Refine
Year of publication
- 2018 (197) (remove)
Document Type
- Conference Proceeding (88)
- Article (47)
- Part of a Book (16)
- Report (11)
- Book (8)
- Doctoral Thesis (8)
- Other Publications (8)
- Working Paper (5)
- Journal (Complete Issue of a Journal) (4)
- Patent (2)
Keywords
- 3D Skelett Wickeltechnik (1)
- Actuators (1)
- Agenda 2030 (1)
- Aktuatorik (1)
- Anisotropic hyperelasticity (1)
- Anstand (3)
- Antenna arrays (1)
- Application Integration (1)
- Architektur (1)
- Auffangnorm UWG (1)
- Aufsatzsammlung (1)
- Autofähre (1)
- Automatisierung (1)
- Automotive Industry (1)
- BHKW (1)
- Baden-Württemberg (1)
- Basic prices (1)
- Baukonstruktionen (1)
- Baukultur (1)
- Baukunst (1)
- Baustatik (1)
- Bernstein Basis (1)
- Bernstein polynomial (2)
- Binnenflotte (1)
- Bio-vital data (1)
- Buenos Aires (1)
- Bundeskongress Compliance Management (1)
- Business Excellence (1)
- Business english (1)
- CSR (3)
- CSR-Rahmenwerke (1)
- CSR-Standards (1)
- Cauchon algorithm (3)
- Cauchon diagram (1)
- Cauchon matrix (1)
- Checkerboard ordering (1)
- Checkerboard partial ordering (1)
- Classification (1)
- Cloud (1)
- Collaboration (1)
- Complex interval (2)
- Complex polynomial (2)
- Complex problems (1)
- Compliance (4)
- Compliance-Management (1)
- Control Theory (1)
- Corporate Responsibility (1)
- Crowd Sourcing (1)
- Cutting patterning (1)
- Cyclic sign variation (1)
- DEX (2)
- Decision Framework (1)
- Deep learning (1)
- Design research (1)
- Deutsch als Fremdsprache (1)
- Deutscher Ethik Index (2)
- Devising (1)
- Differentialschutz (1)
- Digitalization (1)
- Discourse analysis (1)
- District heating (1)
- Drama in education (2)
- Drying (1)
- E-mobility (1)
- Eddy currents (1)
- Efficiency (1)
- Electromagnetic actuators (1)
- Enclosure of the range (1)
- Energietechnologien (1)
- Energy transition (1)
- Engineering research (1)
- Entwerfen (1)
- Errors (1)
- Espanded austenite, Magnetic force microscopy, Low temperature carburisation, Ferrofluid (1)
- Essay (1)
- FSR sensor (1)
- Fake news (1)
- Feedback (1)
- Festschrift (1)
- Form finding (1)
- Formgedächtnislegierung (1)
- Fotografie, Kunst, Design (1)
- Freistellungssemesterbericht (10)
- Generalklausel UWG (1)
- Geowissenschaft (1)
- Gravity equation (1)
- Healthcare (1)
- Heart rate (1)
- Hurwitz matrix (2)
- IT Architecture (1)
- IT Integration (1)
- IT Integration Drawbacks (1)
- Image (1)
- Imaging (1)
- Ingenieurbau (1)
- Innovation (2)
- Input–Output (1)
- Integrated circuit modeling (1)
- Integrated tasks (1)
- Integration (1)
- Integriertes Management (1)
- Integrity (1)
- Integrity Management (1)
- Integrität (1)
- Integrität in Unternehmen (1)
- Intercultural communication (1)
- Intercultural competence (1)
- Intercultural interaction competence (1)
- Interval matrix (1)
- Interval property (1)
- Itemanalyse (1)
- Kanäle (1)
- Kaufentscheidung (1)
- Klimawandel (2)
- Konstanzer Lange Nacht der Wissenschaft (1)
- Konstruktivismus (1)
- Kornwachs, Klaus (1)
- LSP assessment (1)
- Language assessment (1)
- Lastpfadgerecht (1)
- Lattices (1)
- Learning to cluster (1)
- Lebensmitteleinzelhandel (1)
- Leichtbau (1)
- Linear independence (1)
- Lock-in-mechanism (1)
- MEMS microphones (1)
- MIMO (1)
- MVDR beamforming (1)
- Marketingrecht (1)
- Material and Substance Management (1)
- Matrix interval (2)
- Menschenverachtende Werbung (1)
- Microstructural modelling (1)
- Mobility Solutions (1)
- Movement detection (2)
- Multichannel Wiener filter (1)
- Multinomial logistic regression (1)
- Multivariable MPC algorithm (1)
- Multivariable control systems (1)
- Multivariate complex polynomial (1)
- Nachhaltigkeit (2)
- Nachwachsende Ressourcen (1)
- Niedrigwasser (2)
- Niedrigwassermanagement (1)
- Noise measurement (1)
- Non-invasive sleep study (2)
- Non-tariff barriers (1)
- Nonlinear observers (1)
- Numerical Optimization (1)
- Observers (1)
- Optical fibre fabrication (1)
- Optimisation (1)
- Optimization (1)
- PLM (2)
- Parameter identification (1)
- Passagierfähre (1)
- Path Dependency (1)
- Path-dependency (1)
- Pattern recognition (1)
- Perceptual grouping (1)
- Performance assessment (1)
- Performatives Lehren und Lernen (1)
- Personnel training (1)
- Photovoltaik (1)
- Physical activity (1)
- Plagiat (1)
- Population ageing (1)
- Post-truth (1)
- Predictive control (1)
- Pressure sensor (1)
- Probabilistic Data Association (1)
- Quality retention (1)
- Quasi-stable polynomial (2)
- R-function (1)
- Random Matrices (1)
- Range enclosure (1)
- Rank (2)
- Raumsemantik (1)
- Recurrent neural network (1)
- Renewable Energies (1)
- Respiration Rate (1)
- Respiration rate (1)
- SDGs (1)
- Sapir-Whorf-Hypothese (1)
- Schlafanalyse (1)
- Screening (1)
- Security requirements (1)
- Seehafenhinterlandverkehr (1)
- Self-sensing (1)
- Sensor Bed (1)
- Sevilla (1)
- Sexistische Werbung (1)
- Shadow IT (2)
- ShadowIT (1)
- Sign variation (1)
- Sign-regular matrix (1)
- Signal detection (1)
- Signal processing (1)
- Singular perturbations (1)
- Skaleneffekte (2)
- Sleep (1)
- Sleep Stages (1)
- Sleep positions (2)
- Sleep stage classification (1)
- Sleep stages (1)
- Sleep study (7)
- Sleep tracking (1)
- Smart Home (1)
- Smart bed (2)
- Smart cushion (2)
- Smart-care (2)
- Solenoids (1)
- Spatial modulation (1)
- Speaker clustering (1)
- Speaker recognition (1)
- Speech & image clustering (1)
- Speech signal processing (1)
- Stability analysis (2)
- Stable polynomial (2)
- Stadtplanung (1)
- Stahl- und Spannbetonbau (1)
- Stakeholder interests (1)
- Stiftung – CLUB OF HAMBURG (1)
- Stil (1)
- Stilistik (1)
- Stress (1)
- Strommessung (1)
- Stromwandlersättigung (1)
- Städtebau (1)
- Supply and Use tables (1)
- Sustainability (3)
- Sustainable Development (1)
- Sustainable Mobility (1)
- Target Tracking (1)
- Task-based language assessment (1)
- Technikphilosophie (1)
- Totally nonnegative matrix (3)
- Totally positive matrix (1)
- Tourism (2)
- Tourism sciences (1)
- Tourismus (1)
- Tourismuswissenschaft (1)
- Trade protection (1)
- Transfermanagement (1)
- Ulrich Finsterwalder (1)
- Unternehmensethik (5)
- Unternehmenskultur (1)
- Urbane Versorgung (1)
- VW-Abgasskandal (1)
- Valuation matrices (1)
- Valves (1)
- Verbraucherverhalten (1)
- Verhaltenskodex (1)
- Verkehrsleistung (1)
- Virtual reality (1)
- Wandlersättigung (1)
- Warenkennzeichnung (1)
- Wassernutzung (1)
- Wasserwege (1)
