Refine
Year of publication
- 2019 (19) (remove)
Document Type
- Conference Proceeding (19) (remove)
Has Fulltext
- yes (19)
Is part of the Bibliography
- no (19)
Keywords
- Contract Analysis (2)
- Microservices (2)
- Mikroservice (2)
- API (1)
- Absolvent (1)
- Anonymization (1)
- Application Programming Interface (1)
- Arbeitswelt (1)
- Arbeitszufriedenheit (1)
- Asymmetric encryption (1)
- Autobewerter (1)
- Automation (1)
- Automatisierte Bewertung (1)
- Benutzererlebnis (1)
- Benutzeroberfläche (1)
- Beruf (1)
- Bewertungsschema (1)
- Big Data (1)
- Big Data Analytics (1)
- Bildmaterial (1)
- Biogas (1)
- Case Management (1)
- Cloud Computing (1)
- Computerlinguistik (1)
- Computersicherheit (1)
- Computersimulation (1)
- Computerunterstütztes Lernen (1)
- Concreteness (1)
- Consistency (1)
- Cyber-Security (1)
- Data Management (1)
- Digitalisierung (1)
- Distributional Semantics (1)
- E-Learning (1)
- EAssessment (1)
- EEG (1)
- EPN (1)
- Education (1)
- Erneuerbare Energien (1)
- Erneuerbare-Energien-Gesetz (2000) (1)
- Event Processing Network (1)
- Event Processing Network Model (1)
- Fassung (1)
- Feldgeräte (1)
- Focus Group (1)
- German (1)
- Geschlechtsunterschied (1)
- Grader (1)
- Gruppeninterview (1)
- Hadoop (1)
- Hochschule (1)
- Imagery (1)
- Images (1)
- Information Retrieval (1)
- Information Visualization (1)
- Informationstechnik (1)
- Insurance Industry (1)
- Konkretum <Linguistik> (1)
- Krankenhaus (1)
- Latent Semantic Analysis (1)
- Lemmatization (1)
- Lexical Semantics (1)
- MapReduce (1)
- Markov Models (1)
- Network Security (1)
- OT-Security (1)
- Open Repositories (1)
- OpenStack (1)
- PDF <Dateiformat> (1)
- POS Tagging (1)
- PageRank (1)
- Paraphrase (1)
- Paraphrase Similarity (1)
- Personennahverkehr (1)
- Pregel (1)
- Privacy by Design (1)
- ProFormA (1)
- Programmieraufgaben (1)
- Programmierung (1)
- Pseudonymization (1)
- REST <Informatik> (1)
- RESTful (1)
- Rechnernetz (1)
- Regelenergie (1)
- Repository <Informatik> (1)
- Representational State Transfer (1)
- Reserveleistung (1)
- Richardson Maturity Model (1)
- RuleCore (1)
- Schwarmintelligenz (1)
- Shortest Path (1)
- Similarity Measures (1)
- Simulation (1)
- Softwaretest (1)
- Steuerungssystem (1)
- Structural Analysis (1)
- Swarm Intelligence (1)
- Systemdienstleistungen (1)
- Text Similarity (1)
- Title Matching (1)
- Urban Logistics (1)
- User Interfaces (1)
- Vergleich (1)
- Versicherungsvertrag (1)
- Versicherungswirtschaft (1)
- Vertrag (1)
- Vertragsklausel (1)
- Visualisierung (1)
- Visualization (1)
- Word Counting (1)
- XML (1)
- gender (1)
- graduate (1)
- information system (1)
- professional life (1)
- survey (1)
- work satisfaction (1)
- work-life balance (1)
- working life (1)
- Ähnlichkeit (1)
- Übung <Hochschule> (1)
The Gravitational Search Algorithm is a swarm-based optimization metaheuristic that has been successfully applied to many problems. However, to date little analytical work has been done on this topic.
This paper performs a mathematical analysis of the formulae underlying the Gravitational Search Algorithm. From this analysis, it derives key properties of the algorithm's expected behavior and recommendations for parameter selection. It then confirms through empirical examination that these recommendations are sound.
Lemmatization is a central task in many NLP applications. Despite this importance, the number of (freely) available and easy to use tools for German is very limited. To fill this gap, we developed a simple lemmatizer that can be trained on any lemmatized corpus. For a full form word the tagger tries to find the sequence of morphemes that is most likely to generate that word. From this sequence of tags we can easily derive the stem, the lemma and the part of speech (PoS) of the word. We show (i) that the quality of this approach is comparable to state of the art methods and (ii) that we can improve the results of Part-of-Speech (PoS) tagging when we include the morphological analysis of each word.
