Refine
Year of publication
Document Type
- Article (625)
- Conference Proceeding (296)
- Book (113)
- Part of a Book (61)
- Patent (15)
- Report (9)
- Other (8)
- Contribution to a Periodical (6)
- Course Material (6)
- Doctoral Thesis (6)
- Bachelor Thesis (1)
- Video (1)
- Poster (1)
- Review (1)
- Talk (1)
Language
- English (693)
- German (456)
- Multiple languages (1)
Keywords
- Multimediamarkt (7)
- Enterprise Architecture (5)
- MINLP (5)
- Engineering optimization (4)
- Gamification (4)
- Serious Game (4)
- Auslenkung (3)
- Digitale Transformation (3)
- Digitalisierung (3)
- Education (3)
- Javasimulation (3)
- Literaturanalyse (3)
- Optimization (3)
- Powertrain (3)
- Referenzmodellierung (3)
- Robotic Process Automation (3)
- Technical Operations Research (3)
- Telecommunication (3)
- Amplitude (2)
- Autonomous mobile robots (2)
- Competence Developing Games (2)
- Content Management (2)
- Energy efficiency (2)
- Experimental validation (2)
- Feder (2)
- Forschungsprozess (2)
- Hot S-parameter (2)
- Industry 4.0 (2)
- Machine Learning (2)
- Mathematik (2)
- Multi-robot systems (2)
- Optimal Topology (2)
- Process engineering (2)
- Prozessautomatisierung (2)
- Pump System (2)
- Simulation (2)
- Smart Building (2)
- Smart factory (2)
- TM Forum (2)
- Text Analytics (2)
- Ventilation System (2)
- Virtuelle Realität (2)
- Water (2)
- Water distribution system (2)
- autonomous driving (2)
- eTOM (2)
- enhanced Telecom Operations Map (eTOM) (2)
- mathematical optimization (2)
- robotic process automation (2)
- 3-D printing (1)
- 3D object detection (1)
- Advanced driver assistance systems (ADAS/AD) (1)
- Agile development (1)
- Agility (1)
- Android (1)
- Angle Sensor (1)
- Anomalieerkennung (1)
- Anomaly detection (1)
- Antennen (1)
- Anwendungsorientierter Forschungsansatz (1)
- Arbeit 4.0 (1)
- Artificial Intelligence (1)
- Automated driving (1)
- Automation (1)
- Automotive application (1)
- Awareness (1)
- BEV (1)
- BIM (1)
- Benchmark (1)
- Besetzungsinversion (1)
- Bewertungsframework (1)
- Bloom’s Taxonomy (1)
- Booster Stations (1)
- Buffering Capacity (1)
- Building Automation (1)
- Business Engineering (1)
- Business Process (1)
- Bändermodell (1)
- CAV (1)
- CCD-Bildwandler (1)
- CDG (1)
- CMS (1)
- CO2 (1)
- Calcium oxides (1)
- Carbon Dioxide (1)
- Case Study (1)
- Case study (1)
- Chance Constraint (1)
- Change culture (1)
- Chaostheorie (1)
- Charging stations (1)
- Chatbots (1)
- Circuit simulation (1)
- Competence Developing Gam (1)
- Competence Developing Game (1)
- Computational modeling (1)
- Connected Automated Vehicle (1)
- Conpot (1)
- Control (1)
- Controller Parameter (1)
- Cooling system (1)
- Cryptographic protocols (1)
- Customer Experience Management (1)
- Customer Journeys (1)
- Customer Orientation (1)
- Cyber-physical systems (1)
- Cybersecurity (1)
- Cybersicherheit (1)
- Datasets (1)
- Deep learning (1)
- Design Science Research (1)
- DiggiTwin (1)
- Digital Age (1)
- Digital Game Based Learning (1)
- Digital Twin Evolution (1)
- Digital transformation (1)
- Digital triage (1)
- Digital twin (1)
- Digitale Lehre (1)
- Discrete Optimisation (1)
- Dreidimensionale Bildverarbeitung (1)
- Drinking Water Supply (1)
- E-Learning (1)
- E-carsharing (1)
- E-mobility (1)
- EBSCO Discovery Service (1)
- Efficiency (1)
- Efficiency optimization (1)
- Electrocardiography (1)
- Electron-phonon coupling (1)
- Elektrische Leitung (1)
- Elektronengas (1)
- Elektrotechnik (1)
- Elicit (1)
- Energy (1)
- Energy Disaggregation (1)
- Engineering Application (1)
- Engineering optimisation (1)
- Enhanced Telecom Operations Map (1)
- Enterprise architecture (1)
- Enterprise transformation (1)
- FPGA (1)
- Feldsimulation (1)
- Festkörper (1)
- Forschung (1)
- Forschungsinformationssystem (1)
- Frequency Doubler (1)
- Fully connected car (1)
- Furnace (1)
- Fusion (1)
- Future Skills (1)
