The Fellini Museum of Rimini in Italy and the Genetic Algorithms-Based Method to Optimize the Design of an Integrated System Network and Installations
Abstract
:1. Introduction
- In the first part, as a case study, the innovative integrated system and installations planned for the optimal functioning and management of the Fellini Museum of Rimini in Italy is illustrated. It brings out its related complexity in the process of its extension of a historical heritage site to a museum holding artefacts that need to be preserved under different environments when open to the public.
- In the second part, as a dedicated and linked research area, an appropriate Genetic Algorithms (GAs)-based method [18,19,20,21,22,23,24,25,26] is studied and applied for the optimization of the design of the wired network of the integrated system, the electrical power network, and the air conditioning network. The work of the second part illustrates its capability to guarantee a decrease in the realization costs, subject to meeting the extreme constraints in the conservation of such historical buildings.
- “People” refers to security and safety personnel, control personnel, maintenance personnel, visitors, etc.
- “Devices” refers to actuators, sensors, mobile terminals, wearable devices, etc.
- “Operators” refers to the operator personnel of the control room, security personnel, safety personnel, maintenance personnel, police, fire brigades, civil protection, etc.
- Security, safety, and emergency, in loose terms, are referred to as the “security” of people and physical/non-physical resources.
- Risk of security/safety/control, in loose terms, is referred to as “risk”.
- Firewall, intrusion and anti-virus tools, in loose terms, are referred to as “cyber-security tools”.
2. The Fellini Museum of Rimini in Italy
3. Description of Integrated System and Installations
- Impact assessment to assess the impact of the individuated hazards.
- Risks reduction. Risks reduction can be executed by means of essential Operative Tools (OTs), embodied by:
- Residue risks management. Residual risk management can be executed by means of important tools, supported by OTs embodied by: emergency management, service and business continuity, and disaster recovery.
- Guarantee the highest degree of security and safety to people and physical and nonphysical assets.
- Guarantee minimal energy consumption.
- Guarantee maximum easiness of operation by means of local and remote automation systems.
- Reduce the maintenance expenses.
- Guarantee the highest degree of reliability, flexibility, and resilience.
- Guarantee the highest degree of modularity and expandability, together with IoT/IoE facilities.
- A Building Management System (BMS) which utilizes two detached wired networks and Wi-Fi networks to provide a separation between the security, safety, and control services of the infrastructure versus the visitors’ services. It also provides a separation between the physical and logical devices that ensures the security of the telecommunications [54].
- Structured cabling.
- Intrusion detection installation.
- Access control installation.
- Video surveillance installation.
- Fire detection installation.
- Electrical installation.
- Lighting installation.
- Air conditioning installation.
- Public address installation.
- A Protected Room (PR#1) comprising a server for supervision, control, security, safety, and also serving as a redundant server.
- A Control Room comprising a set of fixed consoles used by security personnel.
- A set of mobile terminals used by security and maintenance personnel from different mobile devices including mobile phones, tabs, and desktops.
- A set of devices for supervision, control, security, and safety named “field elements”.
- A firewall (FW#1) that protects communication between the server and the wired network.
- A set of communication networks including satellites, cellular, and modems are connected through a firewall (FW#2) to this administrative network.
- A Protected Room (PR#2) with a server which serves visitors’ facilities as well as acting as a redundant server for this segment. This server has a firewall protection system (FW#3) for any intrusion and virus detection.
- A set of visitors’ electronic gadgets including mobile phones, tabs, and desktops.
- A second firewall (FW#5) connects a modem and the network.
3.1. The Building Management System
- the highest degree of security and safety to people and physical/non-physical resources.
- a simple and detailed management of the museum by personnel, with the provision of fixed consoles or mobile devices for their use.
- the complete operation of all the components, appliances, and systems.
- the optimal use and the decrease of energy expenditures.
- an optimal reduction of maintenance costs.
- the highest degree of trustworthiness, resistance, and flexibility.
3.2. The Intrusion Detection, Access Control and Video Surveillance Systems
3.3. The Electrical and Air Conditioning Installations
4. The Genetic Algorithm-Based Optimization/Design Technique for Integrated Systems and Installations
- Population—a subset of possible solutions
- Chromosomes—one of the solutions in the population
- Gene—an element in the chromosome
- Fitness Function—a function using a specific input to arrive at an improved output.
- Genetic operators—the best individuals mate to reproduce an offspring that is better than the parents. Genetic operators are used to change the genetic composition of the next generation.
- Crossover—this operator swaps the genetic information of two randomly chosen parents to produce a child population of equal size to the parent.
