Filtern
Jahr
- 2020 (55) (entfernen)
Publikationstyp
- Beitrag in einer Konferenzveröffentlichung (55) (entfernen)
Volltext vorhanden
- nein (55) (entfernen)
Schlagworte
- Cyber Security (2)
- Augmented Reality (1)
- Bildung (1)
- Biogas (1)
- Continuous Software Engineering (1)
- Corporate Real Estate Management (1)
- Cost drivers (1)
- Data Analytics (1)
- E-Assessment (1)
- Echtzeitanalyse-System (1)
Fachbereich / Studiengang
- Wirtschaft (MSB) (12)
- Chemieingenieurwesen (CIW) (9)
- Gesundheit (MDH) (8)
- Elektrotechnik und Informatik (ETI) (6)
- Energie · Gebäude · Umwelt (EGU) (5)
- Maschinenbau (MB) (4)
- Physikingenieurwesen (PHY) (4)
- Bauingenieurwesen (BAU) (2)
- Oecotrophologie · Facility Management (OEF) (2)
- Center for Real Estate & Organization Dynamics (1)
- IBL (1)
- Sozialwesen (SW) (1)
- Wandelwerk. Zentrum für Qualitätsentwicklung (1)
Investigation of Clamping and Crushing Injuries with Electrically Height-Adjustable Therapy Beds
(2020)
The article describes and evaluates the concept and format of a 2-day design thinking workshop with vocational teacher candidate students. Drawing from our experiences as instructors as well as the qualitative feedback we received from students, we critically discuss what worked well and what was lost. We contrast the outcomes of this workshop with previous design thinking activities. The results highlight the qualities of design thinking that necessitate interaction in physical spaces, as well as opportunities for design thinking activities in a digitized format. As many regions experience second waves of COVID-19, educational programs will face the challenge of transforming physically co-located instruction to a completely virtual format. Our results can serve as a guide on how to recuperate energy and engagement for highly interactive seminars and workshops
Moderne Produktions- und Verarbeitungsanlagen in der Stahlherstellung beinhalten eine Vielzahl von Sensoriken und digitalisierten Informationen. Prinzipiell stehen daher bereits während des Betriebes große Datenmengen entlang des gesamten Herstellungsprozess zur Verfügung. Diese Daten werden teilweise direkt für interne Regelungen der Maschinen oder für Qualitätskontrollen genutzt. Ein Großteil dieser Daten bleibt jedoch ungenutzt. Dies hat zwei Hauptgründe: Zum einen müssten sehr große Datenmengen gespeichert werden, zum anderen sind die erzeugten Daten sehr heterogen und ohne Vorverarbeitung und Kenntnis der physikalischen Wirkzusammenhänge von keinem direktem Nutzen. Der Verknüpfung von relevantem Wissen, Modellen und Daten über alle relevanten technischen Domänen hinweg bietet die Möglichkeit den OEE zu optimieren. Ein domänenübergreifender Datenzugriff ermöglicht neue Möglichkeiten für produzierende Unternehmen, insbesondere müssen mit Wissen aufbereitete Daten zusammen mit bedarfsgerecht reduzierten Modellen genutzt werden. Diese modellbasierte Datenanalyse stellt die Grundlage für einen optimalen Nutzen von Daten aus der Produktion dar.
Pflege und Einsamkeit - Anhörung im Rahmen der Beratung der Enquetekommission IV am 04.12.2020
(2020)
The global development towards the Fourth Industrial Revolution, the so-called Industry 4.0, is steaming forwards. Where cyber-physical systems connect the physical and digital world, allowing for demand identification, without the need for direct human intervention. Further, Artificial Intelligence supports various parts of operative and strategic purchasing. The new purchasing environment forces purchasing professionals to develop new skills. Research is needed to identify appropriate skill sets. Based on a World-Café method with 82 purchasing professionals, a list of 32 essential future skills in purchasing is composed. Further, the identified skills are ranked and assigned to the roles of the direct and indirect material purchasers.
Nowadays, the human-centric discipline of purchasing and supply management (PSM) is of strategic importance for firms’ success. Within the discipline, scholars address PSM professionals’ skills and provide practitioners with academic insights. Due to changes in the industry environment, changes in the working environment and the task of purchasing professionals are assumed. This paper aims to contribute to the PSM professional skills literature by defining current PSM professionals’ skill gaps as the difference between the acquired skill level and perceived skill importance. Findings show that current PSM professionals feel to be underqualified to abstract the full potential of professional relationships, as buyer-supplier relationships, due to current PSM professionals’ skill gaps.
