Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1156) (remove)
Has Fulltext
- no (1156) (remove)
Document Type
- Article (623)
- Conference Proceeding (294)
- Book (113)
- Part of a Book (67)
- Patent (17)
- Report (9)
- Other (8)
- Conference: Meeting Abstract (6)
- Contribution to a Periodical (6)
- Doctoral Thesis (6)
Keywords
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Digitale Transformation (3)
- Digitalisierung (3)
- Gamification (3)
- Literaturanalyse (3)
- Optimization (3)
- Powertrain (3)
- Referenzmodellierung (3)
- Robotic Process Automation (3)
- Serious Game (3)
- Technical Operations Research (3)
- Telecommunication (3)
- Autonomous mobile robots (2)
- CO2 (2)
- Competence Developing Games (2)
- Education (2)
- Energy efficiency (2)
- Engineering education (2)
- Experimental validation (2)
- Forschungsprozess (2)
- Hot S-parameter (2)
- Industry 4.0 (2)
- LiDAR (2)
- Machine Learning (2)
- Mathematik (2)
- Multi-robot systems (2)
- Optimal Topology (2)
- Process engineering (2)
- Prozessautomatisierung (2)
- Pump System (2)
- Smart Building (2)
- Smart factory (2)
- TM Forum (2)
- Text Analytics (2)
- Ventilation System (2)
- Water (2)
- Water distribution system (2)
- autonomous driving (2)
- eTOM (2)
- enhanced Telecom Operations Map (eTOM) (2)
- mathematical optimization (2)
- robotic process automation (2)
- 197m/gHg (1)
- 3-D printing (1)
- 3D object detection (1)
- Accuracy (1)
- Advanced driver assistance systems (ADAS/AD) (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomalieerkennung (1)
- Anomaly detection (1)
- Antennen (1)
- Anwendungsorientierter Forschungsansatz (1)
- Arbeit 4.0 (1)
- Artificial Intelligence (1)
- Automated driving (1)
- Automation (1)
- Automotive application (1)
- Awareness (1)
- BEV (1)
- BIM (1)
- Benchmark (1)
- Bewertungsframework (1)
- Bloom’s Taxonomy (1)
- Booster Stations (1)
- Buffering Capacity (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- Business understanding (1)
- CAV (1)
- CCD-Bildwandler (1)
- CDG (1)
- Calcium oxides (1)
- Carbon Dioxide (1)
- Cardiovascular Magnetic Resonance (1)
- Case Study (1)
- Case study (1)
- Chance Constraint (1)
- Change culture (1)
- Charging stations (1)
- Chatbots (1)
- Circuit simulation (1)
- Competence Developing Gam (1)
- Competence Developing Game (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Control engineering (1)
- Controller Parameter (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Experience Management (1)
- Customer Journeys (1)
- Customer Orientation (1)
- Cyber-physical systems (1)
- Cybersecurity (1)
- Cybersicherheit (1)
- DC machines (1)
- Data analysis (1)
- Data visualization (1)
- Datasets (1)
- Deep learning (1)
- Design Science Research (1)
- DiggiTwin (1)
- Digital Age (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Discrete Optimisation (1)
- Dreidimensionale Bildverarbeitung (1)
- Drinking Water Supply (1)
- E-Learning (1)
- E-carsharing (1)
- E-mobility (1)
- EBSCO Discovery Service (1)
- EGG (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electron-phonon coupling (1)
- Electronic learning (1)
- Elektrotechnik (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Energy-efficient ventilation (1)
- Engineering Application (1)
- Engineering optimisation (1)
- Enhanced Telecom Operations Map (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- FPGA (1)
- Feldsimulation (1)
- Forschung (1)
- Forschungsinformationssystem (1)
- Frequency Doubler (1)
- Fully connected car (1)
- Furnace (1)
- Fusion (1)
- Future Skills (1)
- GPU (1)
- Game-based learning (1)
- Gearbox (1)
- Geschäftsmodelle (1)
- Geschäftsprozessmanagement (1)
- Global optimization (1)
- Gold nanoparticle (AuNP) (1)
- Graph Theory (1)
- Harmonic Radar (1)
- Heuristic algorithms (1)
- High field MRI (1)
- Hochfrequenztechnik (1)
- Home Assistant (1)
- Home Automation Platform (1)
- IBM Watson Explorer (1)
- ICS (1)
- IP-based networks (1)
- ISO 26262 (1)
- IT security education (1)
- IT-Marketing (1)
- IT-Sicherheit (1)
- Im-plementation of AI-systems (1)
- Image Database (1)
- Image Forensics (1)
- Image Quality Assessment (1)
- Image Quality Score (1)
- Implementation Case (1)
- Incremental Encoder (1)
- Indoor air quality (1)
- Indoor environmental quality (1)
- Inductive charging (1)
- Industrial optimisation (1)
- Information and communication technology (1)
- Informationsgetriebene Geschäftsmodelle (1)
- Informationssicherheit (1)
