Conference Proceeding
Refine
Year of publication
Institute
- Fachbereich Elektrotechnik und Informationstechnik (228) (remove)
Has Fulltext
- no (228) (remove)
Language
- English (228) (remove)
Document Type
- Conference Proceeding (228) (remove)
Keywords
- Enterprise Architecture (5)
- Engineering education (2)
- Engineering optimization (2)
- MINLP (2)
- Machine Learning (2)
- Robotic Process Automation (2)
- Serious Game (2)
- Ventilation System (2)
- Water distribution system (2)
- autonomous driving (2)
- 3D object detection (1)
- Accuracy (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomaly detection (1)
- Artificial Intelligence (1)
- Automation (1)
- Awareness (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- CDG (1)
- CO2 (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Competence Developing Game (1)
- Competence Developing Games (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Control engineering (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Orientation (1)
- DC machines (1)
- Data analysis (1)
- Data visualization (1)
- Datasets (1)
- Deep learning (1)
- Digital Age (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Discrete Optimisation (1)
- Drinking Water Supply (1)
- Education (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electronic learning (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Energy efficiency (1)
- Engineering optimisation (1)
- Experimental validation (1)
- FPGA (1)
- Frequency Doubler (1)
- Future Skills (1)
- GPU (1)
- Gamification (1)
- Graph Theory (1)
- Harmonic Radar (1)
- Heuristic algorithms (1)
- Home Assistant (1)
- Home Automation Platform (1)
- ICS (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Incremental Encoder (1)
- Industrial optimisation (1)
- Interdisciplinarity (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- LiDAR (1)
- Literature review (1)
- Low voltage (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MPC (1)
- Malicious model (1)
- Manifolds (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- Matlab (1)
- Minimum Risk Manoeuvre (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Monitoring (1)
- Mpc (1)
- Navigation (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Online services (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Topology (1)
- Optimization (1)
- PPO (1)
- Path-following (1)
- Performance (1)
- Personality (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Player Types (1)
- Position Encoder (1)
- Power dissipation (1)
- Powertrain (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process engineering (1)
- Process optimization (1)
- Process reference model (1)
- Prototype (1)
- Pump System (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Reference Process Model (1)
- Reinforcement Learning (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- Secure multi-party computation (1)
- Sensors comparison (1)
- Serious Games (1)
- Similarity Theory (1)
- Smart Building (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software packages (1)
- Solver Per- formance (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Sustainability (1)
- Synchronous machines (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Teamwork (1)
- Technical Operations Research (1)
- Telecommunication (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Throughput (1)
- Time-series synchronization (1)
- Training (1)
- Transdisciplinarity (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Water (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wiegand Effect (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- business analytics (1)
- business simulation (1)
- competence developing games (1)
- cybersecurity (1)
- decision analytics (1)
- digital economy (1)
- do-it-yourself (1)
- eTOM (1)
- education (1)
- embedded hardware (1)
- enhanced Telecom Operations Map (eTOM) (1)
- fault detection (1)
- honeynet (1)
- honeypot (1)
- information systems (1)
- lab work (1)
- learning theories (1)
- mathematical optimization (1)
- metrological characterization (1)
- model-predictive control (1)
- motivation theories (1)
- passive inter-modulation (1)
- power integrity (1)
- professional skills (1)
- requirements (1)
- sensor networks (1)
- signal integrity (1)
- software engineering (1)
- systematic literature review (1)
- tablet game (1)
- water supply system (1)
Cybersecurity of Industrial Control Systems (ICS) is an important issue, as ICS incidents may have a direct impact on safety of people or the environment. At the same time the awareness and knowledge about cybersecurity, particularly in the context of ICS, is alarmingly low. Industrial honeypots offer a cheap and easy to implement way to raise cybersecurity awareness and to educate ICS staff about typical attack patterns. When integrated in a productive network, industrial honeypots may not only reveal attackers early but may also distract them from the actual important systems of the network. Implementing multiple honeypots as a honeynet, the systems can be used to emulate or simulate a whole Industrial Control System. This paper describes a network of honeypots emulating HTTP, SNMP, S7communication and the Modbus protocol using Conpot, IMUNES and SNAP7. The nodes mimic SIMATIC S7 programmable logic controllers (PLCs) which are widely used across the globe. The deployed honeypots' features will be compared with the features of real SIMATIC S7 PLCs. Furthermore, the honeynet has been made publicly available for ten days and occurring cyberattacks have been analyzed
With the many achievements of Machine Learning in the past years, it is likely that the sub-area of Deep Learning will continue to deliver major technological breakthroughs [1]. In order to achieve best results, it is important to know the various different Deep Learning frameworks and their respective properties. This paper provides a comparative overview of some of the most popular frameworks. First, the comparison methods and criteria are introduced and described with a focus on computer vision applications: Features and Uses are examined by evaluating papers and articles, Adoption and Popularity is determined by analyzing a data science study. Then, the frameworks TensorFlow, Keras, PyTorch and Caffe are compared based on the previously described criteria to highlight properties and differences. Advantages and disadvantages are compared, enabling researchers and developers to choose a framework according to their specific needs.
