2019
DOI: 10.1007/978-3-030-04137-3_15
|View full text |Cite
|
Sign up to set email alerts
|

Smart Combat Simulations in Terms of Industry 4.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…This idea could even be proved by generating all possible schemes for a particular K n and calculating their f 1 fitness score, which is out of scope for this study. On the other hand and by using f 1 as the fitness function, the network manager will be able to minimize the maximum broadcast time of any entity of the network, which is shown to be useful in different applications such as wireless sensor networks [97], industry 4.0 [98], video packet distribution in vehicular ad-hoc networks [99], robotics [100], satellite link topology [101], and age of information performance [102].…”
Section: B Fitness Functionmentioning
confidence: 99%
“…This idea could even be proved by generating all possible schemes for a particular K n and calculating their f 1 fitness score, which is out of scope for this study. On the other hand and by using f 1 as the fitness function, the network manager will be able to minimize the maximum broadcast time of any entity of the network, which is shown to be useful in different applications such as wireless sensor networks [97], industry 4.0 [98], video packet distribution in vehicular ad-hoc networks [99], robotics [100], satellite link topology [101], and age of information performance [102].…”
Section: B Fitness Functionmentioning
confidence: 99%
“…(2020). In distributed systems, the MBT has many applications for the Internet of Things (IoT), Wireless Sensor Networks (WSNs) and Industry 4.0 (Shang et al., 2010; Hocaoğlu and Genç, 2019; Ivanova, 2019). Other applications include communication among telephone networks (Ivanova, 2019), surveillance and reconnaissance (Dekker, 2002), robotics (Bucantanschi et al., 2007; Keshavarz et al., 2011), satellite link topology (Chu and Chen, 2018), and Direct Memory Access (DMA) (Lazard, 1992).…”
Section: Introductionmentioning
confidence: 99%