- Werbeselbstkontrolle (1)
- Wind noise reduction (1)
- Windkraft (1)
- Wirtschaftlichkeit (1)
- Wissenschaftliches Schreiben (1)
- Wissenschaftssprache (1)
- Woven fabric membranes (1)
- Ökonomie (1)
Institute
- Fakultät Architektur und Gestaltung (6)
- Fakultät Bauingenieurwesen (6)
- Fakultät Elektrotechnik und Informationstechnik (1)
- Fakultät Informatik (19)
- Fakultät Maschinenbau (9)
- Fakultät Wirtschafts-, Kultur- und Rechtswissenschaften (8)
- Institut für Angewandte Forschung - IAF (7)
- Institut für Optische Systeme - IOS (13)
- Institut für Strategische Innovation und Technologiemanagement - IST (11)
- Institut für Systemdynamik - ISD (15)
The article opens with brief examples of the varied contexts in which professionals with expert knowledge of intercultural communication are commissioned
by organisations to help improve organisational and individual performance.
The development needs that are evident in these contexts entail a broader repertoire of competencies than those generally reflected in the term intercultural communication skills, and so the next section elaborates on the concept of intercultural interaction competence (ICIC), reporting on the numerous sub-competencies which go to make up the ability to perform joint and purposeful activity effectively and appropriately across cultures.
The third section reports on approaches to developing the ICIC of members of organisations, discussing desirable framework conditions for the development
intervention, its possible goals, the nature of the cognitive, affective and behavioural development outcomes which can be achieved, and the content, methods and tools available to the intercultural developer.
The article finishes with a brief consideration of the qualification profile of interculturalists engaged in this kind of work, pointing out that a multi-disciplinary background will enable interculturalists to meet a broad range of organisational and human resource development needs in the area of intercultural communication which go beyond the ‘mere’ development of communicative foreign-language skills.
Although the Hospice Foundation in Constance knew they had a personnel
problem, they were unsure how to begin to fix it. In addition to difficulties in
finding and keeping employees, the Hospice Foundation’s employees were
often on sick leave, adding pressure on remaining staff. Twelve communication
design students in the masters program at the University of Applied
Sciences in Constance (HTWG Konstanz) conducted a study aimed at
identifying the causes for these problems and, more generally, understanding
how the employees work and feel. Even though the methods in this
study are well known, it presents an important prototype for designers and
design researchers because of its success in finding useful insights. It also
serves as a pre-design project briefing for both management and designers.
It demonstrates the usefulness of qualitative methods in providing a deeper
understanding of a complex situation and its usefulness as a strategic tool
and for defining a project’s focus and scope. Ideally, it also provides insights
into health care for the elderly.
Ingenieure auf die Bühne
(2018)
This paper describes an early lumping approach for generating a mathematical model of the heating process of a moving dual-layer substrate. The heat is supplied by convection and nonlinearly distributed over the whole considered spatial extend of the substrate. Using CFD simulations as a reference, two different modelling approaches have been investigated in order to achieve the most suitable model type. It is shown that due to the possibility of using the transition matrix for time discretization, an equivalent circuit model achieves superior results when compared to the Crank-Nicolson method. In order to maintain a constant sampling time for the in-visioned-control strategies, the effect of variable speed is transformed into a system description, where the state vector has constant length but a variable number of non-zero entries. The handling of the variable transport speed during the heating process is considered as the main contribution of this work. The result is a model, suitable for being used in future control strategies.
This paper focuses on the multivariable control of a drawing tower process. The nature of the process together with the differences in measurement noise levels that affect the variables to be controlled motivated the development of a new MPC algorithm. An extension of a multivariable predictive control algorithm with separated prediction horizons is proposed. The obtained experimental results show the usefulness of the proposed algorithm..
Comparison and Identifiability Analysis of Friction Models for the Dither Motion of a Solenoid
(2018)
In this paper, the mechanical subsystem of a proportional solenoid excited by a dither signal is considered. The objective is to find a suitable friction model that reflects the characteristic mechanical properties of the dynamic system. Several different friction models from the literature are compared. The friction models are evaluated with respect to their accuracy as well as their practical identifiability, the latter being quantified based on the Fisher information matrix.
A constructive nonlinear observer design for self-sensing of digital (ON/OFF) single coil electromagnetic actuators is studied. Self-sensing in this context means that solely the available energizing signals, i.e., coil current and driving voltage are used to estimate the position and velocity trajectories of the moving plunger. A nonlinear sliding mode observer is considered, where the stability of the reduced error dynamics is analyzed by the equivalent control method. No simplifications are made regarding magnetic saturation and eddy currents in the underlying dynamical model. The observer gains are constructed by taking into account some generic properties of the systems nonlinearities. Two possible choices of the observer gains are discussed. Furthermore, an observer-based tracking control scheme to achieve sensorless soft landing is considered and its closed-loop stability is studied. Experimental results for observer-based soft landing of a fast-switching solenoid valve under dry conditions are presented to demonstrate the usefulness of the approach.
