRSI could be obtained well within specific absorption rate (SAR) limits in a clinically feasible time (10 min). Next to the common citrate signals, the prostate spectra exhibited high spermine signals concealing creatine and sometimes also choline. Residual lipid signals were observed at the edges of the prostate because of limitations in spectral and spatial selectivity. Conclusion It is possible to perform prostate ¹H-MRSI at 7T with a SPSP-MRSI sequence while using separate transmit and receive coils. This low-SAR MRSI concept provides the opportunity to increase spatial resolution of MRSI within reasonable scan times. Y1 - 2016 U6 - http://dx.doi.org/10.1002/mrm.25569 SN - 1522-2594 VL - 75 IS - 3 SP - 933 EP - 945 PB - International Society for Magnetic Resonance in Medicine ER - TY - CHAP A1 - Küppers, Malte A1 - Schuba, Marko A1 - Neugebauer, Georg A1 - Höner, Tim A1 - Hack, Sacha T1 - Security analysis of the KNX smart building protocol T2 - ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security N2 - KNX is a protocol for smart building automation, e.g., for automated heating, air conditioning, or lighting. This paper analyses and evaluates state-of-the-art KNX devices from manufacturers Merten, Gira and Siemens with respect to security. On the one hand, it is investigated if publicly known vulnerabilities like insecure storage of passwords in software, unencrypted communication, or denialof-service attacks, can be reproduced in new devices. On the other hand, the security is analyzed in general, leading to the discovery of a previously unknown and high risk vulnerability related to so-called BCU (authentication) keys. Y1 - 2023 U6 - http://dx.doi.org/10.1145/3600160.3605167 N1 - Article No.: 87 ARES 2023, August 29–September 01, 2023, Benevento, Italy SP - 1 EP - 7 PB - ACM ER - TY - CHAP A1 - Kümmell, Steffen A1 - Hillgärtner, Michael T1 - Inductive charging comfortable and nonvisible charging stations for urbanised areas T2 - E-Mobility in Europe : trends and good practice N2 - For a wide acceptance of E-Mobility, a well-developed charging infrastructure is needed. Conductive charging stations, which are today’s state of the art, are of limited suitability for urbanised areas, since they cause a significant diversification in townscape. Furthermore, they might be destroyed by vandalism. Besides for those urbanistic reasons, inductive charging stations are a much more comfortable alternative, especially in urbanised areas. The usage of conductive charging stations requires more or less bulky charging cables. The handling of those standardised charging cables, especially during poor weather conditions, might cause inconvenience, such as dirty clothing etc. Wireless charging does not require visible and vandalism vulnerable charge sticks. No wired connection between charging station and vehicle is needed, which enable the placement below the surface of parking spaces or other points of interest. Inductive charging seems to be the optimal alternative for E-Mobility, as a high power transfer can be realised with a manageable technical and financial effort. For a well-accepted and working public charging infrastructure in urbanised areas it is essential that the infrastructure fits the vehicles’ needs. Hence, a well-adjusted standardisation of the charging infrastructure is essential. This is carried out by several IEC (International Electrotechnical Commission) and national standardisation committees. To ensure an optimised technical solution for future’s inductive charging infrastructures, several field tests had been carried out and are planned in near future. KW - E-mobility KW - Inductive charging KW - Charging stations KW - Urban areas Y1 - 2015 SN - 978-3-319-13193-1 U6 - http://dx.doi.org/10.1007/978-3-319-13194-8_16 SP - 297 EP - 309 PB - Springer CY - Cham [u.a.] ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin ED - Stephanidis, C. T1 - The pyramid assessment framework for ‘competence developing games’ T2 - Communications in Computer and Information Science Y1 - 2016 SN - 978-331940541-4 U6 - http://dx.doi.org/10.1007/978-3-319-40542-1_37 SN - 1865-0929 N1 - 18th International Conference on Posters’ Extended Abstracts, HCI International 2016; Toronto; Canada; 17 July 2016 through 22 July 2016 VL - 618 SP - 232 EP - 237 PB - Springer ER - TY - JOUR A1 - König, Johannes Alexander A1 - Wolf, Martin T1 - GHOST: An Evaluated Competence Developing Game for Cybersecurity Awareness Training JF - International Journal on Advances in Security N2 - To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown. Y1 - 2018 SN - 1942-2636 VL - 11 IS - 3 & 4 SP - 274 EP - 287 PB - IARIA Journals ER - TY - CHAP A1 - König, Johannes Alexander A1 - Wolf, Martin T1 - Cybersecurity awareness training provided by the competence developing game GHOST T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - This paper introduces a Competence Developing Game (CDG) for the purpose of a cybersecurity awareness training for businesses. The target audience will be discussed in detail to understand their requirements. It will be explained why and how a mix of business simulation and serious game meets these stakeholder requirements. It will be shown that a tablet and touchscreen based approach is the most suitable solution. In addition, an empirical study will be briefly presented. The study was carried out to examine how an interaction system for a 3D-tablet based CDG has to be designed, to be manageable for non-game experienced employees. Furthermore, it will be explained which serious