Refine
Document Type
- Bachelor Thesis (68) (remove)
Keywords
- Android <Systemplattform> (3)
- Routing (3)
- Akkreditierung (2)
- E-Government (2)
- Enterprise 2.0 (2)
- Smartphone (2)
- 3D-Kartierung (1)
- API (1)
- Ad-Hoc Routing (1)
- Agenten (1)
- Agents (1)
- Aggregation (1)
- Aktualisierung (1)
- Android (1)
- Android 2 (1)
- Android 3 (1)
- Android 4 (1)
- Annotation (1)
- App (1)
- App <Programm> (1)
- Archivierung (1)
- Autonomes Fahrzeug (1)
- BPMN (1)
- Bebauungsdichte (1)
- Bewegungsablauf (1)
- C-Programmierung (1)
- CIDR (1)
- Cloud Computing (1)
- Computeranimation (1)
- Computerspiel (1)
- Congestion Control (1)
- Content Management (1)
- Customer Relationship Management (1)
- Datenschutz, Datensicherheit, Apps, Informatik im Kontext (1)
- Distance Vector Routing (1)
- Distanz Vektor Routing (1)
- Drahtloses lokales Netz (1)
- E-Partizipation (1)
- Echtzeitsystem (1)
- Electronic Government (1)
- Elektrischer Servomotor (1)
- Enterprise Information Management (1)
- Entwicklung (1)
- Finanzberatung (1)
- FlexViz (1)
- Forschungslandkarte (1)
- Framework (1)
- Freiheitsgrad (1)
- Föderiertes System (1)
- GPS (1)
- GSM-Standard (1)
- Game Design (1)
- Geocaching (1)
- Germany (1)
- Good Government (1)
- Haskell (1)
- Historisierung (1)
- IP 6 (1)
- IPv6 (1)
- Infobroker (1)
- Informatik (1)
- Information Flow Ontology (1)
- Information Supply Chain (1)
- Informationsmanagement (1)
- Informationssystem (1)
- Integriertes Informationssystem (1)
- Internetregulierung (1)
- Internetworking (1)
- Kinematik (1)
- Kletterer (1)
- Kommunikationsprotokoll (1)
- Konzept (1)
- Kooperatives Informationssystem (1)
- Lokalisation (1)
- Migration (1)
- Mikrocontroller AVR (1)
- Mister X (1)
- OCR (1)
- OWL <Informatik> (1)
- Objektverfolgung (1)
- Online-Befragung (1)
- Ontologie (1)
- Ontologie <Wissensverarbeitung> (1)
- Optische Zeichenerkennung (1)
- Parallelmanipulator (1)
- Path Tracing (1)
- Pfadnachverfolgung (1)
- Politik (1)
- Privatvermögen (1)
- Prozedurale Synthese (1)
- Pulsweitenmodulation (1)
- Qualität (1)
- RDF (1)
- RIPng (1)
- Ray tracing (1)
- Real-Life Game (1)
- Real-Life Spiel (1)
- Rechnernetz (1)
- Rechnernetze (1)
- Registratur (1)
- Research Map (1)
- Rettungsroboter (1)
- Robbie (1)
- Route Aggregation (1)
- Routen-Aggregation (1)
- Router (1)
- Serielle Schnittstelle (1)
- Serviceroboter (1)
- Simulation (1)
- Spiel (1)
- Stakeholder (1)
- Stakeholder-Beteiligung (1)
- Stakeholderanalyse (1)
- Staukontrollmechanismen (1)
- Steuerung (1)
- Stewart-Plattform (1)
- Strassenkreuzung (1)
- Suchmaschine (1)
- Supernetting (1)
- Supply Chain Management (1)
- TCP/IP (1)
- Tablet PC (1)
- Temporale Datenhaltung (1)
- Tesseract (1)
- Tracing (1)
- Translation (1)
- Umfrage (1)
- University (1)
- Validierung (1)
- Verteilte Systeme (1)
- Videospiel (1)
- Virtual Networks (1)
- WLAN Fingerprinting (1)
- Web 2.0- basierte Stakeholderplattform (1)
- Web Analytics (1)
- WiFi Fingerprinting (1)
- Wirtschaftsprojekt (1)
- Wissensbasis (1)
- Wrapping (1)
- archiving (1)
- computer science (1)
- concept (1)
- deutsche Hochschulen (1)
- development (1)
- game (1)
- governance (1)
- information flow regulation (1)
- interaktiv (1)
- jOWL (1)
- knowledge base (1)
- metasearch engine (1)
- online survey (1)
- ontology (1)
- policy modelling (1)
- procedural content generation (1)
- quality (1)
- search engine (1)
- survey (1)
- tool-integration (1)
- video game (1)
- video games (1)
- virtuelle Netze (1)
- Übersetzung (1)
Institute
- Fachbereich 4 (68) (remove)
Die wesentliche Zielsetzung der Bachelor-Arbeit war es, entlang der Anforderungen an DMS/WMS aus dem DOMEA-Konzept und aus dem Kommunalen Gebietsrechenzentrum Koblenz (KGRZ) verschiedene Systeme zu evaluieren. Weiteres Ziel war es, ein System, das die Anforderungen am besten erfüllt, zu identifizieren. Entlang der Evaluation wurde exemplarisch der Workflow des KGRZ untersucht, bewertet und ggf. angepasst. Des Weiteren wurde auf die Frage eingegangen, ob ein einheitliches System im Rahmen des Föderalismus nicht nur in Koblenz sondern auch Rheinland-Pfalz weit eingesetzt werden kann, oder ob ämterspezifische Lösungen vorteilhafter sind.