A constructive method for the design of nonlinear observers is discussed. To formulate conditions for the construction of the observer gains, stability results for nonlinear singularly perturbed systems are utilised. The nonlinear observer is designed directly in the given coordinates, where the error dynamics between the plant and the observer becomes singularly perturbed by a high-gain part of the observer injection, and the information of the slow manifold is exploited to construct the observer gains of the reduced-order dynamics. This is in contrast to typical high-gain observer approaches, where the observer gains are chosen such that the nonlinearities are dominated by a linear system. It will be demonstrated that the considered approach is particularly suited for self-sensing electromechanical systems. Two variants of the proposed observer design are illustrated for a nonlinear electromagnetic actuator, where the mechanical quantities, i.e. the position and the velocity, are not measured
Research on Shadow IT is facing a conceptual dilemma in cases where previously “covert” systems developed by business entities are integrated in the organizational IT management. These systems become visible, are thus not “in the shadows” anymore, and subsequently do not fit to existing definitions of Shadow IT. Practice shows that some information systems share characteristics of Shadow IT but are created openly in alignment with the IT organization. This paper proposes the term “Business-managed IT” to describe “overt” information systems developed or managed by business entities and distinguishes it from Shadow IT by illustrating case vignettes. Accordingly, our contribution is to suggest a concept and its delineation against other concepts. In this way, IS researchers interested in IT originated from or maintained by business entities can construct theories with a wider scope of application that are at the same time more specific to practical problems. In addition, the terminology allows to value potentially innovative developments by business entities more adequately.
Research on Shadow IT is facing a conceptual dilemma in cases where previously "covert" systems developed by business entities (individual users, business workgroups, or business units) are integrated in the organizational IT management. These systems become visible, are therefore not "in the shadows" anymore, and subsequently do not fit to existing definitions of Shadow IT. Practice shows that some information systems share characteristics of Shadow IT, but are created openly in alignment with the IT department. This paper therefore proposes the term "Business-managed IT" to describe "overt" information systems developed or managed by business entities. We distinguish Business-managed IT from Shadow IT by illustrating case vignettes. Accordingly, our contribution is to suggest a concept and its delineation against other concepts. In this way, IS researchers interested in IT originated from or maintained by business entities can construct theories with a wider scope of application that are at the same time more specific to practical problems. In addition, value-laden terminology is complemented by a vocabulary that values potentially innovative developments by business entities more adequately. From a practical point of view, the distinction can be used to discuss the distribution of task responsibilities for information systems.
We investigated 50 randomly selected buffer overflow vulnerabilities in Firefox. The source code of these vulnerabilities and the corresponding patches were manually reviewed and patterns were identified. Our main contribution are taxonomies of errors, sinks and fixes seen from a developer's point of view. The results are compared to the CWE taxonomy with an emphasis on vulnerability details. Additionally, some ideas are presented on how the taxonomy could be used to improve the software security education.
To get a better understanding of Cross Site Scripting vulnerabilities, we investigated 50 randomly selected CVE reports which are related to open source projects. The vulnerable and patched source code was manually reviewed to find out what kind of source code patterns were used. Source code pattern categories were found for sources, concatenations, sinks, html context and fixes. Our resulting categories are compared to categories from CWE. A source code sample which might have led developers to believe that the data was already sanitized is described in detail. For the different html context categories, the necessary Cross Site Scripting prevention mechanisms are described.
We identify 74 generic, reusable technical requirements based on the GDPR that can be applied to software products which process personal data. The requirements can be traced to corresponding articles and recitals of the GDPR and fulfill the key principles of lawfulness and transparency. Therefore, we present an approach to requirements engineering with regard to developing legally compliant software that satisfies the principles of privacy by design, privacy by default as well as security by design.
Simulationsmethoden bei der Entwicklung von Extremleichtbaukomponenten in Faserverbundbauweise
(2018)
Objective: This paper presents an algorithm for non-invasive sleep stage identification using respiratory, heart rate and movement signals. The algorithm is part of a system suitable for long-term monitoring in a home environment, which should support experts analysing sleep. Approach: As there is a strong correlation between bio-vital signals and sleep stages, multinomial logistic regression was chosen for categorical distribution of sleep stages. Several derived parameters of three signals (respiratory, heart rate and movement) are input for the proposed method. Sleep recordings of five subjects were used for the training of a machine learning model and 30 overnight recordings collected from 30 individuals with about 27 000 epochs of 30 s intervals each were evaluated. Main results: The achieved rate of accuracy is 72% for Wake, NREM, REM (with Cohen's kappa value 0.67) and 58% for Wake, Light (N1 and N2), Deep (N3) and REM stages (Cohen's kappa is 0.50). Our approach has confirmed the potential of this method and disclosed several ways for its improvement. Significance: The results indicate that respiratory, heart rate and movement signals can be used for sleep studies with a reasonable level of accuracy. These inputs can be obtained in a non-invasive way applying it in a home environment. The proposed system introduces a convenient approach for a long-term monitoring system which could support sleep laboratories. The algorithm which was developed allows for an easy adjustment of input parameters that depend on available signals and for this reason could also be used with various hardware systems.
Autonomous moving systems require very detailed information about their environment and potential colliding objects. Thus, the systems are equipped with high resolution sensors. These sensors have the property to generate more than one detection per object per time step. This results in an additional complexity for the target tracking algorithm, since standard tracking filters assume that an object generates at most one detection per object. This requires new methods for data association and system state filtering.
As new data association methods, in this thesis two different extensions of the Joint Integrated Probabilistic Data Association (JIPDA) filter to assign more than one detection to tracks are proposed.
The first method that is introduced, is a generalization of the JIPDA to assign a variable number of measurements to each track based on some predefined statistical models, which will be called Multi Detection - Joint Integrated Probabilistic Data Association (MD-JIPDA).
Since this scheme suffers from exponential increase of association hypotheses, also a new approximation scheme is presented. The second method is an extension for the special case, when the number and locations of measurements are a priori known. In preparation of this method, a new notation and computation scheme for the standard Joint Integrated Data Association is outlined, which also enables the derivation of a new fast approximation scheme called balanced permanent-JIPDA.
For state filtering, also two different concepts are applied: the Random Matrix Framework and the Measurement Generating Points. For the Random Matrix framework, first an alternative prediction method is proposed to account for kinematic state changes in the extension state prediction as well. Secondly, various update methods are investigated to account for the polar to Cartesian noise transformation problem. The filtering concepts are connected with the new MD-JIPDA and their characteristics analyzed with various Monte Carlo simulations.