Gamification has been used in a wide variety of subject-specific education contexts. Examples of such usage in the Supply Chain Management (SCM) context include the oft-played beer distribution game, developed by MIT Sloan School of Management (Forrester, 1961), which simulates the coordination of typical problems in supply chain processes, promoting information sharing and collaboration throughout a supply chain (Sterman, 1984). Purchasing and Supply Management (PSM), a subset of this wider SCM area, focuses on the direct relationships between organisational buyers and suppliers, covering aspects such as establishing trust, identifying and selecting suitable suppliers, managing supplier performance and the overall relationship. A systematic review of the PSM gamified learning literature establishes that there has been limited research to date and that which there is tends to focus on quantitative representations of managing overall supply and demand, using wider SCM elements. This suggests that there are opportunities to gamify PSM learning, in particular focusing on the human element in PSM and developing soft skills, as strong buyer-supplier relationships can generate significant benefits to both parties. To provide a more focused PSM contribution, a second systematic literature review distils the relevant principles, techniques and processes to inform the development of two gamified PSM learning activities. Negotiation and supplier relationship management rely heavily on personal interactions and are both seen as key activities at different stages of the PSM process. The development of the two gamified learning activities is strengthened by being underpinned by a synthesis of the literature review’s key findings, ensuring they are domain-meaningful abstractions of reality, contain rewards and rankings based on clear objectives and have appealing gameplay. It is hoped that this paper provides a platform for future domain specific PSM research and will be of use to educators in this field in developing their own gamified learning.
The experiment study presents the influence of femtosecond laser shock peening (FsLSP) without a protective layer in the air on the surface hardness and surface mechanical property of NiTi shape memory alloy. Femtosecond laser shock peening is a new possibility of direct laser ablation without any protective layer under atmospheric conditions, which can produce intense shock waves with low pulse energy in the air. The average surface roughness values of the NiTi alloy samples were measured, because the surface roughness may affect its friction resistance. The results showed that the surface roughness of NiTi increased after femtosecond laser shock peening treatment. In comparison with the initial state, the coefficient of friction decreased and surface microhardness increased after femtosecond laser shock peening treatment with different FsLSP parameters. This improvement of wear properties may be attributed to the enhancement of surface microhardness and surface titanium oxide layer induced by the shock wave and laser ablation during FsLSP treatment.
In this study, we use a hybrid mode-locked external cavity diode laser with subsequent amplification and pulse compression. The system provides laser pulses of 440 fs width (assuming a sech² pulse shape) and 160 mW average output power at a repetition rate of 383.1 MHz. The laser oscillator consists of a double quantum well laser diode with a gain segment of 1080 μm length and an absorber element of 80 μm lengths. The chip’s back facet is covered with a high reflective coating, the front facet with an anti-reflective coating. The resonator itself is operated in a collimated geometry and folded by two dielectric mirrors. The used output coupler provides a transmission of 20 percent, which is coupled into a tapered amplifier. Two Faraday isolators are used to decouple the laser and the amplifier from any back reflections. Subsequently, the pulses are compressed using a single pass Martinez type pulse compressor …
An improvement on a concept for all optical mag- netometry using nitrogen vacancies in diamond is presented. The concept is based on the fluorescence attenuation of optically pumped nitrogen vacancies by magnetic fields up to ≈ 50 mT. The attenuation is registered by modulating the pumping power to generate a constant signal at a photodetector. A sensitivity of 2.6μT/√Hz at a sampling frequency of 500 Hz is achieved.
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
In the context of Continuous Software Engineering, it is acknowledged as best practice to develop new features on the mainline rather than on separate feature branches. Unfinished work is then usually prevented from going live by some kind of feature toggle. However, there is no concept of feature toggles for Process-Driven Applications (PDA) so far. PDAs are hybrid systems consisting not only of classical source code but also of a machine-interpretable business process model. This paper elaborates on a feature development approach that covers both the business process model and the accompanying source code artifacts of a PDA. The proposed solution, Toggles for Process-Driven Applications (T4PDA), equipped with an easy to use modeling tool extension, enables the developer to safely commit unfinished work on model and source code to the project’s mainline. It will be kept inactive during productive deployments unless the feature is finally released. During an AB/BA crossover design experiment, the T4PDA approach, including the provided tool support, showed higher software quality, a faster development process, and contented developers.
OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks.
Performing in Community-Academic Health Partnerships: Interplay of Clear, Difficult and Valued Goals
(2020)
OpenPGP and S/MIME are the two major standards for email end-to-end encryption. We show practical attacks against both encryption schemes in the context of email. First, we present a design flaw in the key update mechanism, allowing a third party to deploy a new key to the communication partners. Second, we show how email clients can be tricked into acting as an oracle for decryption or signing by exploiting their functionality to auto-save drafts. Third, we demonstrate how to exfiltrate the private key, based on proprietary mailto parameters implemented by various email clients. An evaluation shows that 8 out of 20 tested email clients are vulnerable to at least one attack. While our attacks do not target the underlying cryptographic primitives, they raise concerns about the practical security of OpenPGP and S/MIME email applications. Finally, we propose countermeasures and discuss their advantages and disadvantages.
Mediale Lernangebote können dazu beitragen, Bildungsprozesse anzuregen (Kerres, 2018, S. 139). Sie tun es aber nicht per se. Es gibt demnach nicht eine beste Lehrmethode (Kerres, 2018, S. 139).
Der Aufwand für das Erstellen von Videos lohnt sich insbesondere dann, wenn keine Präsenzveranstaltungen – aus welchem Grund auch immer – angeboten werden können.