This paper presents an approach for reducing the cognitive load for humans working in quality control (QC) for production processes that adhere to the 6σ -methodology. While 100% QC requires every part to be inspected, this task can be reduced when a human-in-the-loop QC process gets supported by an anomaly detection system that only presents those parts for manual inspection that have a significant likelihood of being defective. This approach shows good results when applied to image-based QC for metal textile products.
In this paper, the use of reinforcement learning (RL) in control systems is investigated using a rotatory inverted pendulum as an example. The control behavior of an RL controller is compared to that of traditional LQR and MPC controllers. This is done by evaluating their behavior under optimal conditions, their disturbance behavior, their robustness and their development process. All the investigated controllers are developed using MATLAB and the Simulink simulation environment and later deployed to a real pendulum model powered by a Raspberry Pi. The RL algorithm used is Proximal Policy Optimization (PPO). The LQR controller exhibits an easy development process, an average to good control behavior and average to good robustness. A linear MPC controller could show excellent results under optimal operating conditions. However, when subjected to disturbances or deviations from the equilibrium point, it showed poor performance and sometimes instable behavior. Employing a nonlinear MPC Controller in real time was not possible due to the high computational effort involved. The RL controller exhibits by far the most versatile and robust control behavior. When operated in the simulation environment, it achieved a high control accuracy. When employed in the real system, however, it only shows average accuracy and a significantly greater performance loss compared to the simulation than the traditional controllers. With MATLAB, it is not yet possible to directly post-train the RL controller on the Raspberry Pi, which is an obstacle to the practical application of RL in a prototyping or teaching setting. Nevertheless, RL in general proves to be a flexible and powerful control method, which is well suited for complex or nonlinear systems where traditional controllers struggle.
Architecture for platform- and hardware-independent mesh networks : how to unify the channels
(2013)
This paper will prove that mesh networks among different platforms and hardware channels can help to channel valuable information even if public telecommunication infrastructure is not available due to arbitrary reasons. Therefore, results of a simulation for mesh networks on mass events will be provided, followed by the developed architecture and an outlook on future research. The developed architecture is currently being implemented and field tested on mass events.
The understanding that optimized components do not automatically lead to energy-efficient systems sets the attention from the single component on the entire technical system. At TU Darmstadt, a new field of research named Technical Operations Research (TOR) has its origin. It combines mathematical and technical know-how for the optimal design of technical systems. We illustrate our optimization approach in a case study for the design of a ventilation system with the ambition to minimize the energy consumption for a temporal distribution of diverse load demands. By combining scaling laws with our optimization methods we find the optimal combination of fans and show the advantage of the use of multiple fans.
Water distribution systems are an essential supply infrastructure for cities. Given that climatic and demographic influences will pose further challenges for these infrastructures in the future, the resilience of water supply systems, i.e. their ability to withstand and recover from disruptions, has recently become a subject of research. To assess the resilience of a WDS, different graph-theoretical approaches exist. Next to general metrics characterizing the network topology, also hydraulic and technical restrictions have to be taken into account. In this work, the resilience of an exemplary water distribution network of a major German city is assessed, and a Mixed-Integer Program is presented which allows to assess the impact of capacity adaptations on its resilience.