- Informationssicherheitsmanagement (1)
- Integrated mobility (1)
- Intelligentes Parken (1)
- Interactive process mining (1)
- Interdisciplinarity (1)
- Internet der Dinge (1)
- Interval Time Series (1)
- IoT (1)
- Keyword analysis (1)
- Klassifikator <Informatik> (1)
- Kommerzielle Interaktionen (1)
- LQR (1)
- Larynx position (1)
- Latin Hypercube Sampling (1)
- Leaderboard (1)
- Lean thinking (1)
- Level Control System (1)
- Li7La3Zr2O12 (1)
- LiGaO2 (1)
- Lidar (1)
- Literatur-analyse-prozess (1)
- Literaturdaten (1)
- Literature review (1)
- Literaturrecherche (1)
- Low voltage (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MILP (1)
- MPC (1)
- MR safety (1)
- MRI (1)
- Machine learning (1)
- Magneto alert sensor (1)
- Malicious model (1)
- Management (1)
- Manifolds (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Matlab (1)
- McLuhan, Marshall (1)
- Meitner-Auger-electron (MAE) (1)
- Methodology (1)
- Minimum Risk Manoeuvre (1)
- Mixed Integer Programming (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear black-box optimization (1)
- Mixed-integer nonlinear problem (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Mobility management (1)
- Mode converter (1)
- Modeling (1)
- Monetarisierung (1)
- Monitoring (1)
- Mpc (1)
- Multi-criteria optimization (1)
- NGN (1)
- Navigation (1)
- Network (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Objective data (1)
- Objekterkennung (1)
- Online services (1)
- Open Educational Resources (OER) (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Closed Loop (1)
- PM2.5 (1)
- PPO (1)
- Paper recycling (1)
- Participation (1)
- Path-following (1)
- Performance (1)
- Personality (1)
- Phonons (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Plasma (1)
- Plasma diagnostics (1)
- Plasmatechnik (1)
- Player Types (1)
- Position Encoder (1)
- Power dissipation (1)
- Praxisprojekte (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process model (1)
- Process optimization (1)
- Process reference model (1)
- Process virtualization (1)
- Product bundling (1)
- Product family optimization (1)
- Projektbeispiele (1)
- Prototype (1)
- Prozessabläufe (1)
- Prozessagilität (1)
- Prozessmodellierung (1)
- Prozessstandardisierung (1)
- Pumping systems (1)
- Qualitative Wertschöpfungsanalyse (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- RANSAC (1)
- Radar (1)
- Reference Process Model (1)
- Reference modelling (1)
- Referenzmodelle (1)
- Reinforcement Learning (1)
- Relaxation (1)
- Requirements (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- RoboCup (1)
- Robotic process automation (1)
- Rotary encoder (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- Safety of the intended functionality (SOTIF) (1)
- Safety-critical systems validation (1)
- Secure multi-party computation (1)
- Self-driving (1)
- Sensors comparison (1)
- Serious Games (1)
- Serviceintegration (1)
- Services (1)
- Similarity Theory (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software development (1)
- Software packages (1)
- Software testing (1)
- Softwareroboter (1)
- Solver Per- formance (1)
- Sound Pressure Level (1)
- Stochastic Programming (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Sustainability (1)
- Synchronous machines (1)
- System Design (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Targeted radionuclide therapy (TRT) (1)
- Teamwork (1)
- Technical Operation Research (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text Analytics (1)
- Text Mining (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Throughput (1)
- Time-series synchronization (1)
- Tomography (1)
- Training (1)
- Transdisciplinarity (1)
- Transfer impedance (1)
- Transformation (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- Uktrahigh field MRI (1)
- Uncertainty (1)
- Unternehmensarchitektur (1)
- Unternehmensarchitekturen (1)
- Unternehmensarchitekturen Internet der Dinge (1)
- Unternehmensstrukturen (1)
- Unternehmenstransformation (1)
- Urban areas (1)
- V2X (1)
- VOP compression (1)
- Validation (1)
- Video Game (1)
- Voice assessment (1)
- Vorverarbeitung (1)
- WLTP (1)
- Water Distribution (1)
- Water Supply Networks (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wertschöpfungskettenanalyse (1)
- WiLMo (1)
- Wiegand Effect (1)
- Wiegand sensor (1)
- Wirtschaftsinformatik (1)
- Wissenstransfer (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- applications (1)