- Mutation—this operator adds new genetic information to a child population to enhance diversification and avoid the common problem of local minima in optimization techniques. This is achieved by simply flipping some bits in the population.
- The chromosome is composed of a number of genes which is identical to the number of devices ND. Every gene, associated with a precise link, is encoded as the number of source devices and the number of destination nodes of the links. The first parameter varies between 1 and the maximum number of devices ND while the second parameter varies between 1 and the maximum number of nodes NN.
5. Results
- for smaller values of NL, the number of existing links, and which must be optimized to generate an optimized final network, is quite limited. This implies that the GA must run fewer generations and therefore, converge soon to achieve the final optimum solution, and thus:
- if NIP is equal to 300, it implies that the GA requires far more generations as it must handle a bigger number of individuals of population and thus, NGOFS is relatively high (≈160).
- if NIP is equal to 100, it implies that the GA must run fewer generations, as it can handle a smaller number of individuals of the population and thus, NGOFS is relatively low (≈25).
- for superior values of NL, the number of existing links, and which have to be improved to generate an optimized final network, is greater. This implies that the GA must run more to achieve the final optimum solution, and thus:
- if NIP is equal to 300, it implies that the GA must run fewer generations, as it must handle a greater number of individuals of the population, which offer a greater number of more performing solutions at every novel generation of the evolution development (letting one achieve the final optimum solution earlier) and consequently, NGOFS is quite small (≈240).
- If NIP is equal to 100, it implies that the GA must run generations, as it must handle a smaller number of individuals of the population, which offer a smaller number of more performing solutions at every novel generation of the evolution development (letting one achieve the final optimum solution later) and consequently, NGOFS is quite great (≈520).
6. Discussion
7. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Garau, C. Smart paths for advanced management of cultural heritage. Reg. Stud. Reg. Sci. 2014, 1, 286. [Google Scholar] [CrossRef] [Green Version]
- Lin, F.; Lin, Y. An ontology-based expert system for representing cultural meanings: An example of an Art Museum. In Proceedings of the Pacific Neighborhood Consortium Annual Conference and Joint Meetings (PNC), Tainan, Taiwan, 7 November 2017. [Google Scholar] [CrossRef]
- Chen, C.Y.; Chang, B.R.; Huang, P.S. Multimedia augmented reality information system for museum guidance. Pers. Ubiquit. Comput. 2014, 18, 315. [Google Scholar] [CrossRef]
- Mora, R.; Sánchez-Aparicio, L.J.; Maté-González, M.A.; García-Álvarez, J.; Sánchez-Aparicio, M.; González-Aguilera, D. An historical building information modelling approach for the preventive conservation of historical constructions: Application to the Historical Library of Salamanca. Autom. Constr. 2021, 121, 103449. [Google Scholar] [CrossRef]
- Balocco, C.; Vicario, M.; De Vita, M. An experimental methodological approach aimed to preventive conservation and sustainable adaptive use of the cultural heritage. Procedia Struct. Integr. 2020, 29, 25–33. [Google Scholar] [CrossRef]
- Suroto, P.Z.; Dewantara, M.H.; Wiradarmo, A.A. The application of technology in museums. Int. J. Appl. Sci. Tour. Events 2020, 4, 170. [Google Scholar] [CrossRef]
- Bezas, K.; Komianos, V.; Koufoudakis, G.; Tsoumanis, G.; Kabassi, K.; Oikonomou, K. Structural Health Monitoring in Historical Buildings: A Network Approach. Heritage 2020, 3, 796–818. [Google Scholar] [CrossRef]
- Garzia, F.; Sammarco, E.; Cusani, R. The integrated security system of the Vatican City State. Int. J. Saf. Secur. Eng. 2011, 1, 1. [Google Scholar] [CrossRef]
- Contardi, G.; Garzia, F.; Cusani, R. The integrated security system of the Senate of the Italian Republic. Int. J. Saf. Secur. Eng. 2011, 1, 219. [Google Scholar] [CrossRef]