content is necessary for a Cybersecurity awareness training CDG and how this content is wrapped in the game KW - Awareness KW - CDG KW - Serious Game KW - tablet game KW - business simulation Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 81 EP - 87 ER - TY - CHAP A1 - König, Johannes Alexander A1 - Völker, Veronika A1 - Wolf, Martin T1 - The user-focused storybuilding framework for competence developing games - a design-framework considering the basics of an educational game’s story T2 - ACHI 2018 : The Eleventh International Conference on Advances in Computer-Human Interactions N2 - During the development of a Competence Developing Game’s (CDG) story it is indispensable to understand the target audience. Thereby, CDGs stories represent more than just the plot. The Story is about the Setting, the Characters and the Plot. As a toolkit to support the development of such a story, this paper introduces the UserFocused Storybuilding (short UFoS) Framework for CDGs. The Framework and its utilization will be explained, followed by a description of its development and derivation, including an empirical study. In addition, to simplify the Framework use regarding the CDG’s target audience, a new concept of Nine Psychographic Player Types will be explained. This concept of Player Types provides an approach to handle the differences in between players during the UFoS Framework use. Thereby, this article presents a unique approach to the development of target group-differentiated CDGs stories. KW - Competence Developing Game KW - Serious Game KW - Video Game KW - Story KW - Player Types Y1 - 2018 SN - 978-1-61208-616-3 N1 - Proceeding of the Eleventh International Conference on Advances in Computer-Human Interactions (ACHI 2018), Rome, Italy. SP - 98 EP - 106 ER - TY - CHAP A1 - Köllensperger, P. A1 - Bragard, Michael A1 - Plum, T. A1 - De Doncker, R. W. T1 - The dual GCT : a new high-power device using optimized GCT technology T2 - Conference record of the 2007 IEEE Industry Applications Conference : 42. IAS annual meeting ; September 23 - 27, 2007, New Orleans, Louisiana, USA Y1 - 2007 SN - 978-1-4244-1260-0 (Online) SN - 978-1-4244-1259-4 (Print) U6 - http://dx.doi.org/10.1109/07IAS.2007.76 SP - 358 EP - 365 PB - IEEE Operations Center CY - Piscataway, NJ ER - TY - JOUR A1 - Köllensperger, P. A1 - Bragard, Michael A1 - Plum, T. A1 - De Doncker, R. W. T1 - The dual GCT : new high-power device using optimized GCT technology JF - IEEE transactions on industry applications Y1 - 2009 U6 - http://dx.doi.org/10.1109/TIA.2009.2027364 SN - 0093-9994 VL - 45 IS - 5 SP - 1754 EP - 1762 ER - TY - JOUR A1 - Köhler, Klemens A1 - Röpke, René A1 - Wolf, Martin T1 - Through a mirror darkly – On the obscurity of teaching goals in game-based learning in IT security JF - ISAGA 2019: Simulation Gaming Through Times and Disciplines N2 - Teachers and instructors use very specific language communicating teaching goals. The most widely used frameworks of common reference are the Bloom’s Taxonomy and the Revised Bloom’s Taxonomy. The latter provides distinction of 209 different teaching goals which are connected to methods. In Competence Developing Games (CDGs - serious games to convey knowledge) and in IT security education, a two- or three level typology exists, reducing possible learning outcomes to awareness, training, and education. This study explores whether this much simpler framework succeeds in achieving the same range of learning outcomes. Method wise a keyword analysis was conducted. The results were threefold: 1. The words used to describe teaching goals in CDGs on IT security education do not reflect the whole range of learning outcomes. 2. The word choice is nevertheless different from common language, indicating an intentional use of language. 3. IT security CDGs use different sets of terms to describe learning outcomes, depending on whether they are awareness, training, or education games. The interpretation of the findings is that the reduction to just three types of CDGs reduces the capacity to communicate and think about learning outcomes and consequently reduces the outcomes that are intentionally achieved. KW - IT security education KW - Competence Developing Games KW - Game-based learning KW - Keyword analysis KW - Bloom’s Taxonomy Y1 - 2021 U6 - http://dx.doi.org/10.1007/978-3-030-72132-9_6 N1 - ISAGA 2019 - International Simulation and Gaming Association Conference. 26-30 August 2019. Warsaw, Poland. Part of the Lecture Notes in Computer Science book series (LNCS, volume 11988) SP - 61 EP - 73 PB - Springer CY - Cham ER - TY - JOUR A1 - Köhler, Klemens T1 - A conflict theory perspective of IT attacks – consequences for IT security education N2 - Cyberspace is "the environment formed by physical and non-physical components to store, modify, and exchange data using computer networks" (NATO CCDCOE). Beyond that, it is an environment where people interact. IT attacks are hostile, non-cooperative interactions that can be described with conflict theory. Applying conflict theory to IT security leads to different objectives for end-user education, requiring different formats like agency-based competence developing games. Y1 - 2020 IS - Preprint ER - TY - CHAP A1 - Krückel, Kai A1 - Nolden, Florian A1 - Ferrein, Alexander A1 - Scholl, Ingrid T1 - Intuitive visual teleoperation for UGVs using free-look augmented reality displays T2 - 2015 IEEE International Conference on Robotics and Automation (ICRA), Seattle, WA Y1 - 2015 U6 - http://dx.doi.org/10.1109/ICRA.2015.7139809 SP - 4412 EP - 4417 ER -