2020 International Young Engineers Forum (YEF-ECE) 2020
DOI: 10.1109/yef-ece49388.2020.9171812
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Network Topology Generation with Genetic Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Some earlier works ( [34,54,42,99,19]) use different flavors of genetic algorithms to solve the problem in the context of hierarchical industrial Ethernet networks. Other works, such as Fischer et al [37] and Dengiz et al [32], apply genetic algorithms to the context of distributed networks with mesh or mixed topology. Finally, Zhang et al [96,97] apply the concept of genetic algorithm to industrial multi-ring networks.…”
Section: Topology Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…Some earlier works ( [34,54,42,99,19]) use different flavors of genetic algorithms to solve the problem in the context of hierarchical industrial Ethernet networks. Other works, such as Fischer et al [37] and Dengiz et al [32], apply genetic algorithms to the context of distributed networks with mesh or mixed topology. Finally, Zhang et al [96,97] apply the concept of genetic algorithm to industrial multi-ring networks.…”
Section: Topology Generationmentioning
confidence: 99%
“…Furthermore, efficiently identifying suitable platform configurations (or families of such) for IMA systems remains a challenge. Most of the methods proposed in the literature focus on topologies of limited size, fixed structure, and limited flexibility in the choices of hardware modules [42,99,37,6]. Therefore, there is a need to address the problem of topology generation in IMA systems and find methods to navigate this specific search space effectively.…”
Section: Introductionmentioning
confidence: 99%
“…A negative outcome of the situation can originate from an internal failure or from the system being compromised by an untrusted third party, and the likelihood of these events depends heavily on the system design. Critical examples are autonomous driving or closed loop control of collaborative robots over a wireless network [13]. The trust is considered to be confirmed when a specific task has been (transparently) fulfilled, respecting any constraints like security, semantic validity of returned data or the expected Quality of Experience (QoE) of an application.…”
Section: Human -Humanmentioning
confidence: 99%