- artificial intelligence (1)
- automated parking (1)
- automated vehicles (1)
- availability (1)
- batteries and fuel cells (1)
- body imaging at 7 T MRI (1)
- body imaging at UHF MRI (1)
- business analytics (1)
- business process automation (1)
- business simulation (1)
- commercial offthe- shelf solutions (1)
- competence developing games (1)
- connected automated vehicles (1)
- culpability (1)
- cybersecurity (1)
- decision analytics (1)
- design of technical systems (1)
- digital economy (1)
- do-it-yourself (1)
- education (1)
- electrospinning (1)
- embedded hardware (1)
- energy efficiency (1)
- energy transfer (1)
- experimental evaluation (1)
- fault detection (1)
- fibers (1)
- ga-doping (1)
- garnet solid electrolyte (1)
- genetic algorithm (1)
- global optimization (1)
- harmonic radar (1)
- harmonic radar tags (1)
- heating system (1)
- honeynet (1)
- honeypot (1)
- ignition (1)
- information systems (1)
- integrated transmit coil arrays (1)
- irradiation (1)
- lab work (1)
- learning theories (1)
- legal obligations (1)
- liability (1)
- line detection (1)
- management (1)
- metrological characterization (1)
- microplasma (1)
- microwave (MW) plasma (1)
- microwave measurements (1)
- mixed-integer linear programming (1)
- model-predictive control (1)
- motivation theories (1)
- next generation network (1)
- nonlinear VNA measurements (1)
- optimization (1)
- parking slot detection (1)
- passive inter-modulation (1)
- plasma jet (1)
- point cloud processing (1)
- porous materials (1)
- power integrity (1)
- product bundling (1)
- product liability (1)
- professional skills (1)
- programming (1)
- remote sensing (1)
- requirements (1)
- research framework (1)
- resilience (1)
- sensor networks (1)
- signal integrity (1)
- slum classification (1)
- software engineering (1)
- software evaluation (1)
- software selection (1)
- solid-state battery (1)
- stochastic optimization (1)
- sustainability (1)
- system optimization (1)
- system synthesis (1)
- systematic literature review (1)
- tablet game (1)
- technical operations research (1)
- technology (1)
- telecommunication (1)
- thermal dose (1)
- tissue temperature (1)
- transmit antenna arrays (1)
- water supply design (1)
- water supply system (1)
- Überwachung & Optimierung (1)
Subject of this case is Deutsche Telekom Services Europe (DTSE), a service center for administrative processes. Due to the high volume of repetitive tasks (e.g., 100k manual uploads of offer documents into SAP per year), automation was identified as an important strategic target with a high management attention and commitment. DTSE has to work with various backend application systems without any possibility to change those systems. Furthermore, the complexity of administrative processes differed. When it comes to the transfer of unstructured data (e.g., offer documents) to structured data (e.g., MS Excel files), further cognitive technologies were needed.
Due to the high number of customer contacts, fault clearances, installations, and product provisioning per year, the automation level of operational processes has a significant impact on financial results, quality, and customer experience. Therefore, the telecommunications operator Deutsche Telekom (DT) has defined a digital strategy with the objectives of zero complexity and zero complaint, one touch, agility in service, and disruptive thinking. In this context, Robotic Process Automation (RPA) was identified as an enabling technology to formulate and realize DT’s digital strategy through automation of rule-based, routine, and predictable tasks in combination with structured and stable data.
Energieeffizienz und Energiemanagement : ein Überblick heutiger Möglichkeiten und Notwendigkeiten
(2012)
Energieeffizienz und Energiemanagement : Ein Überblick heutiger Möglichkeiten und Notwendigkeiten
(2012)
The energy-efficiency of technical systems can be improved by a systematic design approach. Technical Operations Research (TOR) employs methods known from Operations Research to find a global optimal layout and operation strategy of technical systems. We show the practical usage of this approach by the systematic design of a decentralized water supply system for skyscrapers. All possible network options and operation strategies are modeled by a Mixed-Integer Nonlinear Program. We present the optimal system found by our approach and highlight the energy savings compared to a conventional system design.