In case an object can be modeled by a finite number of fixed Measurement Generating Points (MGP), also a proposition to track these object via a JIPDA filter is made. In this context, a fast Track-to-Track fusion algorithm is proposed as well and compared against the MGP-JIPDA.
The proposed algorithms are evaluated in two applications where scanning is done using radar sensors only. The first application is a typical automotive scenario, where a passenger car is equipped with six radar sensors to cover its complete environment.
In this application, the location of the measurements on an object can be considered stationary and that is has a rectangular shape. Thus, the MGP based algorithms are applied here. The filters are evaluated by tracking especially vehicles on nearside lanes.
The second application covers the tracking of vessels on inland waters. Here, two different kind of Radar systems are applied, but for both sensors a uniform distribution of the measurements over the target's extent can be assumed. Further, the assumption that the targets have elliptical shape holds, and so the Random Matrix Framework in combination with the MD-JIPDA is evaluated.
Exemplary test scenarios also illustrate the performance of this tracking algorithm.
Karl Bernhard (1859-1937)
(2018)
Schon die Römer nutzten die Binnenschifffahrt für den Transport ihrer Güter (SCHRöTER 2005). Noch heute stellt die Binnenschifffahrt auf dem Rhein einen wichtigen Standortfaktor dar, weshalb sich viele Unternehmen, die auf den Transport von Massengütern angewiesen sind, an seinen Ufern niedergelassen haben, um die Binnenschifffahrt als günstiges Transportmittel nutzen zu können (ROTHSTEIN et al. 2009, SCHOLTEN et al. 2009).
Im folgenden Artikel wird sowohl kurz die wirtschaftliche Bedeutung der Binnenschifffahrt auf dem Rhein angesprochen als auch deren rezente und zukünftige Entwicklung. Dabei werden auch die Auswirkungen niedriger Fahrrinnentiefen auf die Transportkapazität der Binnenschifffahrt betrachtet.
Der Bodensee und das in ihm gespeicherte Wasser dient vielen Zwecken: Neben seiner ökologischen Bedeutung für die Region ist er Trinkwasserquelle und Schifffahrtsweg, wird für Freizeit und Naherholung genutzt. Die Schifffahrt stellt eine der zentralen Attraktionen am Bodensee dar – sie zieht Tagesausflügler und Naherholungssuchende ebenso an wie Urlauber. Der Tourismus ist dabei eine der zentralen Einkommensquellen am Bodensee. Während der Niedrigwasserereignisse der letzten Jahre wurden jedoch die verschiedenen Schifffahrtstypen beeinträchtigt. Dies traf den Tourismus wie auch Berufspendler, Häfen, anliegende Gemeinden und den Gütertransport. Der Beitrag verdeutlicht die Bedeutung der Bodenseeschifffahrt und nennt einige Folgen der Niedrigwasserereignisse der letzten Jahre.
Infolge des Klimawandels sind entlang der Gewässer Baden-Württembergs verschärfte Niedrigwassersituationen zu erwarten, die unter Umständen zu Wassernutzungskonflikten der lokalen Akteure führen. Anhand des Kochers und der Murg wurden mit Hilfe einer Stakeholder-Analyse solche Konflikte identifiziert sowie erste Handlungsoptionen für eine Niedrigwasservorsorge bzw. ein Niedrigwassermanagement erarbeitet. Den Erhebungen zufolge treten Wassernutzungskonkurrenzen in fast allen Nutzergruppen auf, jedoch mit unterschiedlicher Ausprägung. Hierbei stehen bestimmte Sektoren teilweise mit mehreren Stakeholder-Gruppen im Widerstreit, andere Gruppen haben dagegen keine Erfahrung mit Konkurrenzsituationen. Weiterhin ist auffällig, dass Niedrigwasserereignisse an beiden Flüssen lediglich einen Teil der Nutzungskonflikte auslösen. Ein Großteil der Streitfragen wird durch anthropogene Einflüsse verursacht.
In einigen europäischen Nachbarländern herrschen weitaus schlechtere Voraussetzungen für die Binnen-schifffahrt als in Deutschland. Die wenigsten Länder verfügen über eine so effiziente Wasserstraße wie beispielsweise den Rhein. Dennoch forcieren nicht wenige die Verlagerung von Transporten von der Straße auf das Binnenschiff.
Die Bauingenieure sind sich ihrer gesellschaftlichen Verantwortung bewusst, finden es jedoch unbefriedigend, dass ihr Anteil an der Baukultur weder ausreichend bekannt ist, noch gebührend gewürdigt wird. Der Beitrag gibt einen kurzen Überblick über diese Thematik und versucht die eigenen Defizite der Ingenieure aufzuspüren, die die Lösung des Problems erschweren. Am Beispiel von Ulrich Fintterwalder wird gezeigt, welche Haltung einer der großen Baumeister des zwanzigsten Jahrhunderts zum verantwortlichen und nachhaltigen Bauen, zur Ästhetik und Gestaltung und zur kreativen Zusammenarbeit mit Architekten eingenommen hatte.
Sexistischer Werbung, die gegen die Menschenwürde verstößt, kann über die Auffangnorm des § 3 Abs. 1 UWG bekämpft werden. Dennoch zeigt sich die Rechtsprechung zurückhaltend und stattdessen übernimmt der Deutsche Werberat die Deutungshoheit. Die höchstrichterliche Rechtsprechung konnte sich insoweit bislang nicht fortbilden. Gerade in Zeiten des Wertewandels ist eine aktualisierte höchstrichterliche Rechtsprechung aber nicht zuletzt auch für den Rechtsfrieden unerlässlich.
In tourism, energy demands are particularly high. Tourism facilities such as hotels require large amounts of electric and heating / cooling energy while their supply is usually still based on fossil energies.
This research approach analyses the potential of promoting renewable energies in tourism. It focuses on a combined and hence highly efficient production of both electric and thermal energy by biogas plants on the one hand and its provision to local tourism facilities via short distance networks on the other. Considering regional resource availability as well as socio-economic aspects, it thus examines strengths, weaknesses, opportunities and threats that can arise from such a micro-cooperation. The research aim is to provide an actor-based, spatially transferable feasibility analysis.
In 1970, B.A. Asner, Jr., proved that for a real quasi-stable polynomial, i.e., a polynomial whose zeros lie in the closed left half-plane of the complex plane, its finite Hurwitz matrix is totally nonnegative, i.e., all its minors are nonnegative, and that the converse statement is not true. In this work, we explain this phenomenon in detail, and provide necessary and sufficient conditions for a real polynomial to have a totally nonnegative finite Hurwitz matrix.