- GPU (1)
- Game-based learning (1)
- Gearbox (1)
- Geschäftsmodelle (1)
- Geschäftsprozessmanagement (1)
- Gleichspannungswandler (1)
- Global optimization (1)
- Graduiertentagung (1)
- Graph Theory (1)
- HDTV (1)
- Harmonic Radar (1)
- He-Ne Laser (1)
- He-Ne Schema (1)
- Helium-Neon-Laser (1)
- Heuristic algorithms (1)
- High Definition Media Services (1)
- High Quality Streaming (1)
- Hochfrequenztechnik (1)
- Home Assistant (1)
- Home Automation Platform (1)
- IBM Watson Explorer (1)
- ICS (1)
- IP-based networks (1)
- ISO 26262 (1)
- IT security education (1)
- IT-Marketing (1)
- IT-Sicherheit (1)
- Image Database (1)
- Image Forensics (1)
- Implementation Case (1)
- Impulstechnik (1)
- Incremental Encoder (1)
- IndraMotion (1)
- Inductive charging (1)
- Industrial optimisation (1)
- Information and communication technology (1)
- Informationsgetriebene Geschäftsmodelle (1)
- Informationssicherheit (1)
- Informationssicherheitsmanagement (1)
- Integrated mobility (1)
- Intelligentes Parken (1)
- Interactive process mining (1)
- Interdisciplinarity (1)
- Internet der Dinge (1)
- IoT (1)
- Keyword analysis (1)
- Klassifikator <Informatik> (1)
- Kommerzielle Interaktionen (1)
- LQR (1)
- Latin Hypercube Sampling (1)
- Leaderboard (1)
- Lean thinking (1)
- Level Control System (1)
- LiDAR (1)
- Lichtabsorption (1)
- Lichtbetrachtung (1)
- Lichtemission (1)
- Lichtquelle (1)
- Lidar (1)
- Literatur-analyse-prozess (1)
- Literaturdaten (1)
- Literature review (1)
- Literaturrecherche (1)
- MATLAB , MLPI , Motion control , Open Core , industrial drives , rapid control prototypin , sercos automation bus (1)
- MILP (1)
- MPC (1)
- MPEG 4 (1)
- MPEG 7 (1)
- MPEG-Standard (1)
- Machine learning (1)
- Malicious model (1)
- Management (1)
- Map (eTOM) Process reference model Process design Telecommunications industry (1)
- McLuhan, Marshall (1)
- Methodology (1)
- Minimum Risk Manoeuvre (1)
- Mixed Integer Programming (1)
- Mixed-Integer Nonlinear Optimisation (1)
- Mixed-integer nonlinear black-box optimization (1)
- Mixed-integer nonlinear problem (1)
- Mixed-integer nonlinear programming (1)
- Mixed-integer programming (1)
- Mobile Phones (1)
- Mobility management (1)
- Mode converter (1)
- Modeling (1)
- Monetarisierung (1)
- Motion-Logic System (1)
- Mpc (1)
- Multi-criteria optimization (1)
- Multimedia-Dienst (1)
- NGN (1)
- Navigation (1)
- Network (1)
- Network design (1)
- Neural networks (1)
- Next Generation Network (1)
- OR 2019 (1)
- Objective data (1)
- Objekterkennung (1)
- Open Source (1)
- Operational Design Domain (1)
- Optimal Closed Loop (1)
- PPO (1)
- Paper recycling (1)
- Path-following (1)
- Pendel (1)
- Performance (1)
- Personality (1)
- Phonons (1)
- Piecewise Linearization (1)
- Piecewise linearization (1)
- Plasma (1)
- Plasma diagnostics (1)
- Plasmatechnik (1)
- Player Types (1)
- Position Encoder (1)
- Praxisprojekte (1)
- Preface (1)
- Privacy-enhancing technologies (1)
- Process design (1)
- Process optimization (1)
- Process reference model (1)
- Process virtualization (1)
- Product bundling (1)
- Product family optimization (1)
- Projektbeispiele (1)
- Prototype (1)
- Prozessabläufe (1)
- Prozessagilität (1)
- Prozessmodellierung (1)
- Prozessstandardisierung (1)
- Pulselektroniklabor (1)
- Pumping systems (1)
- Qualitative Wertschöpfungsanalyse (1)
- Quality control (1)
- Quantum Computing (1)
- Quantum Machine Learning (1)
- Radar (1)
- Reference Process Model (1)
- Reference modelling (1)
- Referenzmodelle (1)
- Reinforcement Learning (1)
- Relaxation (1)
- Rescue System (1)
- Research process (1)
- Resilience (1)
- Resilience Assessment (1)
- Resilience assessment (1)
- Resilience metric graph theory (1)
- Resilient infrastructure (1)
- Resonator (1)
- RoboCup (1)
- Robotic process automation (1)
- Rotary encoder (1)
- Rotational Encoder (1)
- Rotatory Inverted Pendulum (1)
- SPS (1)
- Safety of the intended functionality (SOTIF) (1)
- Safety-critical systems validation (1)
- Secure multi-party computation (1)
- Self-driving (1)
- Sensors comparison (1)
- Serious Games (1)
- Serviceintegration (1)
- Services (1)
- Signalquelle (1)
- Similarity Theory (1)
- Society (1)
- Software (1)
- Software Robots (1)
- Software development (1)
- Software testing (1)
- Softwareroboter (1)
- Solver Per- formance (1)
- Speicherprogrammierte Steuerung (1)
- Stochastic Programming (1)
- Story (1)
- Stress testing (1)
- Subject-oriented Business Process Management (1)
- Supraleitung (1)
- Sustainability (1)
- System Design (1)
- System Design Problem (1)
- TGA (1)
- Tag (1)
- Teamwork (1)
- Technical Operation Research (1)
- Telecommunication Industry (1)
- Telecommunications Industry. (1)
- Text Analytics (1)
- Text Mining (1)
- Text analytics (1)
- Text mining (1)
- Three-dimensional displays (1)
- Time-series synchronization (1)
- Transdisciplinarity (1)
- Transformation (1)
- Transformation Project (1)
- Transformative Competencies (1)
- Transiton of Control (1)
- Transponder (1)
- Triage-app (1)
- Uncertainty (1)
- Unternehmensarchitektur (1)
- Unternehmensarchitekturen (1)
- Unternehmensarchitekturen Internet der Dinge (1)
- Unternehmensstrukturen (1)
- Unternehmenstransformation (1)
- Urban areas (1)
- V2X (1)
- Validation (1)
- Video Game (1)
- Vorverarbeitung (1)
- WLTP (1)
- Water Distribution (1)
- Water Supply Networks (1)
- Water Supply System (1)
- Water supply system (1)
- Wearable electronic device (1)
- Wertschöpfungskettenanalyse (1)
- Wiegand Effect (1)
- Wiegand sensor (1)
- Wissenstransfer (1)
- Wärmeübertragung (1)
- Zero-knowledge proofs (1)
- active learning (1)
- agile (1)
- anticipation strategy (1)
- applications (1)
- artificial intelligence (1)
- automated vehicles (1)
- availability (1)
- batteries and fuel cells (1)
- body imaging at 7 T MRI (1)
- business analytics (1)
- business process automation (1)
- business simulation (1)
- commercial offthe- shelf solutions (1)
- competence developing games (1)
- connected automated vehicles (1)
- culpability (1)
- cybersecurity (1)
- decision analytics (1)
- design of technical systems (1)
- digital economy (1)
- do-it-yourself (1)
- education (1)
- electrospinning (1)
- embedded hardware (1)
- energy efficiency (1)
- energy transfer (1)
- experimental evaluation (1)
- fault detection (1)
- fibers (1)
- genetic algorithm (1)
- global optimization (1)
- harmonic radar (1)
- harmonic radar tags (1)
- heating system (1)
- honeynet (1)
- honeypot (1)
- ignition (1)
- information systems (1)
- irradiation (1)
- lab work (1)
- learning theories (1)
- legal obligations (1)
- liability (1)
- management (1)
- metrological characterization (1)
- microplasma (1)
- microwave (MW) plasma (1)
- microwave measurements (1)
- mixed-integer linear programming (1)
- model-predictive control (1)
- motivation theories (1)
- next generation network (1)
- nonlinear VNA measurements (1)
- optimization (1)
- passive inter-modulation (1)
- plasma jet (1)
- porous materials (1)
- power integrity (1)
- product bundling (1)
- product liability (1)
- professional skills (1)
- programming (1)
- remote sensing (1)
- requirements (1)
- research framework (1)
- resilience (1)
- sensor networks (1)
- signal integrity (1)
- slum classification (1)
- software engineering (1)
- software evaluation (1)
- software selection (1)
- stochastic optimization (1)
- sustainability (1)
- system optimization (1)
- system synthesis (1)
- systematic literature review (1)
- tablet game (1)
- technical operations research (1)
- technology (1)
- telecommunication (1)
- thermal dose (1)
- tissue temperature (1)
- transmit antenna arrays (1)
- water supply design (1)
- water supply system (1)
- Überwachung & Optimierung (1)
Institute
- Fachbereich Elektrotechnik und Informationstechnik (1150) (remove)
Intelligent autonomous software robots replacing human activities and performing administrative processes are reality in today’s corporate world. This includes, for example, decisions about invoice payments, identification of customers for a marketing campaign, and answering customer complaints. What happens if such a software robot causes a damage? Due to the complete absence of human activities, the question is not trivial. It could even happen that no one is liable for a damage towards a third party, which could create an uncalculatable legal risk for business partners. Furthermore, the implementation and operation of those software robots involves various stakeholders, which result in the unsolvable endeavor of identifying the originator of a damage. Overall it is advisable to all involved parties to carefully consider the legal situation. This chapter discusses the liability of software robots from an interdisciplinary perspective. Based on different technical scenarios the legal aspects of liability are discussed.
Verfügbarkeit und Nachhaltigkeit sind wichtige Anforderungen bei der Planung langlebiger technischer Systeme. Meist werden bei Lebensdaueroptimierungen lediglich einzelne Komponenten vordefinierter Systeme untersucht. Ob eine optimale Lebensdauer eine gänzlich andere Systemvariante bedingt, wird nur selten hinterfragt. Technical Operations Research (TOR) erlaubt es, aus Obermengen technischer Systeme automatisiert die lebensdaueroptimale Systemstruktur auszuwählen. Der Artikel zeigt dies am Beispiel eines hydrostatischen Getriebes.
The main objective of our ROS Summer School series is to introduce MA level students to program mobile robots with the Robot Operating System (ROS). ROS is a robot middleware that is used my many research institutions world-wide. Therefore, many state-of-the-art algorithms of mobile robotics are available in ROS and can be deployed very easily. As a basic robot platform we deploy a 1/10 RC cart that is wquipped with an Arduino micro-controller to control the servo motors, and an embedded PC that runs ROS. In two weeks, participants get to learn the basics of mobile robotics hands-on. We describe our teaching concepts and our curriculum and report on the learning success of our students.
Kurzschlußstromberechnung
(1980)
Die steigende Popularität von mobilen Endgeräten im privaten und geschäftlichen Umfeld geht mit einem Anstieg an Sicherheitslücken und somit potentiellen Angriffsflächen einher. Als ein Element der technischen und organisatorischen Maßnahmen zum Schutz eines Netzwerkes können Monitoring-Apps dienen, die unerwünschtes Verhalten und Angriffe erkennen. Die automatisierte Überwachung von Endgeräten ist jedoch rechtlich und ethisch komplex. Dies in Kombination mit einer hohen Sensibilität der Nutzer und Nutzerinnen dieser Geräte in Bezug auf Privatsphäre, kann zu einer geringen Akzeptanz und Compliance führen. Eine datenschutzrechtlich und ethisch einwandfreie Konzeption solcher Apps bereits im Designprozess führt zu höherer Akzeptanz und verbessert so die Effizienz. Diese Analyse beschreibt Möglichkeiten zur Umsetzung.
Ziel der Arbeit war es eine spielerische Lernanwendung für Studierende der FH-Aachen zu entwickeln, um das individuelle Lernen zu fördern. Dabei lag der Fokus auf der Konzeptentwicklung eines Serious Games für die Fachhochschule Aachen. Abgeleitet von Motivationstheorien, Game Design Frameworks und Eigenschaften von digitalen spielerischen Konzepten wurde ein Vorgehensmodell zur Konzeptentwicklung eines Serious Games erstellt. Wichtige Punkte für die Anwendung waren eine intensive Austauschmöglichkeiten für Studierende und das Integrieren dieser in die Lehrveranstaltungen der FH-Aachen. In der abschließenden Evaluation wurde positives Feedback der Studierenden eingeholt und damit das Ziel der Arbeit erreicht.