Enhanced system architecture for rugged wide band data transmission / Sadeghfam, A. ; Heuermann, H.
(2009)
Open Data impliziert die freie Zugänglichkeit, Verfügbarkeit und Wiederverwendbarkeit von Datensätzen. Obwohl hochwertige Datensätze öffentlich verfügbar sind, ist der Zugang zu diesen und die Transparenz über die Formate nicht immer gegeben. Dies mindert die optimale Nutzung des Potenzials zur Wertschöpfung, trotz der vorherrschenden Einigkeit über ihre Chancen. Denn Open Data ermöglicht das Vorantreiben von Compliance-Themen wie Transparenz und Rechenschaftspflicht bis hin zur Förderung von Innovationen. Die Nutzung von Open Data erfordert Mut und eine gemeinsame Anstrengung verschiedener Akteure und Branchen. Im Rahmen des vorliegenden Beitrags werden auf Grundlage des Design Science-Ansatzes eine Open Data Capability Map sowie darauf aufbauend eine Datenarchitektur für Open Data in der Luftfahrtindustrie an einem Beispiel entwickelt.
Die Telekommunikationsindustrie hat in den letzten Jahrzehnten einen enormen Wandel vollzogen. Für Telekommunikationsunternehmen erfordert dies fundamentale Umstrukturierungen von Strategie, Prozessen, Anwendungssystemen und Netzwerktechnologien. Dabei spielen Unternehmensarchitekturen und Referenzmodelle eine wichtige Rolle. Zwar existieren in der Praxis anerkannte Referenzmodelle, aber wie sind diese für eine systematische Transformation zu gestalten? Wie sieht eine konkrete Lösung für die Telekommunikationsindustrie aus?
Als Antwort stellt Christian Czarnecki in seinem Buch eine referenzmodellbasierte Unternehmensarchitektur vor. Basierend auf einer umfangreichen Untersuchung von Transformationsprojekten werden Probleme und Anforderungen der Praxis identifiziert, für die mit Methoden der Unternehmenstransformation, Referenzmodellierung und Unternehmensarchitektur ein Lösungsvorschlag entwickelt und evaluiert wird. Dieser besteht u. a. aus detaillierten Anwendungsfällen, Referenzprozessabläufen, einer Zuordnung von Prozessen zu Anwendungssystemen sowie Handlungsempfehlungen zur Virtualisierung.
Für Wissenschaftler und Studierende der Wirtschaftsinformatik zeigt das Buch neue Erkenntnisse einer anwendungsorientierten Referenzmodellierung. Für Praktiker liefert es eine methodisch fundierte Lösung für die aktuellen Transformationsbedarfe der Telekommunikationsindustrie. Christian Czarnecki arbeitet seit 2004 als Unternehmensberater und hat viele Telekommunikationsunternehmen bei deren Transformation begleitet. In 2013 erfolgte die Promotion zum Doktoringenieur an der Otto-von-Guericke-Universität Magdeburg.
Obwohl es eine Vielzahl von Einführungskonzepten für ITSM gibt, hat sich bisher keines dieser Konzepte auf breiter Linie durchgesetzt. Das gilt in erhöhtem Maße für ITSM-Einführungskonzepte für KMU, wohl nicht zuletzt aufgrund der Tatsache, dass der Mehrwert von ITSM für KMU aufgrund der geringeren Größe der IT-Organisationen nur entsprechend schwieriger generiert werden kann.
Mit diesem Beitrag wird ein Einführungskonzept für ITSM in KMU systematisch hergeleitet. Dafür wurden zunächst die Treiber und Barrieren von ITSM untersucht, um daraus ein umfassendes Wirkmodell zu entwickeln. Da mit diesem Wirkungsmodell die Einflussfaktoren auf den Erfolg von ITSM in KMU deutlich werden, konnte auf dieser Basis ein Einführungskonzept abgeleitet werden, welches insbesondere die positiven Effekte unterstützt bzw.
verstärkt.
In diesem Paper wird die Entwicklung und Evaluation eines grafischen Regeleditors für das Erstellen von „Smart Living Environments“-Services vorgestellt. Dafür werden zunächst die Deduktion und Implementierung des grafischen Regeleditors erläutert. Anschließend wird eine Probandenstudie vorgestellt, in welcher der Mehrwert bezogen auf die Aspekte Zeit, Fehleranfälligkeit und Gebrauchstauglichkeit festgestellt wird.