Further applications of the Cauchon algorithm to rank determination and bidiagonal factorization
(2018)
For a class of matrices connected with Cauchon diagrams, Cauchon matrices, and the Cauchon algorithm, a method for determining the rank, and for checking a set of consecutive row (or column) vectors for linear independence is presented. Cauchon diagrams are also linked to the elementary bidiagonal factorization of a matrix and to certain types of rank conditions associated with submatrices called descending rank conditions.
Allgemeine Geschäftsbedingungen als Instrument der Vereinfachung betrieblicher Vertragsgestaltung
(2018)
Visualization-Assisted Development of Deep Learning Models in Offline Handwriting Recognition
(2018)
Deep learning is a field of machine learning that has been the focus of active research and successful applications in recent years. Offline handwriting recognition is one of the research fields and applications were deep neural networks have shown high accuracy. Deep learning models and their training pipeline show a large amount of hyper-parameters in their data selection, transformation, network topology and training process that are sometimes interdependent. This increases the overall difficulty and time necessary for building and training a model for a specific data set and task at hand. This work proposes a novel visualization-assisted workflow that guides the model developer through the hyper-parameter search in order to identify relevant parameters and modify them in a meaningful way. This decreases the overall time necessary for building and training a model. The contributions of this work are a workflow for hyper-parameter search in offline handwriting recognition and a heat map based visualization technique for deep neural networks in multi-line offline handwriting recognition. This work applies to offline handwriting recognition, but the general workflow can possibly be adapted to other tasks as well.
Algorithms for calculating the string edit distance are used in e.g. information retrieval and document analysis systems or for evaluation of text recognizers. Text recognition based on CTC-trained LSTM networks includes a decoding step to produce a string, possibly using a language model, and evaluation using the string edit distance. The decoded string can further be used as a query for database search, e.g. in document retrieval. We propose to closely integrate dictionary search with text recognition to train both combined in a continuous fashion. This work shows that LSTM networks are capable of calculating the string edit distance while allowing for an exchangeable dictionary to separate learned algorithm from data. This could be a step towards integrating text recognition and dictionary search in one deep network.
Offline handwriting recognition systems often use LSTM networks, trained with line- or word-images. Multi-line text makes it necessary to use segmentation to explicitly obtain these images. Skewed, curved, overlapping, incorrectly written text, or noise can lead to errors during segmentation of multi-line text and reduces the overall recognition capacity of the system. Last year has seen the introduction of deep learning methods capable of segmentation-free recognition of whole paragraphs. Our method uses Conditional Random Fields to represent text and align it with the network output to calculate a loss function for training. Experiments are promising and show that the technique is capable of training a LSTM multi-line text recognition system.
Optical surface inspection: A novelty detection approach based on CNN-encoded texture features
(2018)
In inspection systems for textured surfaces, a reference texture is typically known before novel examples are inspected. Mostly, the reference is only available in a digital format. As a consequence, there is no dataset of defective examples available that could be used to train a classifier. We propose a texture model approach to novelty detection. The texture model uses features encoded by a convolutional neural network (CNN) trained on natural image data. The CNN activations represent the specific characteristics of the digital reference texture which are learned by a one-class classifier. We evaluate our novelty detector in a digital print inspection scenario. The inspection unit is based on a camera array and a flashing light illumination which allows for inline capturing of multichannel images at a high rate. In order to compare our results to manual inspection, we integrated our inspection unit into an industrial single-pass printing system.
Digitale Signaturen zum Überprüfen der Integrität von Daten, beispielsweise von Software-Updates, gewinnen zunehmend an Bedeutung. Im Bereich der eingebetteten Systeme kommen derzeit wegen der geringen Komplexität noch überwiegend symmetri-sche Verschlüsselungsverfahren zur Berechnung eines Authentifizierungscodes zum Einsatz. Asym-metrische Kryptosysteme sind rechenaufwendiger, bieten aber mehr Sicherheit, weil der Schlüssel zur Authentifizierung nicht geheim gehalten werden muss. Asymmetrische Signaturverfahren werden typischerweise zweistufig berechnet. Der Schlüssel wird nicht direkt auf die Daten angewendet, sondern auf deren Hash-Wert, der mit Hilfe einer Hash-funktion zuvor berechnet wurde. Zum Einsatz dieser Verfahren in eingebetteten Systemen ist es erforder-lich, dass die Hashfunktion einen hinreichend gro-ßen Datendurchsatz ermöglicht. In diesem Beitrag wird eine effiziente Hardware-Implementierung der SHA-256 Hashfunktion vorgestellt.
Embodiments are generally related to the field of channel and source coding of data to be sent over a channel, such as a communication link or a data memory. Some specific embodiments are related to a method of encoding data for transmission over a channel, a corresponding decoding method, a coding device for performing one or both of these methods and a computer program comprising instructions to cause said coding device to perform one or both of said methods.
The Role of Support-Activities for the successful Implementation of Internal Corporate Accelerators
(2018)
New Technology-Based Firms (NTBFs) learn their business in the early-stages of their life-cycle. As a central element of the entrepreneurial learning process, the business model describes the value-creation functions that are conceptualized in different stages of the NTBF’s life-cycle. Transaction relations connect the model with the business reality and ideally mature in strength over time to a functioning value-network. This chapter describes the development of a research design that determines, extracts, and evaluates semantics constructs of this entrepreneurial learning out of a convenient sample and three cohorts of business plans submitted to a business plan award between 2008 and 2010. The analysis shows empirical evidence for the survival and growth of those NTBFs that exhibit a balanced status of entrepreneurial learning in the maturity of the value-network that can be characterized as early startup-stage. The empirical findings of the network theory based business plan analysis will allow for a better explanation of the performance in the entrepreneurial process that is discussed for NTBFs based on theory of organizational learning.
Beidhändig zum Erfolg
(2018)
Alles digital – was nun?
(2018)
Beidhändig gestalten
(2018)
Today’s markets are characterized by fast and radical changes, posing an essential challenge to established companies. Startups, yet, seem to be more capable in developing radical innovations to succeed in those volatile markets. Thus, established companies started to experiment with various approaches to implement startup-like structures in their organization. Internal corporate accelerators (ICAs) are a novel form of corporate venturing, aiming to foster bottom-up innovations through intrapreneurship. However, ICAs still lack empirical investigations. This work contributes to a deeper understanding of the interface between the ICA and the core organization and the respective support activities (resource access and support services) that create an innovation-supportive work environment for the intrapreneurial team. The results of this qualitative study, comprising 12 interviews with ICA teams out of two German high-tech companies, show that the resources provided by ICAs differ from the support activities of external accelerators. Further, the study shows that some resources show both supportive as well as obstructive potential for the intrapreneurial teams within the ICA.
