Refine
Year of publication
- 2017 (25) (remove)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (25) (remove)
Has Fulltext
- no (25)
Language
- English (25) (remove)
Document Type
- Conference Proceeding (17)
- Article (5)
- Part of a Book (2)
- Book (1)
Keywords
- Autonomous mobile robots (1)
- Competence Developing Games (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- Gamification (1)
- Image Database (1)
- Image Forensics (1)
- Industry 4.0 (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Mobile Phones (1)
- Multi-robot systems (1)
- Optimal Topology (1)
- Piecewise Linearization (1)
- Process design (1)
- Process reference model (1)
- Reference modelling (1)
- RoboCup (1)
- Serious Games (1)
- Similarity Theory (1)
- Smart factory (1)
- TM Forum (1)
- Telecommunication (1)
- Ventilation System (1)
- enhanced Telecom Operations Map (eTOM) (1)
- learning theories (1)
- motivation theories (1)
Is part of the Bibliography
- no (25)
Competence Developing Games (CDGs) are a new concept of how to think about games with serious intentions. In order to emphasize on this topic, a new framework has been developed. It basically relies on learning and motivation theories. This ‘motivational Competence Developing Game Framework’ demonstrates how it is possible to use these theories in a CDG development process. The theoretical derivation and use of the framework is explained in this paper.
ICSs (Industrial Control Systems) and its subset SCADA systems (Supervisory Control and Data Acquisition) are getting exposed to a constant stream of new threats. The increasing importance of IT security in ICS requires viable methods to assess the security of ICS, its individual components, and its protocols. This paper presents a security analysis with focus on the communication protocols of a single PLC (Programmable Logic Controller). The PLC, a Beckhoff CX2020, is examined and new vulnerabilities of the system are revealed. Based on these findings recommendations are made to improve security of the Beckhoff system and its protocols.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.
Gearboxes are mechanical transmission systems that provide speed and torque conversions from a rotating power source. Being a central element of the drive train, they are relevant for the efficiency and durability of motor vehicles. In this work, we present a new approach for gearbox design: Modeling the design problem as a mixed-integer nonlinear program (MINLP) allows us to create gearbox designs from scratch for arbitrary requirements and—given enough time—to compute provably globally optimal designs for a given objective. We show how different degrees of freedom influence the runtime and present an exemplary solution.
Energy-efficient components do not automatically lead to energy-efficient systems. Technical Operations Research (TOR) shifts the focus from the single component to the system as a whole and finds its optimal topology and operating strategy simultaneously. In previous works, we provided a preselected construction kit of suitable components for the algorithm. This approach may give rise to a combinatorial explosion if the preselection cannot be cut down to a reasonable number by human intuition. To reduce the number of discrete decisions, we integrate laws derived from similarity theory into the optimization model. Since the physical characteristics of a production series are similar, it can be described by affinity and scaling laws. Making use of these laws, our construction kit can be modeled more efficiently: Instead of a preselection of components, it now encompasses whole model ranges. This allows us to significantly increase the number of possible set-ups in our model. In this paper, we present how to embed this new formulation into a mixed-integer program and assess the run time via benchmarks. We present our approach on the example of a ventilation system design problem.
In times of planned obsolescence the demand for sustainability keeps growing. Ideally, a technical system is highly reliable, without failures and down times due to fast wear of single components. At the same time, maintenance should preferably be limited to pre-defined time intervals. Dispersion of load between multiple components can increase a system’s reliability and thus its availability inbetween maintenance points. However, this also results in higher investment costs and additional efforts due to higher complexity. Given a specific load profile and resulting wear of components, it is often unclear which system structure is the optimal one. Technical Operations Research (TOR) finds an optimal structure balancing availability and effort. We present our approach by designing a hydrostatic transmission system.