Erfolgreiches IT-Marketing
(2013)
In this work, we report on our attempt to design and implement an early introduction to basic robotics principles for children at kindergarten age. One of the main challenges of this effort is to explain complex robotics contents in a way that pre-school children could follow the basic principles and ideas using examples from their world of experience. What sets apart our effort from other work is that part of the lecturing is actually done by a robot itself and that a quiz at the end of the lesson is done using robots as well. The humanoid robot Pepper from Softbank, which is a great platform for human–robot interaction experiments, was used to present a lecture on robotics by reading out the contents to the children making use of its speech synthesis capability. A quiz in a Runaround-game-show style after the lecture activated the children to recap the contents they acquired about how mobile robots work in principle. In this quiz, two LEGO Mindstorm EV3 robots were used to implement a strongly interactive scenario. Besides the thrill of being exposed to a mobile robot that would also react to the children, they were very excited and at the same time very concentrated. We got very positive feedback from the children as well as from their educators. To the best of our knowledge, this is one of only few attempts to use a robot like Pepper not as a tele-teaching tool, but as the teacher itself in order to engage pre-school children with complex robotics contents.
Kritische Infrastrukturen sind primäre Ziele krimineller Hacker. Der Deutsche Bundestag reagierte darauf am 25. Juli 2015 mit einem Gesetz zur Verbesserung der Sicherheit von ITSystemen, dem IT-Sicherheitsgesetz. Dies verlangt von Betreibern kritischer Infrastrukturen, angemessene Mindeststandards für organisatorische und technische Sicherheit zu implementieren, um den Betrieb und die Verfügbarkeit dieser Infrastruktur zu gewährleisten. Telekommunikationsunternehmen sind einerseits von diesem Gesetz in besonderem Maße betroffen und verfügen andererseits mit dem Rahmenwerk enhanced Telecom Operations Map (eTOM) über ein international anerkanntes Referenzmodell zur Gestaltung von Geschäftsprozessen in dieser Branche. Da sämtliche Telekommunikationsunternehmen in Deutschland verpflichtet sind, das Gesetz innerhalb eines bestimmten Zeitrahmens zu implementieren, präsentiert dieser Beitrag einen Vorschlag zur Erweiterung von eTOM um die relevanten Anforderungen des deutschen IT-Sicherheitsgesetzes.
Das von Texas-Instruments (TI) vertriebene Interface CBL2 wird über einige TI-Grafik-Rechner (TI-92, TI-89 usw.) angesteuert. Wegen seiner Handlichkeit wird dieses System beim Unterricht in wechselnden Räumen »großen« Messwerterfassungssystemen oft vorgezogen. Das CBL2 bietet drei analoge Eingänge, die immerhin mit 10 Bit Auflösung und bis zu einer Frequenz von 50 kHz arbeiten. Weiterhin besitzt das CBL2 eine Buchse für angeblich nur einen digitalen Ein- bzw. Ausgang. An diesem Eingang wird standardmäßig hauptsächlich der Bewegungssensor CBR betrieben. In diesem Beitrag werden Erweiterungsmöglichkeiten dieses Anschlusses beschrieben.
Because of customer churn, strong competition, and operational inefficiencies, the telecommunications operator ME Telco (fictitious name due to confidentiality) launched a strategic transformation program that included a Business Process Management (BPM) project. Major problems were silo-oriented process management and missing cross-functional transparency. Process improvements were not consistently planned and aligned with corporate targets. Measurable inefficiencies were observed on an operational level, e.g., high lead times and reassignment rates of the incident management process.
Ground or aerial robots equipped with advanced sensing technologies, such as three-dimensional laser scanners and advanced mapping algorithms, are deemed useful as a supporting technology for first responders. A great deal of excellent research in the field exists, but practical applications at real disaster sites are scarce. Many projects concentrate on equipping robots with advanced capabilities, such as autonomous exploration or object manipulation. In spite of this, realistic application areas for such robots are limited to teleoperated reconnaissance or search. In this paper, we investigate how well state-of-the-art and off-the-shelf components and algorithms are suited for reconnaissance in current disaster-relief scenarios. The basic idea is to make use of some of the most common sensors and deploy some widely used algorithms in a disaster situation, and to evaluate how well the components work for these scenarios. We acquired the sensor data from two field experiments, one from a disaster-relief operation in a motorway tunnel, and one from a mapping experiment in a partly closed down motorway tunnel. Based on these data, which we make publicly available, we evaluate state-of-the-art and off-the-shelf mapping approaches. In our analysis, we integrate opinions and replies from first responders as well as from some algorithm developers on the usefulness of the data and the limitations of the deployed approaches, respectively. We discuss the lessons we learned during the two missions. These lessons are interesting for the community working in similar areas of urban search and rescue, particularly reconnaissance and search.