This work proposes a construction for low-density parity-check (LDPC) codes over finite Gaussian integer fields. Furthermore, a new channel model for codes over Gaussian integers is introduced and its channel capacity is derived. This channel can be considered as a first order approximation of the additive white Gaussian noise channel with hard decision detection where only errors to nearest neighbors in the signal constellation are considered. For this channel, the proposed LDPC codes can be decoded with a simple non-probabilistic iterative decoding algorithm similar to Gallager's decoding algorithm A.
Generalized concatenated (GC) codes with soft-input decoding were recently proposed for error correction in flash memories. This work proposes a soft-input decoder for GC codes that is based on a low-complexity bit-flipping procedure. This bit-flipping decoder uses a fixed number of test patterns and an algebraic decoder for soft-input decoding. An acceptance criterion for the final candidate codeword is proposed. Combined with error and erasure decoding of the outer Reed-Solomon codes, this bit-flipping decoder can improve the decoding performance and reduce the decoding complexity compared to the previously proposed sequential decoding. The bit-flipping decoder achieves a decoding performance similar to a maximum likelihood decoder for the inner codes.
Error correction coding based on soft-input decoding can significantly improve the reliability of non-volatile flash memories. This work proposes a soft-input decoder for generalized concatenated (GC) codes. GC codes are well suited for error correction in flash memories for high reliability data storage. We propose GC codes constructed from inner extended binary Bose-Chaudhuri-Hocquenghem (BCH) codes and outer Reed-Solomon codes. The extended BCH codes enable an efficient hard-input decoding. Furthermore, a low-complexity soft-input decoding method is proposed. This bit-flipping decoder uses a fixed number of test patterns and an algebraic decoder for soft-decoding. An acceptance criterion for the final candidate codeword is proposed. Combined with error and erasure decoding of the outer Reed-Solomon codes, this acceptance criterion can improve the decoding performance and reduce the decoding complexity. The presented simulation results show that the proposed bit-flipping decoder in combination with outer error and erasure decoding can outperform maximum likelihood decoding of the inner codes.
The introduction of multiple-level cell (MLC) and triple-level cell (TLC) technologies reduced the reliability of flash memories significantly compared with single-level cell flash. With MLC and TLC flash cells, the error probability varies for the different states. Hence, asymmetric models are required to characterize the flash channel, e.g., the binary asymmetric channel (BAC). This contribution presents a combined channel and source coding approach improving the reliability of MLC and TLC flash memories. With flash memories data compression has to be performed on block level considering short-data blocks. We present a coding scheme suitable for blocks of 1 kB of data. The objective of the data compression algorithm is to reduce the amount of user data such that the redundancy of the error correction coding can be increased in order to improve the reliability of the data storage system. Moreover, data compression can be utilized to exploit the asymmetry of the channel to reduce the error probability. With redundant data, the proposed combined coding scheme results in a significant improvement of the program/erase cycling endurance and the data retention time of flash memories.
Generalised concatenated (GC) codes are well suited for error correction in flash memories for high-reliability data storage. The GC codes are constructed from inner extended binary Bose–Chaudhuri–Hocquenghem (BCH) codes and outer Reed–Solomon codes. The extended BCH codes enable high-rate GC codes and low-complexity soft input decoding. This work proposes a decoder architecture for high-rate GC codes. For such codes, outer error and erasure decoding are mandatory. A pipelined decoder architecture is proposed that achieves a high data throughput with hard input decoding. In addition, a low-complexity soft input decoder is proposed. This soft decoding approach combines a bit-flipping strategy with algebraic decoding. The decoder components for the hard input decoding can be utilised which reduces the overhead for the soft input decoding. Nevertheless, the soft input decoding achieves a significant coding gain compared with hard input decoding.
Simon Grimm examines new multi-microphone signal processing strategies that aim to achieve noise reduction and dereverberation. Therefore, narrow-band signal enhancement approaches are combined with broad-band processing in terms of directivity based beamforming. Previously introduced formulations of the multichannel Wiener filter rely on the second order statistics of the speech and noise signals. The author analyses how additional knowledge about the location of a speaker as well as the microphone arrangement can be used to achieve further noise reduction and dereverberation.
This work studies a wind noise reduction approach for communication applications in a car environment. An endfire array consisting of two microphones is considered as a substitute for an ordinary cardioid microphone capsule of the same size. Using the decomposition of the multichannel Wiener filter (MWF), a suitable beamformer and a single-channel post filter are derived. Due to the known array geometry and the location of the speech source, assumptions about the signal properties can be made to simplify the MWF beamformer and to estimate the speech and noise power spectral densities required for the post filter. Even for closely spaced microphones, the different signal properties at the microphones can be exploited to achieve a significant reduction of wind noise. The proposed beamformer approach results in an improved speech signal regarding the signal-to-noise-ratio and keeps the linear speech distortion low. The derived post filter shows equal performance compared to known approaches but reduces the effort for noise estimation.
Im vorliegenden Aufsatz wird das grundlegende Vorgehen zur Berechnung der Durchbiegung im gerissenen Zustand inklusive Berücksichtigung von Kriechen und Schwinden vorgestellt. Dabei werden aufbauend auf den Vorgaben des EC2 verschiedene Verfahren mit unterschiedlichen Genauigkeitsniveaus für Balken und einachsig gespannte Platten erläutert. Für einfache Systeme können diese Verfahren auch von Hand durchgeführt werden und bieten dabei ein hohes Maß an Kontrolle über den Rechenablauf. Anschließend wird die Ermittlung der Schwindverformungen genauer betrachtet, welche nur mit hohem Rechenaufwand durchgeführt werden kann. Für eine Auswahl von Systemen können Diagramme mit Multiplikationsfaktoren hergeleitet werden, welche die Berechnung stark vereinfachen. Des Weiteren wird auf die Verformungsberechnung im Zustand II für Plattentragwerke eingegangen. Dabei werden sowohl die Berechnung mit FE‐Plattenprogrammen, welche oftmals entsprechende Funktionen anbieten, als auch vereinfachte manuelle Verfahren vorgestellt. Die Grundlagen der Rissbildung lassen sich von Stabtragwerken auf Platten übertragen, allerdings entstehen dabei neue Fragestellungen, wie beispielsweise zum Vorgehen bei der Steifigkeitsabminderung oder zum Einfluss der Schnittgrößenumlagerung infolge Rissbildung. In diesem Bereich besteht daher noch Forschungsbedarf.
