Refine
Document Type
- Conference Proceeding (17)
- Part of a Book (5)
- Book (3)
- Report (3)
- Contribution to a Periodical (2)
- Article (1)
- doctorallecture (1)
- Doctoral Thesis (1)
Is part of the Bibliography
- no (33)
Keywords
- Abschlussbericht (1)
- Big Data (1)
- CPS (3)
- Cloud (1)
- Complex Event Processing (1)
- Cyber Security (1)
- Daten- und Kommunikationskonzept (1)
- Dienstleistungsplattform (1)
- Digital transformation (2)
- Digitale Transformation (2)
Institute
It is crucial today that economies harness renewable energies and integrate them into the existing grid. Conventionally, energy has been generated based on forecasts of peak and low demands. Renewable energy can neither be produced on demand nor stored efficiently. Thus, the aim of this paper is to evaluate Deep Learning-based forecasts of energy consumption to align energy consumption with renewable energy production. Using a dataset from a use-case related to landfill leachate management, multiple prediction models were used to forecast energy demand.The results were validated based on the same dataset from the recycling industry. Shallow models showed the lowest Mean Absolute Percentage Error (MAPE), significantly outperforming a persistence baseline for both, long-term (30 days), mid-term (7 days) and short-term (1 day) forecasts. A potential decrease of up to 23% in peak energy demand was found that could lead to a reduction of 3,091 kg in CO2-emissions per year. Our approach requires low finanacial investments for energy-management hardware, making it suitable for usage in Small and Medium sized Enterprises (SMEs).
The number of cyber-attacks on small and medium enterprises (SMEs) is constantly increasing. SMEs do not recognize the attacks until the damage has occurred. Only then, they fight with measures to increase IT-security and IT-safety. Many studies come to the point that this refers to a lack of budget, expertise and awareness of the need for IT-security. There are many compendia with recommendations for action, but they are too comprehensive and unspecific to the individual needs of SMEs. In this paper, we present the results of a research activity on the gaps that address the challenges faced by SMEs. In addition, we develop a concept for a serious gaming approach that includes an economic perspective on IT-security measures and shows how SMEs can derive their own IT-seurity target state
Die Herausforderungen der Zukunft werden geprägt durch digital veredelte Produkte von höchster Qualität und hoher Variantenvielfalt bei gleichzeitig kleiner werdenden Losgrößen. Konventionelle Entwicklungsmethoden stoßen aufgrund zunehmender Komplexität und kürzer werdender Lebenszyklen auf Produktebene an ihre Grenzen. Dadurch werden bei kundenindividueller Produktion die Aufwände in der Arbeitsplanung und -vorbereitung überproportional größer. Eine mögliche Lösung stellt die generative Erstellung der Produktionsstückliste während der Montage dar. Durch das eventbasierte „Mitschreiben der Montage“ werden administrative und planungsintensive Prozesse in der Arbeitsvorbereitung überproportional reduziert und die Erstellung der Stückliste in die manuelle Montage transferiert.