The conference center darmstadtium in Darmstadt is a prominent example of energy efficient buildings. Its heating system consists of different source and consumer circuits connected by a Zortström reservoir. Our goal was to reduce the energy costs of the system as much as possible. Therefore, we analyzed its supply circuits. The first step towards optimization is a complete examination of the system: 1) Compilation of an object list for the system, 2) collection of the characteristic curves of the components, and 3) measurement of the load profiles of the heat and volume-flow demand. Instead of modifying the system manually and testing the solution by simulation, the second step was the creation of a global optimization program. The objective was to minimize the total energy costs for one year. We compare two different topologies and show opportunities for significant savings.
Planning the layout and operation of a technical system is a common task
for an engineer. Typically, the workflow is divided into consecutive stages: First,
the engineer designs the layout of the system, with the help of his experience or of
heuristic methods. Secondly, he finds a control strategy which is often optimized
by simulation. This usually results in a good operating of an unquestioned sys-
tem topology. In contrast, we apply Operations Research (OR) methods to find a
cost-optimal solution for both stages simultaneously via mixed integer program-
ming (MILP). Technical Operations Research (TOR) allows one to find a provable
global optimal solution within the model formulation. However, the modeling error
due to the abstraction of physical reality remains unknown. We address this ubiq-
uitous problem of OR methods by comparing our computational results with mea-
surements in a test rig. For a practical test case we compute a topology and control
strategy via MILP and verify that the objectives are met up to a deviation of 8.7%.
Purpose
To assess potential cognitive deficits under the influence of static magnetic fields at various field strengths some studies already exist. These studies were not focused on attention as the most vulnerable cognitive function. Additionally, mostly no magnetic resonance imaging (MRI) sequences were performed.
Materials and Methods
In all, 25 right-handed men were enrolled in this study. All subjects underwent one MRI examination of 63 minutes at 1.5 T and one at 7 T within an interval of 10 to 30 days. The order of the examinations was randomized. Subjects were referred to six standardized neuropsychological tests strictly focused on attention immediately before and after each MRI examination. Differences in neuropsychological variables between the timepoints before and after each MRI examination were assessed and P-values were calculated
Results
Only six subtests revealed significant differences between pre- and post-MRI. In these tests the subjects achieved better results in post-MRI testing than in pre-MRI testing (P = 0.013–0.032). The other tests revealed no significant results.
Conclusion
The improvement in post-MRI testing is only explicable as a result of learning effects. MRI examinations, even in ultrahigh-field scanners, do not seem to have any persisting influence on the attention networks of human cognition immediately after exposure.
Purpose
To demonstrate that high quality T₂-weighted (T2w) turbo spin-echo (TSE) imaging of the complete prostate can be achieved routinely and within safety limits at 7 T, using an external transceive body array coil only.
Methods
Nine healthy volunteers and 12 prostate cancer patients were scanned on a 7 T whole-body system. Preparation consisted of B₀ and radiofrequency shimming and localized flip angle calibration. T₁ and T₂ relaxation times were measured and used to define the T2w-TSE protocol. T2w imaging was performed using a TSE sequence (pulse repetition time/echo time 3000–3640/71 ms) with prolonged excitation and refocusing pulses to reduce specific absorption rate.
Results
High quality T2w TSE imaging was performed in less than 2 min in all subjects. Tumors of patients with gold-standard tumor localization (MR-guided biopsy or prostatectomy) were well visualized on 7 T imaging (n = 3). The number of consecutive slices achievable within a 10-g averaged specific absorption rate limit of 10 W/kg was ≥28 in all subjects, sufficient for full prostate coverage with 3-mm slices in at least one direction.
Conclusion
High quality T2w TSE prostate imaging can be performed routinely and within specific absorption rate limits at 7 T with an external transceive body array.