E-mobility in Tourism
(2018)
This article examines chances for and obstacles to e-mobility in tourism at the cross-border region of Lake Constance, Germany. Using secondary internet research, a database of key e-mobility supply factors was generated and visualized utilizing a geographical information system. The results show that fragmentation in infrastructure and information due to the cross-border situation of the four-country region is the main obstacle for e-mobility in tourism in the Lake Constance region. Cooperation and coordination of the supply side of e-mobility in the Lake Constance region turned out to be weak. To improve the chances of e-mobility in cross-border tourism a more client-oriented approach regarding information, accessibility, and conditions of use is necessary.
Der Süden
(2018)
Dieser Beitrag untersucht, inwiefern die Sapir-Whorf-Hypothese, die die Abhängigkeit des Denkens von der Sprache postuliert, einen Erklärungsansatz zur raumsemantischen Konstruktion des touristischen Südens liefern kann. Sie dient als Analyseraster in Verbindung mit empirischen Befunden zu den touristischen Imageprofilen von Sevilla und Buenos Aires, die als Fallbeispiele touristischer Städte des Südens gewählt wurden.
„Nackte Tatsachen genügen nicht, um den Leser bis zum Schluss bei der Stange zu halten. [Auch der] Verfasser von [Fach- und] Sachtexten hat das Recht – wenn nicht gar die Pflicht –, die Wunder der Erzählkunst für sich zu erschließen, um seine Texte zu einer interessanten und vergnüglichen Lektüre zu machen.“ – Der Vortrag geht der Frage nach, ob diese Forderung des vielgelesenen Ratgeberautors Sol Stein berechtigt ist und inwiefern sie eingelöst werden kann. Zu diesem Zweck werden Stil- und Kompositionsmittel aus den Bereichen Lexik, Grammatik, Syntax, Stilistik, Erzählstrategie und Textorganisation anhand von Formulierungsbeispielen vorgestellt und auf ihre Funktion in Erzählliteratur oder Journalismus hin untersucht. In einem zweiten Schritt wird jeweils nach der Übertragbarkeit dieser sprachlichen Mittel auf Fachtexte gefragt. Anhand parallel ausgerichteter Beispiele wird eine mögliche verlagerte Funktion im Wissenschaftskontext skizziert. Der erhoffte Erkenntnisgewinn des Vortrags betrifft sowohl das Verfassen eigener Publikationen als auch die Vermittlung von Schreibfähigkeiten für künftige Fachautor*innen, weshalb die Formulierungsbeispiele verschiedensten, auch technischen und naturwissenschaftlichen Domänen entnommen sind.
(Literaturangabe: Stein, Sol: Über das Schreiben [1995], dt. Waltraud Götting, 10. Aufl., Zweitausendeins, Frankfurt a. M., 2006, zit. S. 49)
Der Einsatz von Plagiatssoftware sollte auf die Zielgruppe abgestimmt sein. Da die Beurteilung des digitalen Prüfberichts Expertenwissen voraussetzt, erscheint ein unbegleiteter Zugriff nicht sinnvoll. Da meist nicht mit Betrugsabsicht, sondern aus Regelunkenntnis plagiiert wird, ist eine Beschränkung auf eine flächendeckende Detektion keine Lösung. Umfassendes Regelwissen, ein Verständnis für die grundlegende Bedeutung intertextueller Bezüge sowie selbstverantwortliches Handeln sind Vermittlungsziele der HTWG-Schreibberatung. Zu diesem Zweck macht das HTWG-Modell den Schreibkursbesuch zur Zulassungsvoraussetzung für die freiwillige Plagiatskontrolle und behält sich die Deutungshoheit über den Prüfbericht vor.
Smart-Future-Living-Bodensee
(2018)
When integrating task-based learning into LSP courses, assessment procedures have to reflect the communicative goals of such tasks. However, performances on authentic and complex tasks are often difficult to score, because they involve not only specific language ability but also field specific knowledge. Moreover, the emphasis of tasks on meaning suggests that the communicative outcome should be regarded as the main criterion of success. This paper focuses on task design and scoring. It is argued that tasks have to be adapted to assessment purposes. However, to avoid a misalignment between teaching/learning and assessment, they should comprise the main features of LSP tasks in the sense of task-based language learning.
This thesis considers bounding functions for multivariate polynomials and rational functions over boxes and simplices. It also considers the synthesis of polynomial Lyapunov functions for obtaining the stability of control systems. Bounding the range of functions is an important issue in many areas of mathematics and its applications like global optimization, computer aided geometric design, robust control etc.
Business units are increasingly able to fuel the transformation that digitalization demands of organizations. Thereby, they can implement Shadow IT (SIT) without involving a central IT department to create flexible and innovative solutions. Self-reinforcing effects lead to an intertwinement of SIT with the organization. As a result, high complexities, redundancies, and sometimes even lock-ins occur. IT Integration suggests itself to meet these challenges. However, it can also eliminate the benefits that SIT presents. To help organizations in this area of conflict, we are conducting a literature review including a systematic search and an analysis from a systemic viewpoint using path dependency and switching costs. Our resulting conceptual framework for SIT integration drawbacks classifies the drawbacks into three dimensions. The first dimension consists of switching costs that account for the financial, procedural, and emotional drawbacks and the drawbacks from a loss of SIT benefits. The second dimension includes organizational, technical, and level-spanning criteria. The third dimension classifies the drawbacks into the global level, the local level, and the interaction between them. We contribute to the scientific discussion by introducing a systemic viewpoint to the research on shadow IT. Practitioners can use the presented criteria to collect evidence to reach an IT integration decision.
Business units are increasingly able to fuel the transformation that digitalization demands of organizations. Thereby, they implement Shadow IT (SIT) to create flexible and innovative solutions. However, the individual implementation of SIT leads to high complexities and redundancies. Integration suggests itself to meet these challenges but can also eliminate the described benefits. In this emergent research, we develop propositions for a conceptual decision framework, that balances the benefits and drawbacks of an integration of SIT using a literature review as well as a multiple-case study. We thereby integrate the perspective of the overall organization as well as the specific business unit. We then pose six propositions regarding SIT integration that will serve to evaluate our conceptual framework in future research.
Im Sinne einer dialogischen, transdisziplinären Auseinandersetzung zwischen künstlerischer Praxis, Kultur- und Ingenieurwissenschaften geht es bei diesem Projekt um die Entwicklung einer künstlerisch-wissenschaftlichen Fallstudie mit den Zielen der konkreten Erarbeitung eines Kunstwerks unter den Bedingungen digitaler Medien - und um eine Befragung dieser Medien aus der Perspektive der
künstlerischen Praxis, der Interfacegestaltung und der Entwurfswissenschaften (Teil der UDK Berlin).
