Refine
Year
- 2020 (60) (remove)
Publication Type
- Conference Proceeding (60) (remove)
Keywords
- Cyber Security (2)
- Ack Ratio (1)
- Augmented Reality (1)
- Bildung (1)
- Biogas (1)
- Continuous Software Engineering (1)
- Corporate Real Estate Management (1)
- Cost drivers (1)
- Data Analytics (1)
- E-Assessment (1)
- Echtzeitanalyse-System (1)
- Economic value added (1)
- Facility Management (1)
- Feature-driven Development (1)
- Geld (1)
- Highly Sensitive (1)
- Humanismus (1)
- ILIAS (1)
- INET OMNeT++ (1)
- Industrie 4.0 (1)
- Literaturunterricht (1)
- Metallschrott (1)
- Migration (1)
- Mitschnitte von Vorlesungen (1)
- Multisensor (1)
- Multisensor-Systeme (1)
- Neuzuwanderung (1)
- Online Learning (1)
- Online-Tests/Übungen (1)
- Open Document Format (1)
- Optimierung (1)
- PGP (1)
- Packaging (1)
- Panopto (1)
- Predictive Maintenance (1)
- Privacy (1)
- Process-Driven Application (1)
- Protocol Simulation (1)
- Prävention; Diabetes mellitus Typ 2; Gesundheitsökonomie (1)
- QUIC (1)
- Rührtechnik (1)
- S/MIME (1)
- Security (1)
- Transport Protocol (1)
- Value contribution (1)
- data management (1)
- docx (1)
- internet of things (1)
- photoluminescence based magnetic field sensors (1)
- resilience (1)
- smart grid (1)
- study programme development, negotiation, change of perspective (1)
- Ökonomik (1)
- Ökonomisches Wissen (1)
Faculty
- Wirtschaft (MSB) (14)
- Chemieingenieurwesen (CIW) (9)
- Elektrotechnik und Informatik (ETI) (8)
- Gesundheit (MDH) (8)
- Energie · Gebäude · Umwelt (EGU) (5)
- Maschinenbau (MB) (4)
- Physikingenieurwesen (PHY) (4)
- Bauingenieurwesen (BAU) (2)
- Oecotrophologie · Facility Management (OEF) (2)
- Wandelwerk. Zentrum für Qualitätsentwicklung (2)
- Center for Real Estate & Organization Dynamics (1)
- IBL (1)
- Sozialwesen (SW) (1)
Investigation of Clamping and Crushing Injuries with Electrically Height-Adjustable Therapy Beds
(2020)
The article describes and evaluates the concept and format of a 2-day design thinking workshop with vocational teacher candidate students. Drawing from our experiences as instructors as well as the qualitative feedback we received from students, we critically discuss what worked well and what was lost. We contrast the outcomes of this workshop with previous design thinking activities. The results highlight the qualities of design thinking that necessitate interaction in physical spaces, as well as opportunities for design thinking activities in a digitized format. As many regions experience second waves of COVID-19, educational programs will face the challenge of transforming physically co-located instruction to a completely virtual format. Our results can serve as a guide on how to recuperate energy and engagement for highly interactive seminars and workshops
Quick UDP Internet Connections (QUIC) is a novel transport protocol introducing known features in a new protocol design. To investigate these features and the design, we developed a QUIC implementation in the INET simulation model suite.
In this paper, we describe that implementation, its validation and a result achieved using the simulation model. The result shows the negative impact on throughput, when raising the acknowledgment ratio. We propose a solution and describe how it solves the issue.
Moderne Produktions- und Verarbeitungsanlagen in der Stahlherstellung beinhalten eine Vielzahl von Sensoriken und digitalisierten Informationen. Prinzipiell stehen daher bereits während des Betriebes große Datenmengen entlang des gesamten Herstellungsprozess zur Verfügung. Diese Daten werden teilweise direkt für interne Regelungen der Maschinen oder für Qualitätskontrollen genutzt. Ein Großteil dieser Daten bleibt jedoch ungenutzt. Dies hat zwei Hauptgründe: Zum einen müssten sehr große Datenmengen gespeichert werden, zum anderen sind die erzeugten Daten sehr heterogen und ohne Vorverarbeitung und Kenntnis der physikalischen Wirkzusammenhänge von keinem direktem Nutzen. Der Verknüpfung von relevantem Wissen, Modellen und Daten über alle relevanten technischen Domänen hinweg bietet die Möglichkeit den OEE zu optimieren. Ein domänenübergreifender Datenzugriff ermöglicht neue Möglichkeiten für produzierende Unternehmen, insbesondere müssen mit Wissen aufbereitete Daten zusammen mit bedarfsgerecht reduzierten Modellen genutzt werden. Diese modellbasierte Datenanalyse stellt die Grundlage für einen optimalen Nutzen von Daten aus der Produktion dar.
