Auflistung P307 - INFORMATIK 2020 - Back to the Future nach Titel
1 - 10 von 128
Treffer pro Seite
Sortieroptionen
- Textdokument1. Workshop Künstliche Intelligenz in der Umweltinformatik(INFORMATIK 2020, 2021) Abecker, Andreas; Bruns, Julian; Naumann, StefanIn den letzten Jahrzehnten hat die Umweltforschung begonnen, eine datengesteuerte Perspektive einzunehmen, die durch riesige Sensornetze, satellitengestützte Erdbeobachtung und einen fast allgegenwärtigen Internetzugang ermöglicht wird. Von einigen dieser datengestützten Ansätze wird erwartet, dass sie Visionen einer nachhaltigen Zukunft umsetzen können. Zum Beispiel, indem sie es ermöglichen, in nachhaltigen intelligenten Städten zu leben oder die Welt mit „Smarter Landwirtschaft“ zu ernähren. Oder indem man die Umweltverschmutzung oder die globale Entwaldung mit besserer Erdbeobachtung bekämpft. Es besteht jedoch eine Kluft zwischen einigen der derzeitigen Erwartungen, die in datengesteuerte Techniken gesetzt werden, und der Reife im Bereich des (räumlichen) Maschinellen Lernens und der Künstlichen Intelligenz. Im Workshop werden offene Forschungsfragen adressiert und Anwendungsbeispiele aus den Schnittfeldern von KI und Umweltanwendungen diskutiert.
- Textdokument1st Workshop on Evaluating Intelligent and Ubiquitous Mobility Systems(INFORMATIK 2020, 2021) Titov, Waldemar; Trefzger, Mathias; Schlegel, ThomasEvaluation of peoples' mobility and intermodal transport is crucial for understanding mobility and traffic in general and leads to new challenges from the perspective of computer science and especially Human-Computer Interaction.
- TextdokumentThe 5th GI/ACM Workshop 2020 Scope and Draft Programme on Standardization of Secure and Safe Smart Manufacturing Systems with respect to IEC 62443 IACS(INFORMATIK 2020, 2021) deMeer, Jan; Waedt, Karl; Rennoch, Axel; Hof, Hans-JoachimThe 5th GI/ACM Workshop Programme on Standardization of Secure and Safe Production within Industrial Automation and Control Systems (IACS) took place virtually at September 28, 2020 at the Karlsruhe Institute of Technology (KIT) that hosted the 50th GI's yearly assembly (GI Informatik 2020 Jahrestagung): https://informatik2020.de/programm/workshops/
- Textdokument8. Workshop Umweltinformatik zwischen Nachhaltigkeit und Wandel (UINW 2020)(INFORMATIK 2020, 2021) Naumann, Stefan; Voigt, Kristina; Kern, Eva; Wohlgemuth, Volker; Behrens, GritDer Workshop „Umwelinformatik zwischen Nachhaltigkeit und Wandel“ schlägt auch in seinem bereits achten Durchlauf die Brücke zwischen Informatik, Umwelt-und Nachhaltigkeitswissenschaften und präsentiert interdisziplinäre wissenschaftliche Lösungen aus der Schnittstelle zwischen Digitalisierung und Nachhaltiger Entwicklung.
- TextdokumentAgilität im Geschäftsprozessmanagement(INFORMATIK 2020, 2021) Ziehmann, Janek; Lantow, BirgerWollen sich Unternehmen im Zuge der Digitalisierung der damit verbundenen Dynamik stellen, reicht es nicht, agile Ansätze nur in der IT-Entwicklung anzuwenden. Auch das Management der Geschäftsprozesse sollte der Dynamik Rechnung tagen. Diese Arbeit untersucht auf Basis einer systematischen Literaturanalyse, welche Ansätze zur Umsetzung von Agilität im Geschäftsprozessmanagement vorgeschlagen werden. Der aktuelle Stand der Wissenschaft auf diesem Gebiet wird systematisiert und zukünftig notwendige Entwicklungen werden abgeleitet.
