2020
DOI: 10.1007/978-3-030-58167-1_8
|View full text |Cite
|
Sign up to set email alerts
|

Industrial Plant Topology Models to Facilitate Automation Engineering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…The technique used for modelling topologies will be specific to the analytical requirements of each use case. For example, traditional implementations include Building Information Management [10], Computer Aided Design drawings and manufacturing process diagrams [8] which are used by domain professionals depending on their skills. They have also been heavily represented using various discrete graph techniques [10] [9] due to the availability of structural analysis algorithms and extensibility [6].…”
Section: Topology Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…The technique used for modelling topologies will be specific to the analytical requirements of each use case. For example, traditional implementations include Building Information Management [10], Computer Aided Design drawings and manufacturing process diagrams [8] which are used by domain professionals depending on their skills. They have also been heavily represented using various discrete graph techniques [10] [9] due to the availability of structural analysis algorithms and extensibility [6].…”
Section: Topology Modelsmentioning
confidence: 99%
“…A containment query would return all assets contained within a certain room, factory or server, while a proximity query would return all assets spatially located within a given distance. Previously in manufacturing, topologies have been employed for modelling industrial processes to formally describe a plant structure [8]. They have also been employed for adaptive security and forensics of cyber-physical environments [9][10] [11] [12].…”
Section: Introductionmentioning
confidence: 99%