- Alletto, S.; Cucchiara, R.; Fiore, G.D.; Mainetti, L.; Mighali, V.; Patrono, L.; Serra, G. An Indoor Location-Aware System for an IoT-Based Smart Museum. IEEE Internet Things J. 2016, 3, 244. [Google Scholar] [CrossRef]
- Ke, G.; Jiang, Q. Application of Internet of Things technology in the construction of wisdom museum. Concurr. Computat. Pr. Exp. 2019, 31, 4680. [Google Scholar] [CrossRef]
- Khan, M.N.; Rahman, H.U.; Faisal, M.; Khan, F.; Ahmad, S. An IoT-Enabled Information System for Smart Navigation in Museums. Sensors 2022, 22, 312. [Google Scholar] [CrossRef] [PubMed]
- Pierdicca, R.; Marques-Pita, M.; Paolanti, M.; Malinverni, E.S. IoT and Engagement in the Ubiquitous Museum. Sensors 2019, 19, 1387. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Piccialli, F.; Benedusi, P.; Carratore, L.; Colecchia, G. An IoT data analytics approach for cultural heritage. Pers. Ubiquit. Comput. 2020, 24, 429. [Google Scholar] [CrossRef]
- Ma, S.; Liu, Q.; Sheu, P.C.Y. Foglight: Visible Light-Enabled Indoor Localization System for Low-Power IoT Devices. IEEE Internet Things J. 2017, 5, 175–185. [Google Scholar] [CrossRef]
- Garzia, F.; Sant’Andrea, L. The Internet of Everything based integrated security system of the World War I museum of Fogliano Redipuglia in Italy. In Proceedings of the IEEE International Carnahan Conference on Security Technology, Orlando, FL, USA, 24 October 2016. [Google Scholar] [CrossRef]
- Garzia, F. Implementing an Internet of Everything system in the archaeological area of Quintili’s Villa in the Ancient Appia route park in Rome. In Proceedings of the SAFE 2017—International Conference on Safety & Security Engineering, Rome, Italy, 6 September 2017. [Google Scholar] [CrossRef] [Green Version]
- Goldberg, D.E. Genetic Algorithms in Search, Optimisation and Machine Learning, 1st ed.; Addison-Wesley: New York, NY, USA, 1989. [Google Scholar]
- Goldberg, D.E.; Deb, K. Foundations of Genetic Algorithms, 1st ed.; Morgan Kaufmann: New York, NY, USA, 1991. [Google Scholar]
- De Jong, K.A. Evolutionary Computation: A Unified Approach, 1st ed.; The MIT Press: Cambridge, MA, USA, 2006. [Google Scholar]
- Eiben, A.E.; Smith, J.E. Introduction to Evolutionary Computation, 2nd ed.; Springer: Berlin, Germany, 2015. [Google Scholar]
- Michalewcz, Z. Genetic Algorithms + Data Structures= Evolution Programs, 3rd ed.; Springer: Berlin, Germany, 1996. [Google Scholar]
- Mitchell, M. An Introduction to Genetic Algorithms, 1st ed.; The MIT Press: Cambridge, MA, USA, 1998. [Google Scholar]
- Cormen, T.H.; Leiserson, C.E.; Rivest, R.L.; Stein, C. Introduction to Algorithms, 3rd ed.; The MIT Press: Cambridge, MA, USA, 2009. [Google Scholar]
- Hassanat, A.; Almohammadi, K.; Alkafaween, E.; Abunawas, E.; Hammouri, A.; Prasath, V.B.S. Choosing Mutation and Crossover Ratios for Genetic Algorithms—A Review with a New Dynamic Approach. Information 2019, 10, 390. [Google Scholar] [CrossRef] [Green Version]
- Srinivas, M.; Patnaik, L.M. Genetic algorithms: A survey. Computer 1994, 27, 17. [Google Scholar] [CrossRef]
- Fellini Museum. Available online: https://www.fellinimuseum.it/en/ (accessed on 12 March 2022).
- Fellini, F.; Tofetti, S.; Laudadio, F.; Farinelli, G.L. Federico Fellini: The Book of Dreams; Rizzoli: Segrate, Italy, 2020. [Google Scholar]
- Fellini, F.; Calvino, I.; Betti, L. Making a Film; Contra Mundum Press: New York, NY, USA, 2015. [Google Scholar]
- Fellini, F. Fellini on Fellini; Capo Press: Boston, MA, USA, 1996. [Google Scholar]
- Fellini, F. I, Fellini; Cooper Square Press: New York, NY, USA, 2001. [Google Scholar]
- Kezich, T. Federico Fellini; Faber & Faber: London, UK, 2007. [Google Scholar]
- Kezich, T. Federico Fellini: The Films; Rizzoli: Segrate, Italy, 2010. [Google Scholar]
- Aldouby, H. Federico Fellini: Painting in Film, Painting on Film; University of Toronto Press: Toronto, ON, Canada, 2013. [Google Scholar]
- Stubbs, J.C. Federico Fellini as Auteur: Seven Aspects of His Films; Southern Illinois University Press: Carbondale, IL, USA, 2006. [Google Scholar]
- Mollica, V.; Fellini, F. Fellini; Skira Editore: Milano, Italy, 2004. [Google Scholar]
- Waller, M.; Gubareva, M.; Burke, F. A Companion to Federico Fellini; John Wiley and Sons Ltd.: Hoboken, NJ, USA, 2020. [Google Scholar]
- Fellini Museum. Available online: https://www.facebook.com/FelliniMuseum/ (accessed on 12 March 2022).