Bericht aus dem Freistellungssemester Sommer 2018
Der Trend zu leichteren Konstruktionen und größeren Spannweiten macht es notwendig, den dynamischen Charakter der Einwirkungen auf die Tragsicherheit und Gebrauchstauglichkeit der Bauwerke stärker als bisher zu berücksichtigen; neben aerodynamischen und seismischen Einflüssen sind es solche aus Maschinenanlagen, aus dem Straßen- und Eisenbahnverkehr sowie von Menschen induzierte Einwirkungen, und nicht zuletzt Katastrophenlastfälle, wie Anprall, Flugzeugabsturz und anderes.
Ausgehend von den Grundlagen der Dynamik werden Berechnungs- und Bewertungsverfahren unterschiedlicher Strenge dargestellt und anhand zahlreicher Beispiele praxisbezogen erläutert. Die mathematischen Verfahren werden in einem ausführlichen Anhang dargelegt, die einzelnen Kapitel sind jeweils durch umfangreiche Hinweise auf die Fachliteratur ergänzt.
Marketingrecht
(2018)
Dieses Buch legt eine umfassende Gesamtdarstellung des Marketingrechts vor und sensibilisiert für mögliche Rechtsprobleme im Marketing. Verantwortliche im Marketingmanagement, die Entscheidungen oft auch schnell treffen müssen, werden hier mit den Grundlagen rechtlicher Rahmenbedingungen vertraut gemacht. Der marketingspezifische Aufbau und die Entscheidungsorientierung gewährleisten dem Marketingmanagement als Hauptzielgruppe einen hohen Praxisnutzen. Der Leser erhält wertvolle Hinweise, wie er im Marketing effektiver und zielgerichteter mit der Rechtsabteilung oder externen Rechtsberatern kommunizieren kann.
According to the World Food Organization, nearly half of all root and tuber crops worldwide are not consumed, but are lost due to inappropriate storage and post-harvest losses. In developing countries such as Ethiopia, potatoes have not been dried, but are traditionally stored in potato clamps. So far, dried potatoes have not been converted into usable foods.
The aim of the present work is to convert potatoes - perishable rootlets and tubers - into stable products by hot air drying. Hot air dryers are economical to operate in industrialized countries. In Africa, this is reserved for larger industrial companies only. In regions with a tropical climate, however, the use of solar tunnel dryers is worthwhile. These are a good choice for farming and small industries and wherever electrical energy is difficult or impossible to obtain.
In a first part of the work, the drying process of potatoes was investigated, in particular with regard to the change of thermal, mechanical and chemical quality parameters. In an evaluation of the literature it was found that potatoes are not subject to quality changes if the water activityis below a value of 0.2. In order to determine the water content associated with this value at storage temperature, the known equations for the sorption equilibrium were evaluated and verified with own experimental investigations. This determined the end point of the drying process.
The following experimental investigations showed a process-dependent change of the quality criteria such as color, shrinkage, and mechanical properties as well as the content of valuedetermining substances such as vitamin C and starch. The differences in the course and magnitude of the quality changes were attributed to the glass transition that takes place during the drying process. For the determination of the glass transition temperature a new, simple method based on the measurement of mechanical properties could be developed. The knowledge of the glass transition temperature allowed optimizing the drying process. The drying process could be carried out in the rubbery or glassy region, depending on the expected quality changes. Thus, all information was available to produce high quality dried potatoes in an industrial process.
Since the production of potato products in less industrialized regions without sufficient supply of electrical energy should be included, potatoes were dried with a solar tunnel dryer. Examination of the quality properties mentioned above confirmed the process-dependent quality changes.
Finally, the dried product was ground and with the flour thus produced, wheat flour was replaced for baking bread. An evaluation of the finished bread by a panel showed that the acceptance of the bread according to the new recipe was high, also with regard to baking volume, taste, texture and color.
This work shows that by drying potatoes can be transformed a well accepted, storable and easily transportable product. The risk of losses or degradation is minimized. It can be produced on an industrial as well as on farm level. If the influence of the glass transition is taken into account, it is possible to optimize the quality of the product.
Stadt entwerfen
(2018)
Zweite, komplett überarbeitete, aktualisierte und erweiterte Auflage in neuem Layout, größerem Format und mit neuen Projekten.
Städtebauliches Entwerfen basiert auf Ordnungs- und Gestaltungsprinzipien, die funktionale Ansprüche erfüllen und zugleich die Entwurfselemente zu einem unverwechselbaren Ganzen fügen müssen. Auch wenn Entwürfe fast immer vom Zeitgeist geprägt sind, so sind die kompositorischen Grundprinzipien weitgehend zeitlos. Stadt entwerfen erläutert die wichtigsten Entwurfs- und Darstellungsprinzipien im Städtebau anhand von ausgewählten historischen Beispielen und internationalen zeitgenössischen Wettbewerbsbeiträgen. Im Zentrum der Publikation steht die Frage, wie die Projekte entworfen wurden und welche Methoden und Instrumente dem Entwerfer zur Verfügung stehen: Neben dem klassischen Entwurf, der im Kopf des Entwerfers entsteht, erweitert sich gegenwärtig das Repertoire durch neue, computergestützte Methoden, wie z.B. dem parametrischen Entwerfen, bei dem veränderbare Parameter den Entwurf automatisiert beeinflussen und eine Vielfalt von Lösungsmöglichkeiten anbieten. Drei Best-Practice-Beispiele, die Hafencity Hamburg, Belval-Ouest in Luxemburg und die Südstadt in Tübingen, zeigen im Schlusskapitel, wie prämierte städtebauliche Konzepte und Entwürfe erfolgreich realisiert werden.
Mit Beiträgen von Oliver Fritz, Rolo Fütterer und Markus Neppl.
Stadterfahrungen von Zeitzeugen aller Epochen untersuchte Professor Leonhard Schenk vom Fachgebiet Städtebau und Entwerfen der Studiengänge Architektur in seinem Fortbildungssemester im SoSe17. Wie erleben Menschen die Stadt, was erscheint ihnen am spezifischen „Stadterlebnis“ bemerkenswert? Die menschlich-subjektive Komponente erweitert die Auseinandersetzung mit der Stadt, die bisher primär aus einer theoretischen, künstlerischen oder technischen Perspektive betrachtet wird.
Sein Fortbildungssemester, das er am Institut für Architekturgeschichte ifag der Universität Stuttgart verbrachte, führte ihn auch zu unterschiedlichen Auslandsstationen, europäischen Metropolen und Partnerhochschulen, die er im Rahmen des Erasmusprogramms betreut.