Pflege und Einsamkeit - Anhörung im Rahmen der Beratung der Enquetekommission IV am 04.12.2020
(2020)
While the service sector is growing rapidly, the purchasing of services has not yet received significant attention in theory or practice. Service purchasers face serious challenges, and existing purchasing practices for services are often non-strategic. We choose an exploratory–qualitative research approach to investigate the purchasing of IT, logistics and Maintenance, Repair, and Overhaul (MRO) services. In particular, we focus on the role of visibility and analyze how service purchasers can benefit from extensive knowledge about their service networks. We determine that visibility indeed adds significant value to service purchasing and can help service purchasers to decrease costs, mitigate risks and maintain competitiveness.
The global development towards the Fourth Industrial Revolution, the so-called Industry 4.0, is steaming forwards. Where cyber-physical systems connect the physical and digital world, allowing for demand identification, without the need for direct human intervention. Further, Artificial Intelligence supports various parts of operative and strategic purchasing. The new purchasing environment forces purchasing professionals to develop new skills. Research is needed to identify appropriate skill sets. Based on a World-Café method with 82 purchasing professionals, a list of 32 essential future skills in purchasing is composed. Further, the identified skills are ranked and assigned to the roles of the direct and indirect material purchasers.
Nowadays, the human-centric discipline of purchasing and supply management (PSM) is of strategic importance for firms’ success. Within the discipline, scholars address PSM professionals’ skills and provide practitioners with academic insights. Due to changes in the industry environment, changes in the working environment and the task of purchasing professionals are assumed. This paper aims to contribute to the PSM professional skills literature by defining current PSM professionals’ skill gaps as the difference between the acquired skill level and perceived skill importance. Findings show that current PSM professionals feel to be underqualified to abstract the full potential of professional relationships, as buyer-supplier relationships, due to current PSM professionals’ skill gaps.
Gamification has been used in a wide variety of subject-specific education contexts. Examples of such usage in the Supply Chain Management (SCM) context include the oft-played beer distribution game, developed by MIT Sloan School of Management (Forrester, 1961), which simulates the coordination of typical problems in supply chain processes, promoting information sharing and collaboration throughout a supply chain (Sterman, 1984). Purchasing and Supply Management (PSM), a subset of this wider SCM area, focuses on the direct relationships between organisational buyers and suppliers, covering aspects such as establishing trust, identifying and selecting suitable suppliers, managing supplier performance and the overall relationship. A systematic review of the PSM gamified learning literature establishes that there has been limited research to date and that which there is tends to focus on quantitative representations of managing overall supply and demand, using wider SCM elements. This suggests that there are opportunities to gamify PSM learning, in particular focusing on the human element in PSM and developing soft skills, as strong buyer-supplier relationships can generate significant benefits to both parties. To provide a more focused PSM contribution, a second systematic literature review distils the relevant principles, techniques and processes to inform the development of two gamified PSM learning activities. Negotiation and supplier relationship management rely heavily on personal interactions and are both seen as key activities at different stages of the PSM process. The development of the two gamified learning activities is strengthened by being underpinned by a synthesis of the literature review’s key findings, ensuring they are domain-meaningful abstractions of reality, contain rewards and rankings based on clear objectives and have appealing gameplay. It is hoped that this paper provides a platform for future domain specific PSM research and will be of use to educators in this field in developing their own gamified learning.
The experiment study presents the influence of femtosecond laser shock peening (FsLSP) without a protective layer in the air on the surface hardness and surface mechanical property of NiTi shape memory alloy. Femtosecond laser shock peening is a new possibility of direct laser ablation without any protective layer under atmospheric conditions, which can produce intense shock waves with low pulse energy in the air. The average surface roughness values of the NiTi alloy samples were measured, because the surface roughness may affect its friction resistance. The results showed that the surface roughness of NiTi increased after femtosecond laser shock peening treatment. In comparison with the initial state, the coefficient of friction decreased and surface microhardness increased after femtosecond laser shock peening treatment with different FsLSP parameters. This improvement of wear properties may be attributed to the enhancement of surface microhardness and surface titanium oxide layer induced by the shock wave and laser ablation during FsLSP treatment.
In this study, we use a hybrid mode-locked external cavity diode laser with subsequent amplification and pulse compression. The system provides laser pulses of 440 fs width (assuming a sech² pulse shape) and 160 mW average output power at a repetition rate of 383.1 MHz. The laser oscillator consists of a double quantum well laser diode with a gain segment of 1080 μm length and an absorber element of 80 μm lengths. The chip’s back facet is covered with a high reflective coating, the front facet with an anti-reflective coating. The resonator itself is operated in a collimated geometry and folded by two dielectric mirrors. The used output coupler provides a transmission of 20 percent, which is coupled into a tapered amplifier. Two Faraday isolators are used to decouple the laser and the amplifier from any back reflections. Subsequently, the pulses are compressed using a single pass Martinez type pulse compressor …
An improvement on a concept for all optical mag- netometry using nitrogen vacancies in diamond is presented. The concept is based on the fluorescence attenuation of optically pumped nitrogen vacancies by magnetic fields up to ≈ 50 mT. The attenuation is registered by modulating the pumping power to generate a constant signal at a photodetector. A sensitivity of 2.6μT/√Hz at a sampling frequency of 500 Hz is achieved.