Customization is a phenomenon which was introduced quite early in information systems literature. As the need for customized information technology is rising, different types of customization have emerged. In this study, customization processes in information systems are analyzed from a perspective based on the concept of open innovation. The objective is to identify how customization of information systems can be performed in an open innovation context. The concept of open innovation distinguishes three processes: Outside-in process, inside-out process and coupled process. After categorizing the selected journals into three core processes, the findings of this analysis indicated that there is a major concentration on outside-in processes. Further research on customization in coupled and inside-out processes is recommended. In addition, the establishment of an extensive up-to-date definition of customization in information systems is suggested.
This thesis describes the implementation of a Path-planning algorithm for multi-axle vehicles using machine learning algorithms. For that purpose, a general overview over Genetic Algorithms is given and alternative machine learning algorithms are briefly explained. The software developed for this purpose is based on the EZSystem Simulation Software developed by the AG Echtzeitysteme at the University Koblenz-Landau and a path correction algorithm developed by Christian Schwarz, which is also detailed in this paper. This also includes a description of the vehicle used in these simulations. Genetic Algorithms as a solution for path-planning in complex scenarios are then evaluated based on the results of the developed simulation software and compared to alternative, non-machine learning solutions, which are also shortly presented.
Due to the increasing pervasiveness of the mobile web, it is possible to send and receive mails with mobile devices. Content of digital communication should be encrypted to prevent eavesdropping and manipulation. Corresponding procedures use cryptographic keys, which have to be exchange previously. It has to be ensured, that a cryptographic key really belongs to the person, who it is supposedly assigned to. Within the scope of this thesis a concept for a smartphone application to exchange cryptographic keys was designed. The concept consists of a specification of a component-based framework, which can be used to securely exchange data in general. This framework was extended and used as the basis for a smartphone application. The application allows creating, managing and exchanging cryptographic keys. The Near Field Communication is used for the exchange. Implemented security measures prevent eavesdropping and specific manipulation. In the future the concept and the application can be extended and adjusted to be used in other contexts.
Die Bedeutung von Social Software (SSW) nimmt nicht nur im Privatleben vieler Menschen zu. Auch Unternehmen haben mittlerweile die Potentiale dieser Systeme erkannt und setzen vermehrt auf Web 2.0 Technologien basierende Systeme im Unternehmenskontext ein. So brachte eine Studie der Association for Information and Image Management (AIIM) im Jahr 2009 hervor, dass über 50 % der Befragten Enterprise 2.0 (E2.0), d.h. der Einsatz von SSW im Unternehmen, als kritischen Faktor des Unternehmenserfolges ansahen. Auch durch diesen Trend mit verursacht stieg, laut einer Studie des Beratungsunternehmens IDC, die Menge an digital verfügbaren Informationen innerhalb einer Zeitspanne von fünf Jahren (2006-2011) um den Faktor zehn. Wo früher galt, "Je mehr Information, desto besser.", bereitet heute das Managen dieser schieren Flut an Informationen vielen Unternehmen Probleme (bspw. in Bezug auf die Auffindbarkeit von Informationen). SSW bietet mit neuen Funktionen, wie Social Bookmarking, Wikis oder Tags, das Potential, Informationen durch Nutzerbeteiligung besser zu strukturieren und zu organisieren. In der vorliegenden Arbeit wird am Beispiel der Forschungsgruppe für Betriebliche Anwendungssysteme (FG BAS) gezeigt, wie man vorhandene Informationsstrukturen erfassen, analysieren und darauf basierend Empfehlungen für den Einsatz von SSW herleiten kann. Den Rahmen für dieses Vorgehen bildet ein von Henczel (2000) entwickeltes Modell zur Durchführung eines Information Audits. Hervorzuhebende Ergebnisse der Arbeit stellen zum Einen das Erfassungsmodell für Informationen und Prozesse dar (Informationsmatrix) und zum Anderen das Visualisierungsmodell der erfassten Daten.
This Thesis deals with the state of Customer Relationship Management (CRM) in companies and the opportunities that are offered by these. The motivation for this thesis results from the request to classify the value of CRM. Furthermore, we want to do a research on how far a CRM-System is able to support and improve company processes. In addition, we want to get an overview of possible conditions that are linked with such a system. For the use case the motivation follows from the opportunity to optimize inefficient processes. As a result, this thesis tries to present perspectives which can improve company processes; moreover conduce to a bigger value creation.