- Garzia, F. An Integrated Multidisciplinary Model for Security Management—Optimized Implementation Technique and Related Supporting Technological System Framework. In Proceedings of the IEEE International Carnahan Conference on Security Technology, Orlando, FL, USA, 24 October 2016. [Google Scholar] [CrossRef]
- Garzia, F.; Lombardi, M. Safety and security management through an integrated multidisciplinary model and related integrated technological framework. In Proceedings of the SAFE 2017—International Conference on Safety & Security Engineering, Rome, Italy, 6 September 2017. [Google Scholar] [CrossRef] [Green Version]
- Broder, J.F.; Tucker, E. Risk Analysis and the Security Survey, 1st ed.; Butterworth Heinemann: New York, NY, USA, 2012. [Google Scholar]
- Norman, T.L. Risk Analysis and Security Countermeasure Selection, 1st ed.; CRC Press: Boca Raton, FL, USA, 2010. [Google Scholar]
- CCI/ICC & ICCROM. The ABC Method: A Risk Management Approach to the Preservation of Cultural Heritage, 1st ed.; Canadian Conservation Institute: Ottawa, ON, Canada, 2016. [Google Scholar]
- Garzia, F. Novel risk assessment methodology for cultural heritage sites. In Proceedings of the STREMAH 2021—17th International Conference on Structural Studies, Repairs and Maintenance of Heritage Architecture, online, 26 May 2021. [Google Scholar] [CrossRef]
- Runhovde, S.R. Risking Munch. The art of balancing accessibility and security in museums. J. Risk Res. 2021, 24, 1113. [Google Scholar] [CrossRef]
- Atkinson, C.; Yates, D.; Brooke, N. ‘Now that you mention it, museums probably are a target’: Museums, terrorism and security in the United Kingdom. Mus. Manag. Curatorship 2020, 35, 109. [Google Scholar] [CrossRef]
- Bülow, A.E. Collection management using preservation risk assessment. J. Inst. Conserv. 2010, 33, 65. [Google Scholar] [CrossRef] [Green Version]
- Brokerhof, A.W.; Bülow, A.E. The QuiskScan—a quick risk scan to identify value and hazards in a collection. J. Inst. Conserv. 2016, 39, 18. [Google Scholar] [CrossRef] [Green Version]
- Elkin, L.K.; Nunan, E.; Fenkart-Froeschl, D. The “Collections Risk Management” Program at the American Museum of Natural History. Collections 2013, 9, 125. [Google Scholar] [CrossRef] [Green Version]
- Lee, K.; Castles, D. Collections Risk Assessment at the Royal BC Museum and Archives. Collections 2013, 9, 9. [Google Scholar] [CrossRef]
- Southward, J.; Thorwald, H.; Muething, G.; Waller, R. Collections Risk Assessment at the Denver Museum of Nature & Science. Collections 2013, 9, 71. [Google Scholar] [CrossRef]
- Matthews, G.; Smith, Y.; Knowles, G. Disaster Management in Archives, Libraries and Museums: An International Overview. Alexandria 2007, 19, 1. [Google Scholar] [CrossRef]
- Pinheiro, A.C.; Macedo, M.F. Risk assessment: A comparative study of archive storage rooms. J. Cult. Herit. 2009, 10, 428. [Google Scholar] [CrossRef]
- Garzia, F. Handbook of Communication Security, 1st ed.; WIT Press: Southampton, UK, 2013. [Google Scholar]
- Borghini, F.; Garzia, F.; Borghini, A.; Borghini, G. The Psychology of Security, Emergency and Risk, 1st ed.; WIT Press: Southampton, UK, 2016. [Google Scholar]
- Poon, K.F.; Conway, A.; Wardrop, G.; Mellis, J. Successful Application of Genetic Algorithms to Network Design and Planning. BT Technol. J. 2000, 18, 32. [Google Scholar] [CrossRef]
- Cortés, P.; Larrañeta, J.; Onieva, L.; García, J.M.; Caraballo, M.S. