Refine
Year
- 2020 (60) (remove)
Publication Type
- Conference Proceeding (60) (remove)
Keywords
- Cyber Security (2)
- Ack Ratio (1)
- Augmented Reality (1)
- Bildung (1)
- Biogas (1)
- Continuous Software Engineering (1)
- Corporate Real Estate Management (1)
- Cost drivers (1)
- Data Analytics (1)
- E-Assessment (1)
Faculty
- Wirtschaft (MSB) (14)
- Chemieingenieurwesen (CIW) (9)
- Elektrotechnik und Informatik (ETI) (8)
- Gesundheit (MDH) (8)
- Energie · Gebäude · Umwelt (EGU) (5)
- Maschinenbau (MB) (4)
- Physikingenieurwesen (PHY) (4)
- Bauingenieurwesen (BAU) (2)
- Oecotrophologie · Facility Management (OEF) (2)
- Wandelwerk. Zentrum für Qualitätsentwicklung (2)
The use of augmented reality (AR) in outbound logistics is associated with potentially strong stimuli for cost savings and throughput time. Nevertheless, the benefits of AR compared to conventional methods require a holistic analysis for investment decision making. Until now, research has only assessed case-study-related potentials and selected aspects of the technology. This paper answers the following research questions: How can the economic efficiency of AR in the packing process be quantified by utilizing a holistic model of value drivers? How can AR be technically implemented for packing processes in outbound logistics? What economic profit results from the use of AR technology in a case company’s packing process?
The presented model enables the investment decision to be supported based on economic value added (EVA), thereby providing an assessment of value drivers in packing systems. Cost drivers are identified on the basis of the Supply Chain Operations Reference (SCOR) process model. The technical and economic validation of the model was carried out by means of an empirical study: Expert interviews were conducted for validating the model elements. Data collection by a prototype at a mechanical-engineering company was used to calculate the value contribution. The mapping of cause-effect relationships within the framework of EVA driver trees has proven itself in both the expert interviews and the prototype validation. The field experiment at the case company demonstrated a positive value contribution of AR, in particular regarding employee productivity, length and variance of throughput time, quality aspects, volume utilization, and quantity of packing material used.
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
The experiment study presents the influence of femtosecond laser shock peening (FsLSP) without a protective layer in the air on the surface hardness and surface mechanical property of NiTi shape memory alloy. Femtosecond laser shock peening is a new possibility of direct laser ablation without any protective layer under atmospheric conditions, which can produce intense shock waves with low pulse energy in the air. The average surface roughness values of the NiTi alloy samples were measured, because the surface roughness may affect its friction resistance. The results showed that the surface roughness of NiTi increased after femtosecond laser shock peening treatment. In comparison with the initial state, the coefficient of friction decreased and surface microhardness increased after femtosecond laser shock peening treatment with different FsLSP parameters. This improvement of wear properties may be attributed to the enhancement of surface microhardness and surface titanium oxide layer induced by the shock wave and laser ablation during FsLSP treatment.
Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite.
In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue.
In this study, we use a hybrid mode-locked external cavity diode laser with subsequent amplification and pulse compression. The system provides laser pulses of 440 fs width (assuming a sech² pulse shape) and 160 mW average output power at a repetition rate of 383.1 MHz. The laser oscillator consists of a double quantum well laser diode with a gain segment of 1080 μm length and an absorber element of 80 μm lengths. The chip’s back facet is covered with a high reflective coating, the front facet with an anti-reflective coating. The resonator itself is operated in a collimated geometry and folded by two dielectric mirrors. The used output coupler provides a transmission of 20 percent, which is coupled into a tapered amplifier. Two Faraday isolators are used to decouple the laser and the amplifier from any back reflections. Subsequently, the pulses are compressed using a single pass Martinez type pulse compressor …
In the context of Continuous Software Engineering, it is acknowledged as best practice to develop new features on the mainline rather than on separate feature branches. Unfinished work is then usually prevented from going live by some kind of feature toggle. However, there is no concept of feature toggles for Process-Driven Applications (PDA) so far. PDAs are hybrid systems consisting not only of classical source code but also of a machine-interpretable business process model. This paper elaborates on a feature development approach that covers both the business process model and the accompanying source code artifacts of a PDA. The proposed solution, Toggles for Process-Driven Applications (T4PDA), equipped with an easy to use modeling tool extension, enables the developer to safely commit unfinished work on model and source code to the project’s mainline. It will be kept inactive during productive deployments unless the feature is finally released. During an AB/BA crossover design experiment, the T4PDA approach, including the provided tool support, showed higher software quality, a faster development process, and contented developers.
Smart wearable devices become more and more prevalent in the age of the Internet of Things. While people wear them as fitness trackers or full-fledged smartphones, they also come in unique versions as smartwatches for children. These watches allow parents to track the location of their children in real-time and offer a communication channel between parent and child.
In this paper, we analyzed six smartwatches for children and the corresponding backend platforms and applications for security and privacy concerns. We structure our analysis in distinct attacker scenarios and collect and describe related literature outside academic publications. Using a cellular network Man-in-the-Middle setup, reverse engineering, and dynamic analysis, we found several severe security issues, allowing for sensitive data disclosure, complete watch takeover, and illegal remote monitoring functionality.