Zusätzlich wurde für das erarbeitete Konzept die Wirtschaftlichkeit überprüft. Dafür wurde während der Bearbeitungszeit mit einem aufgestellten Team ein Business Plan für das Förderprogramm Start-Up transfer.NRW entwickelt.
Die Informationsbroschüre "Konzept für einen spielerischen Ansatz zur multimodalen Mobilitätsplanung“ richtet sich an Spiele- und System-Designer sowie Entwickler. In dieser Broschüre werden mögliche Potenziale im Bereich des allgemeinen Mobilitätsmanagements aufgezeigt, Automobilhersteller vernetzten sich zunehmend mit Technologie-Unternehmen.
Die Verbindung der Welten dressierter Elektronen und grenzenloser Kreativität bietet ein großes Potential; zum Beispiel bei modernen Skulpturen, deren Form sich durch Motoren verändern kann. An der FH Aachen wurde ein solches Projekt verwirklicht: Eine Matrix aus Holzkugeln kann Piktogramme anzeigen, aber auch mathematische Funktionen visualisieren. In diesem Artikel beschreiben wir die clevere Ansteuerung der Motoren.
K3 User Guide
(2000)
IT-Sicherheit im Automobil
(2014)
Malware auf Smartphones ist ein Problem, dem auch Strafverfolgungsbehörden immer häufiger gegenüberstehen.
Insbesondere Telefone, bei denen potentiell schadhafte Apps zu einem finanziellen Schaden
geführt haben, finden sich auf den Schreibtischen der Polizei wieder. Dabei müssen die Ermittler möglichst
schnell und gezielt erkennen können, ob eine App tatsächlich schadhaft manipuliert wurde, was
manipuliert wurde und mit wem die App kommuniziert. Klassische Malware-Erkennungsverfahren helfen
zwar bei der generellen Erkennung schadhafter Software, sind aber für die polizeiliche Praxis nicht
geeignet. Dieses Paper stellt ein Programm vor, welches gerade die forensischen Fragestellungen berücksichtigt
und so für den Einsatz in der Strafverfolgung in Frage kommt.
RGB-D sensors such as the Microsoft Kinect or the Asus Xtion are inexpensive 3D sensors. A depth image is computed by calculating the distortion of a known infrared light (IR) pattern which is projected into the scene. While these sensors are great devices they have some limitations. The distance they can measure is limited and they suffer from reflection problems on transparent, shiny, or very matte and absorbing objects. If more than one RGB-D camera is used the IR patterns interfere with each other. This results in a massive loss of depth information. In this paper, we present a simple and powerful method to overcome these problems. We propose a stereo RGB-D camera system which uses the pros of RGB-D cameras and combine them with the pros of stereo camera systems. The idea is to utilize the IR images of each two sensors as a stereo pair to generate a depth map. The IR patterns emitted by IR projectors are exploited here to enhance the dense stereo matching even if the observed objects or surfaces are texture-less or transparent. The resulting disparity map is then fused with the depth map offered by the RGB-D sensor to fill the regions and the holes that appear because of interference, or due to transparent or reflective objects. Our results show that the density of depth information is increased especially for transparent, shiny or matte objects.
Control mechanisms like Industrial Controls Systems (ICS) and its subgroup SCADA (Supervisory Control and Data Acquisition) are a prerequisite to automate industrial processes. While protection of ICS on process management level is relatively straightforward – well known office IT security mechanisms can be used – protection on field bus level is harder to achieve as there are real-time and production requirements like 24x7 to consider. One option to improve security on field bus level is to introduce controls that help to detect and to react on attacks. This paper introduces an initial set of intrusion detection mechanisms for the field bus protocol EtherCAT. To this end existing Ethernet attack vectors including packet injection and man-in-the-middle attacks are tested in an EtherCAT environment, where they could interrupt the EtherCAT network and may even cause physical damage. Based on the signatures of such attacks, a preprocessor and new rule options are defined for the open source intrusion detection system Snort demonstrating the general feasibility of intrusion detection on field bus level.