This thesis covers in detail with customer-related processes of the company Alere and its quality in terms of the prospective implementation of a CRM-System. As there are only a few standard requirements for the processes, it is not possible to make a statement about process quality. These circumstances need a tool that is able to fulfil specified requirements. This gap shall be closed by a CRM-System. If we want to close this gap efficiently we first have to research the actual customer-related processes with the aim to specify the new system requirements.
The thesis shall deliver an insight into the topic with the goal to show the advantages of a CRM-System. Additionally, the identification of weak points, based on the use case and the motivation follows. With these data we will optimize the customer-related processes based on the CRM-System functions. Several departments of the company have contact with the customers. Because of this fact the focus lies on documentation, central data storage and loss-free communication between customers and staff and among the staff. The thesis shall deliver different results. First of all, a catalogue of requirements for the customer-related processes which bases on the basics.
Furthermore, the modelling of the customer-related processes. In addition a catalogue of the weak points of the customer related processes and after that a specification of requirements for the CRM-System to optimize the customer-related processes.
Finally the thesis shall generate the modelling of the optimized customer-related processes. The last result the thesis shall deliver is the discussion and conclusion.
In the "Institut MTI Mittelrhein" the impact of training and experience on motion and motion planning in sports is examined. As a part of these investigations, the motion behaviour of a sports climber is analyzed on a sports climbing wall. The aim of this thesis is the segmentation and marker-based detection of the movement of a climber in video recordings. The segmented markers from each image are tracked by a tracking procedure over time. The motion tracks will be exported to the motion analysis software Simi Motion in a format suitable for further analysis.
Concept for a Knowledge Base on ICT for Governance and Policy Modelling regarding eGovPoliNet
(2013)
Abstract The EU project eGovPoliNet is engaged in research and development in the field of information and communication technologies (ICT) for governance and policy modelling. Numerous communities pursue similar goals in this field of IT-based, strategic decision making and simulation of social problem areas. Though, the existing research approaches and results so far are quite fragmented. The aim of eGovPoliNet is to overcome the fragmentation across disciplines and to establish an international, open dialogue by fostering the cooperation between research and practice. This dialogue will advance the discussion and development of various problem areas with the help of researchers from different disciplines, who share knowledge, expertise and best practice supporting policy analysis, modelling and governance. To support this dialogue, eGovPoliNet will provide a knowledge base, which's conceptual development is the subject of this thesis. The knowledge base is to be filled with content from the area of ICT for strategic decision making and social simulation, such as publications, ICT solutions and project descriptions. This content needs to be structured, organised and managed in a way, so that it generates added value and the knowledge base is used as source of accumulated knowledge, which consolidates the previously fragmented research and development results in a central location.
The aim of this thesis is the development of a concept for a knowledge base, which provides the structure and the necessary functionalities to gather and process knowledge concerning ICT solutions for governance and policy modelling. This knowledge needs to be made available to users and thereby motivate them to contribute to the development and maintenance of the knowledge base.
Mit der rasant fortschreitenden Entwicklung von Informatiksystemen und Algorithmen ist die Erfassung und Verarbeitung von Daten in immer größeren Umfang möglich. Verschiedene Initiativen haben sich dadurch motiviert zur Aufgabe gemacht, über die daraus resultierenden Gefahren für die Persönlichkeitsrechte und die Meinungsfreiheit aufzuklären. Dies soll einen bewussteren Umgang mit personenbezogenen Daten zur Folge haben. Zum Schutz der Grundrechte bedarf es aufgeklärter und informierter Nutzer, diese Aufgabe können die Initiativen allerdings nicht alleine leisten. Die staatlichen Bildungseinrichtungen und besonders die Schulen, stehen hier in der Pflicht sich an der Lösung des Problems zu beteiligen. Um ihrem Bildungsauftrag im vollen Ausmaß gerecht zu werden, bedarf es struktureller Änderungen, wie der Änderung von Lehrplänen. Solange diese allerdings nicht erfolgt sind, muss in und mit den gegebenen Strukturen gearbeitet werden. Eine Plattform dafür bietet der schulische Informatikunterricht.
Die vorliegende Arbeit stellt eine Unterrichtsreihe zur Behandlung von Datenschutz und Datensicherheit vor. Es wurde dabei ein kontextorientierter Ansatz nach Vorbild von Informatik im Kontext gewählt. Die Reihe Smartphone-Applikationen beinhaltet über die genannten primären Themen der Unterrichtsreihe hinaus weitere Dimensionen, die bei der Nutzung von Smartphones auftreten. Durch den direkten Bezug zum Alltag der Schüler soll dabei eine möglichst hohe Betroffenheit erzeugt werden. Dadurch sollen die Schüler ihr bisheriges Nutzungsverhalten überdenken und im besten Fall ihren Altersgenossen als Vorbilder dienen. Die Prüfung der Durchführbarkeit der Reihe im Unterricht steht noch aus. Diese war im Rahmen dieser Arbeit, begründet durch die begrenzte Bearbeitungszeit, nicht zu leisten.