Es wird von Gleichungen ausgegangen, mit denen die Modellkoeffizienten von Regelstrecken mit Ausgleich aus der gemessenen Sprungantwort ermittelt werden können. Die Übertragungsfunktion der Regelstrecke hat einen konstanten Zähler und ein Nennerpolynom. Unter der Annahme, daß die ideale und exakte Sprungantwort des Systems durch ein stochastisches Signal gestört wird, wird untersucht, wie die Fehler der ermittelten Modellkoeffizienten von Kennwerten des Störsignals und von der Meßzeit für die Sprungantwort abhängen. Durch eine Simulation auf dem Digitalrechner wurden die Ergebnisse kontrolliert. Es zeigt sich, daß durch eine Filterung der gestörten Sprungantwort über einen Tiefpaß keine Verbesserung der Analyseergebnisse erreicht werden kann, da das Identifizierungsverfahren eine glättende Eigenschaft hat.
In order to maximize the possible travel distance of battery electric vehicles with one battery charge, it is mandatory to adjust all components of the powertrain carefully to each other. While current vehicle designs mostly simplify the powertrain rigorously and use an electric motor in combination with a gearbox with only one fixed transmission ratio, the use of multi-gear systems has great potential. First, a multi-speed system is able to improve the overall energy efficiency. Secondly, it is able to reduce the maximum momentum and therefore to reduce the maximum current provided by the traction battery, which results in a longer battery lifetime. In this paper, we present a systematic way to generate multi-gear gearbox designs that—combined with a certain electric motor—lead to the most efficient fulfillment of predefined load scenarios and are at the same time robust to uncertainties in the load. Therefore, we model the electric motor and the gearbox within a Mixed-Integer Nonlinear Program, and optimize the efficiency of the mechanical parts of the powertrain. By combining this mathematical optimization program with an unsupervised machine learning algorithm, we are able to derive global-optimal gearbox designs for practically relevant momentum and speed requirements.
The benefits of robotic process automation (RPA) are highly related to the usage of commercial off-the-shelf (COTS) software products that can be easily implemented and customized by business units. But, how to find the best fitting RPA product for a specific situation that creates the expected benefits? This question is related to the general area of software evaluation and selection. In the face of more than 75 RPA products currently on the market, guidance considering those specifics is required. Therefore, this chapter proposes a criteria-based selection method specifically for RPA. The method includes a quantitative evaluation of costs and benefits as well as a qualitative utility analysis based on functional criteria. By using the visualization of financial implications (VOFI) method, an application-oriented structure is provided that opposes the total cost of ownership to the time savings times salary (TSTS). For the utility analysis a detailed list of functional criteria for RPA is offered. The whole method is based on a multi-vocal review of scientific and non-scholarly literature including publications by business practitioners, consultants, and vendors. The application of the method is illustrated by a concrete RPA example. The illustrated
structures, templates, and criteria can be directly utilized by practitioners in their real-life RPA implementations. In addition, a normative decision process for selecting RPA alternatives is proposed before the chapter closes with a discussion and outlook.
Das Ziel des INTERREG-Projektes „SHAREuregio“ (FKZ: 34.EFRE-0300134)
ist es, grenzüberschreitende Mobilität in der Euregio Rhein-Maas-Nord zu
ermöglichen und zu fördern. Dazu soll ein elektromobiles Car- und Bikesharing-
System entwickelt und in der Stadt Mönchengladbach, im Kreis Viersen
sowie in den Gemeinden Roermond und Venlo (beide NL) zusammen mit den
Partnern Wirtschaftsförderung Mönchengladbach, Wirtschaftsförderung für den
Kreis Viersen, NEW AG, Goodmoovs (NL), Greenflux (NL) und der FH Aachen
implementiert werden. Zunächst richtet sich das Angebot, bestehend aus 40
Elektroautos und 40 Elektrofahrrädern, an Unternehmen und wird nach einer
Erprobungsphase, mit einer größeren Anzahl an Fahrzeugen, auch für Privatpersonen
verfügbar gemacht werden. Die Fahrzeuge stehen bei den jeweiligen
Anwendungspartnern in Deutschland und den Niederlanden.
Im Rahmen dieses Projektes hat die FH Aachen „FlexSHARE“ entwickelt
– ein methodisches Framework zur innovativen Gestaltung urbaner Sharing-
Angebote. Das Framework ermöglicht es, anhand von messbaren Kenngrößen,
bedarfsgerechte und auf die Region abgestimmte Sharing-Systeme zu entwickeln.
Frauen und Revolution: Der weibliche Anteil an der Geschichte. Christa Wolf und das Ende der DDR
(1991)
Spontaneous language has rarely been subjected to neuroimaging studies. This study therefore introduces a newly developed method for the analysis of linguistic phenomena observed in continuous language production during fMRI.