Heutzutage ist es leider immer noch wichtig, dass das Erledigen der Aufgaben für die Studierenden lohnend ist. Dies kann umgesetzt werden, indem die Studierenden entweder Klausurpunkte für das korrekte Erledigen der Aufgaben erhalten oder indem das erfolgreiche Absolvieren z.B. der Online-Tests als Leistungsnachweis anerkannt wird.
Die wöchentlichen Aufgaben stellen sicher, dass sich die Studierenden regelmäßig, in Etappen und selbständig mit den Inhalten auseinandersetzen und so das Erlernte langfristiger im Gedächtnis bleibt. Zudem erhalten sie, bedingt durch die automatische Korrektur, sofort eine Rückmeldung, was sicherlich motivationsfördernd ist.
Die Lehrenden haben mit Hilfe der digitalen Instrumente den Vorteil, dass sie diese lernfördernden Instrumente auch in sehr großen Lerngruppen ohne großen zusätzlichen Aufwand einsetzen können.
Magnetometry with nitrogen–vacancy (NV) defects in diamond has been extensively stud-ied in the past [1]. While most approaches in-clude the use of microwaves (MW) for the de-tection of electron spin resonance, only few investigate the sensitivity of the photolumines-cence (PL) from NV centers to an external magnetic field without MW [2, 3, 4]. This work aims to utilize this effect to build a highly sensi-tive and compact room temperature magne-tometer. The avoidance of MW serves the re-duction of production costs and allows a com-mercialization at the current patent situation.
Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques.
Hintergrund: Der globale Anstieg von lebensstilabhängigen Erkrankungen, wie Diabetes mellitus Typ 2 (DMT2), führt zu enormen Belastungen für das Gesundheitssystem. Dabei er-weist sich insbesondere der DMT2 häufig durch regelmäßige Untersuchungen und Medikationen als sehr kostenintensiv. Vor diesem Hintergrund stellt sich die Frage, inwiefern ein Le-bensstilprogramm (LSP), durch die Senkung der Nüchternglu-cose und des HbA1c-Wertes, das DM2T-Risikoprofil verbessern und dem Übergang des Prädiabetes in einen DMT2 entgegen-wirken sowie sukzessive Kosteneinsparungen erzielen kann.Methoden: Das LSP umfasst eine 24-monatige, prospektive und kontrollierte Interventionsstudie mit Personen ≥18Jah-ren. Datenerhebungen wurden zur Baseline (t0) sowie nach 10 Wochen (t1) und 6, 12, 18 und 24 Monaten (t2–t5) festge-legt. Dabei werden u.a. Laborparameter (z.B. Nüchternglu-cose und HbA1c) sowie gesundheitsökonomische Parameter (z.B. Behandlungen und Medikationen) erfasst. In der Inter-ventionsgruppe (N=112) wurden individuelle Coachings, ein 10-wöchiges intensives LSP und monatliche Folgetreffen durchgeführt. Die Kontrollgruppe (N=87) erhielt ein „Treat-ment as usual“.Ergebnisse: In der Interventionsgruppe zeigte sich eine kon-tinuierliche Verringerung der Nüchternglucose (p<0,05), bis-her jedoch keine signifikante HbA1c-Reduktion, innerhalb der ersten 3 Messzeitpunkte (t0–t2). In der Kontrollgruppe wurde eine geringere Senkung der Nüchternglucose (p<0,01) sowie ein leichter Anstieg des HbA1c-Wertes (p<0,01) beobachtet (t0–t2).Schlussfolgerung: Das LSP konnte bisher zu einer Verbes-serung des DMT2-Risikoprofils führen (t0–t2) und kann sich präventiv auf die Manifestation und den Übergang eines Prä-diabetes in einen DMT2 auswirken. Daraus können Kosten-einsparungen abgeleitet werden. Die Auswertung weiterer Messzeitpunkte kann die langfristigen Auswirkungen des LSPs auf die Verbesserung von DMT2-assoziierten Parametern und damit verbundenen gesundheitsökonomischen Parame-tern aufzeigen.
The use of augmented reality (AR) in outbound logistics is associated with potentially strong stimuli for cost savings and throughput time. Nevertheless, the benefits of AR compared to conventional methods require a holistic analysis for investment decision making. Until now, research has only assessed case-study-related potentials and selected aspects of the technology. This paper answers the following research questions: How can the economic efficiency of AR in the packing process be quantified by utilizing a holistic model of value drivers? How can AR be technically implemented for packing processes in outbound logistics? What economic profit results from the use of AR technology in a case company’s packing process?
The presented model enables the investment decision to be supported based on economic value added (EVA), thereby providing an assessment of value drivers in packing systems. Cost drivers are identified on the basis of the Supply Chain Operations Reference (SCOR) process model. The technical and economic validation of the model was carried out by means of an empirical study: Expert interviews were conducted for validating the model elements. Data collection by a prototype at a mechanical-engineering company was used to calculate the value contribution. The mapping of cause-effect relationships within the framework of EVA driver trees has proven itself in both the expert interviews and the prototype validation. The field experiment at the case company demonstrated a positive value contribution of AR, in particular regarding employee productivity, length and variance of throughput time, quality aspects, volume utilization, and quantity of packing material used.