Intrusion detection systems and other network security components detect security-relevant events based on policies consisting of rules. If an event turns out as a false alarm, the corresponding policy has to be adjusted in order to reduce the number of false positives. Modified policies, however, need to be tested before going into productive use. We present a visual analysis tool for the evaluation of security events and related policies which integrates data from different sources using the IF-MAP specification and provides a “what-if” simulation for testing modified policies on past network dynamics. In this paper, we will describe the design and outcome of a user study that will help us to evaluate our visual analysis tool.
The usage of microservices promises a lot of benefits concerning scalability and maintainability, rewriting large monoliths is however not always possible. Especially in scientific projects, pure microservice architectures are therefore not feasible in every project. We propose the utilization of microservice principles for the construction of microsimulations for urban transport. We present a prototypical architecture for the connection of MATSim and AnyLogic, two widely used simulation tools in the context of urban transport simulation. The proposed system combines the two tools into a singular tool supporting civil engineers in decision making on innovative urban transport concepts.
Automatisierte Steuerung von virtuellen Biogas-Kraftwerksverbünden für den netzorientierten Betrieb
(2019)
Das Steuerungssystem VKV Netz ermöglicht den auf die Erbringung regionaler Systemdienstleistungen ausgerichteten Betrieb virtueller Biogas-Kraftwerksverbünde. Damit leistet es sowohl einen Beitrag zum zukünftig gesteigerten Bedarf an Regelenergie durch regenerative Kraftwerke als es auch alternative, zukunftsfähige Erlöspotenziale für die zumeist landwirtschaftlichen bzw. landwirtschaftsnahen Biogas-Anlagenbetreiber abseits des EEG aufzeigt. Das Steuerungssystem wurde im Rahmen des BMWi-Verbundforschungsvorhabens VKV Netz (Förderkennzeichen 0325943A) durch die Hochschule Hannover, die SLT-Technologies GmbH & Co. KG sowie die Überlandwerk Leinetal GmbH in Kooperation mit assoziierten Biogasanlagen im Zeitraum 01.01.2016 bis 31.12.2018 entwickelt und pilotiert.
Dieser Beitrag adressiert einleitend die aktuelle Bedrohungslage aus Sicht der Industrie mit einem Fokus auf das Feld und die Feldgeräte. Zentral wird dann die Frage behandelt, welchen Beitrag Feldgeräte im Kontext von hoch vernetzten Produktionsanlagen für die künftige IT-Sicherheit leisten können und müssen. Unter anderem werden auf Basis der bestehenden Standards wie IEC 62443-4-1, IEC 62443-4-2 oder der VDI 2182-1 und VDI 2182-4 ausgewählte Methoden und Maßnahmen am Beispiel eines Durchflussmessgerätes vorgestellt, die zur künftigen Absicherung von Feldgeräten notwendig sind.
In microservice architectures, data is often hold redundantly to create an overall resilient system. Although the synchronization of this data proposes a significant challenge, not much research has been done on this topic yet. This paper shows four general approaches for assuring consistency among services and demonstrates how to identify the best solution for a given architecture. For this, a microservice architecture, which implements the functionality of a mainframe-based legacy system from the insurance industry, serves as an example.
For the analysis of contract texts, validated model texts, such as model clauses, can be used to identify used contract clauses. This paper investigates how the similarity between titles of model clauses and headings extracted from contracts can be computed, and which similarity measure is most suitable for this. For the calculation of the similarities between title pairs we tested various variants of string similarity and token based similarity. We also compare two additional semantic similarity measures based on word embeddings using pre-trained embeddings and word embeddings trained on contract texts. The identification of the model clause title can be used as a starting point for the mapping of clauses found in contracts to verified clauses.
Automatisiert bewertbare Programmieraufgaben definieren Tests, die auf Einreichungen angewendet werden. Da Testergebnisse nicht mit Bewertungsergebnissen gleichzusetzen sind, schlagen wir ein Beschreibungsformat vor, das Testergebnisse auf Bewertungsergebnisse abbildet. Lehrkräfte können die Abbildungsvorschrift an ihren Lehrkontext anpassen. Der Vorschlag ist unabhängig von den beteiligten Autobewertern, von den eingesetzten Benutzungsschnittstellen und von der zu lernenden Programmiersprache einsetzbar. Das Format basiert auf verschachtelten Bewertungskategorien, welche um ein Nullifikationen-Konzept ergänzt werden.
Our work is motivated primarily by the lack of standardization in the area of Event Processing Network (EPN) models. We identify general requirements for such models. These requirements encompass the possibility to describe events in the real world, to establish temporal and causal relationships among the events, to aggregate the events, to organize the events into a hierarchy, to categorize the events into simple or complex, to create an EPN model in an easy and simple way and to use that model ad hoc. As the major contribution, this paper applies the identified requirements to the RuleCore model.