Background: Modern healthcare devices can be connected to computer networks and many western healthcareinstitutions run those devices in networks. At the same time, cyber attacks are on the rise and there is evidence thatcybercriminals do not spare critical infrastructure such as major hospitals, even if they endanger patients. Intuitively,the more and closer connected healthcare devices are to public networks, the higher the risk of getting attacked.
Methods: To asses the current connectivity status of healthcare devices, we surveyed the field of German hospitalsand especially University Medical Center UMCs.
Results: The results show a strong correlation between the networking degree and the number of medical devices.The average number of medical devices is 25.150, with a median of networked medical devices of 3.600. Actual keyusers of networked medical devices are the departments Radiology, Intensive Care, Radio-Oncology RO, NuclearMedicine NUC, and Anaesthesiology in the group of UMCs. In the next five years, the usage of networked medicaldevices will increase significantly in the departments of Surgery, Intensive Care, and Radiology. We detected a strongcorrelation between the degree of connectivity and the likelihood of being attacked.The survey answers regarding the cyber security status reveal a lack of security basics in some of the inquiredhospitals. We did discover successful attacks in hospitals with separated or subsidiary departments. A fusion ofcompetencies on an organizational level facilitates the right behavior here. Most hospitals rated themselvespredominantly positively in the self-assessment but also stated the usefulness of IT security insurance.Conclusions:Concluding our results, hospitals are already facing the consequences of omitted measures within theirgrowing pool of medical devices. Continuously relying on historically grown structures without adaption and trustingmanufactures to solve vectors is a critical behavior that could seriously endanger patients.
In the context of Continuous Software Engineering, it is acknowledged as best practice to develop new features on the mainline rather than on separate feature branches. Unfinished work is then usually prevented from going live by some kind of feature toggle. However, there is no concept of feature toggles for Process-Driven Applications (PDA) so far. PDAs are hybrid systems consisting not only of classical source code but also of a machine-interpretable business process model. This paper elaborates on a feature development approach that covers both the business process model and the accompanying source code artifacts of a PDA. The proposed solution, Toggles for Process-Driven Applications (T4PDA), equipped with an easy to use modeling tool extension, enables the developer to safely commit unfinished work on model and source code to the project’s mainline. It will be kept inactive during productive deployments unless the feature is finally released. During an AB/BA crossover design experiment, the T4PDA approach, including the provided tool support, showed higher software quality, a faster development process, and contented developers.
OOXML and ODF are the de facto standard data formats for word processing, spreadsheets, and presentations. Both are XML-based, feature-rich container formats dating back to the early 2000s. In this work, we present a systematic analysis of the capabilities of malicious office documents. Instead of focusing on implementation bugs, we abuse legitimate features of the OOXML and ODF specifications. We categorize our attacks into five classes: (1) Denial-of-Service attacks affecting the host on which the document is processed. (2) Invasion of privacy attacks that track the usage of the document. (3) Information disclosure attacks exfiltrating personal data out of the victim's computer. (4) Data manipulation on the victim's system. (5) Code execution on the victim's machine. We evaluated the reference implementations – Microsoft Office and LibreOffice – and found both of them to be vulnerable to each tested class of attacks. Finally, we propose mitigation strategies to counter these attacks.
Performing in Community-Academic Health Partnerships: Interplay of Clear, Difficult and Valued Goals
(2020)
OpenPGP and S/MIME are the two major standards for email end-to-end encryption. We show practical attacks against both encryption schemes in the context of email. First, we present a design flaw in the key update mechanism, allowing a third party to deploy a new key to the communication partners. Second, we show how email clients can be tricked into acting as an oracle for decryption or signing by exploiting their functionality to auto-save drafts. Third, we demonstrate how to exfiltrate the private key, based on proprietary mailto parameters implemented by various email clients. An evaluation shows that 8 out of 20 tested email clients are vulnerable to at least one attack. While our attacks do not target the underlying cryptographic primitives, they raise concerns about the practical security of OpenPGP and S/MIME email applications. Finally, we propose countermeasures and discuss their advantages and disadvantages.
Smart wearable devices become more and more prevalent in the age of the Internet of Things. While people wear them as fitness trackers or full-fledged smartphones, they also come in unique versions as smartwatches for children. These watches allow parents to track the location of their children in real-time and offer a communication channel between parent and child.
In this paper, we analyzed six smartwatches for children and the corresponding backend platforms and applications for security and privacy concerns. We structure our analysis in distinct attacker scenarios and collect and describe related literature outside academic publications. Using a cellular network Man-in-the-Middle setup, reverse engineering, and dynamic analysis, we found several severe security issues, allowing for sensitive data disclosure, complete watch takeover, and illegal remote monitoring functionality.