Most neuroimaging studies investigating language have so far focussed on single word or — to a smaller extent — sentence processing, mostly due to methodological considerations. Natural language production, however, is far more than the mere combination of words to larger units. Therefore, the present study aimed at relating brain activation to linguistic phenomena like word-finding difficulties or syntactic completeness in a continuous language fMRI paradigm. A picture description task with special constraints was used to provoke hesitation phenomena and speech errors. The transcribed speech sample was segmented into events of one second and each event was assigned to one category of a complex schema especially developed for this purpose. The main results were: conceptual planning engages bilateral activation of the precuneus. Successful lexical retrieval is accompanied – particularly in comparison to unsolved word-finding difficulties – by the left middle and superior temporal gyrus. Syntactic completeness is reflected in activation of the left inferior frontal gyrus (IFG) (area 44). In sum, the method has proven to be useful for investigating the neural correlates of lexical and syntactic phenomena in an overt picture description task. This opens up new prospects for the analysis of spontaneous language production during fMRI.
Fundamentals and ignition of a microplasma at 2.45 GHZ / Holtrup, Stephan ; Heuermann, Holger
(2009)
In the RoboCup@Home domestic service robot competition, complex tasks such as "get the cup from the kitchen and bring it to the living room" or "find me this and that object in the apartment" have to be accomplished. At these competitions the robots may only be instructed by natural language. As humans use qualitative concepts such as "near" or "far", the robot needs to cope with them, too. For our domestic robot, we use the robot programming and plan language Readylog, our variant of Golog. In previous work we extended the action language Golog, which was developed for the high-level control of agents and robots, with fuzzy concepts and showed how to embed fuzzy controllers in Golog. In this paper, we demonstrate how these notions can be fruitfully applied to two domestic service robotic scenarios. In the first application, we demonstrate how qualitative fluents based on a fuzzy set semantics can be deployed. In the second program, we show an example of a fuzzy controller for a follow-a-person task.
Fußball oder Mathematik
(1971)
Germanistik [Lexikoneintrag]
(1998)
Durch die Fragmentierung von Wertschöpfungsketten ergeben sich neue Herausforderungen für das Management von Kundenbeziehungen. Die Dissertation untersucht die daraus resultierenden Anforderungen an eine übergreifende Integration von Customer Relationship Management in der
Telekommunikationsindustrie. Ziel ist es, durch Anwendung von Methoden eines Enterprise Architecture Framework eine übergreifend Lösung zu gestalten. Grundlegende Prämisse dabei ist, dass die übergreifende Gestaltung eines Customer Relationship Management für alle an der
Wertschöpfung beteiligten Unternehmen vorteilhaft ist.
Am Beispiel der Telekommunikationsindustrie zeigt der Beitrag eine konkrete Ausgestaltung anwendungsorientierter Forschung, die sowohl für die Praxis als auch für die Wissenschaft nutzen- und erkenntnisbringend ist. Forschungsgegenstand sind die Referenzmodelle des Industriegremiums TM Forum, die von vielen Telekommunikationsunternehmen zur Transformation ihrer Strukturen und Systeme genutzt werden. Es wird die langjährige Forschungstätigkeit bei der Weiterentwicklung und Anwendung dieser Referenzmodelle beschrieben. Dabei wird ein konsequent gestaltungsorientierter Forschungsansatz verfolgt. Das Zusammenspiel aus kontinuierlicher Weiterentwicklung in Zusammenarbeit mit einem Industriegremium und der Anwendung in vielfältigen Praxisprojekten führt zu einer erfolgreichen Symbiose aus praktischer Nutzengenerierung sowie wissenschaftlichem Erkenntnisgewinn. Der Beitrag stellt den gewählten Forschungsansatz anhand konkreter Beispiele vor. Darauf basierend werden Empfehlungen und Herausforderungen für eine gestaltungs- und praxisorientierte Forschung diskutiert.
To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its underlying patterns are described. Accordingly, requirements for an 'Competence Developing Game' based training are discussed. Based on these requirements it is shown how a game can fulfill these requirements. A supplementary game interaction design and a corresponding evaluation study is shown. The combination of training requirements and interaction design is used to create a 'Competence Developing Game'-based training concept. A part of these concept is implemented into a playable prototype that serves around one hour of play respectively training time. This prototype is used to perform an evaluation of the game and training aspects of the awareness training. Thereby, the quality of the game aspect and the effectiveness of the training aspect are shown.