- TextdokumentAligning with cybersecurity framework by modelling OT security(INFORMATIK 2020, 2021) Parekh, Mithil; Waedt, Karl; Tellabi, AsmaaBefore the last decade, production units and its related systems were considered nearly as island systems and were managed as an air-gaped in their daily operations. Information and network security was not an issue because their plant's safety and continues operations have the highest priority. In the recent years, many initiatives like smart factories, adopting Industry 4.0, complex mesh of connected devices and data privacy have shifted paradigm of value chain and trust model in the production environment. By this means, state-of-the-art manufacturing environment demands for the comprehensive framework and holistic approach to address cybersecurity that affects reliability of plant operations. Therefore, few standards are gradually evolving and are extended in to this field. The ISA/IEC 62443 is one of the standard series addresses the Security of Industrial Automation and Control Systems (IACS) throughout their lifecycle. On the other hand, NIST Special Publication 800–82 is a Guide to Industrial Control Systems Security and follows NIST CSF to address OT security. As with Operational Technology (OT) requirements in general, also considering to security-related requirements as per ISA/IEC 62443, ask for more effort to deal with it later. Accordingly, bearing in mind, the need for security from the beginning of the system engineering processes reduces the overall effort and complexity during the lifecycle of OT systems. The corresponding paradigm is called Security by Design. This paper proposes on how high level foundational security requirements from ISA/IEC 62443 can be modelled using AutomationML (AML) tool and consequently explains on how easy is to integrate seamlessly that model during the design phase of engineering process.
- TextdokumentAnalyse von Heizungs- und Lüftungsverhalten mit Data Mining Methoden(INFORMATIK 2020, 2021) Westhäusser, Lutz; Nickel, David; Behrens, Grit; Schlender, KlausIn dem hier beschriebenen Projekt wird interdisziplinär mit Psychologen zusammen gearbeitet. Ziel der Arbeit ist es, Modelle zu entwickeln, um das Umweltverhalten von Hausbewohnern positiv zu beeinflussen und zu verstetigen. In der hier beschriebenen Arbeit werden die ersten Daten aus dem ‚Reallabor' Sennestadt genutzt, die in den Wohnungen von freiwilligen Studienteilnehmern zu ihrem Heizungs-und Lüftungsverhalten erhoben werden. Mittels Machine Learning Technologien werden diese Daten analysiert.
- TextdokumentAnalysis and Comparison of the Gaze Behavior of E-Scooter Drivers and Cyclists(INFORMATIK 2020, 2021) Trefzger, Mathias; Titov, Waldemar; Schlegel, ThomasIn this paper, we contribute an eye tracking study to evaluate the gaze behavior of e-scooter drivers and cyclists on high and low quality road surfaces. We recorded the surface quality with sensors and put the different surfaces in relation to the gaze behavior. We recorded eye movements of the participants and performed an Area of Interest (AOI) sequence analysis to identify gaze patterns. Found sequences show that on the high quality surface participants focused most commonly the distant road section and then shifted to nearer sections. Individual advantageous gaze sequences are omitted if the surface is poor. We found a significant difference in the attention distribution of the two means of transport. In addition, we can confirm previous results showing that low quality road surfaces cause the gaze to shift forward. However, the participants did not adapt their speed to the worse surface.
- TextdokumentApplication Fields and Research Gaps of Process Mining in Manufacturing Companies(INFORMATIK 2020, 2021) Dreher, Simon; Reimann, Peter; Gröger, ChristophTo survive in global competition with increasing cost pressure, manufacturing companies must continuously optimize their manufacturing-related processes. Thereby, process mining constitutes an important data-driven approach to gain a profound understanding of the actual processes and to identify optimization potentials by applying data mining and machine learning techniques on event data. However, there is little knowledge about the feasibility and usefulness of process mining specifically in manufacturing companies. Hence, this paper provides an overview of potential applications of process mining for the analysis of manufacturing-related processes. We conduct a systematic literature review, classify relevant articles according to the Supply-Chain-Operations-Reference-Model (SCOR-model), identify research gaps, such as domain-specific challenges regarding unstructured, cascaded and non-linear processes or heterogeneous data sources, and give practitioners inspiration which manufacturing-related processes can be analyzed by process mining techniques.
- TextdokumentApplication Layer Security for the IoT(INFORMATIK 2020, 2021) Buschsieweke, Marian; Güneş, MesutSecurity for the mostly constrained devices forming the IoT is an active field of research. In this paper, we propose two CoAP Options, HMAC1/HMAC2 and Crypt1/Crypt2 complementing our previous work on Lightweight Capability Based Access Control (LCap). This results in a lightweight, flexible, and complete solution for application layer security for CoAP nodes with severely limited memory. In our evaluation, we show that a pure software implementation without cryptographic hardware acceleration is feasible for practical use on highly constrained IoT devices. Due to mostly idiomatic use of cryptography, existing security analyses apply to our proposal. Our security framework was designed with ample focus on reducing the complexity of the system, which allows lean implementations and simplifies security reviews. This makes LCap based security a good fit for security in the IoT.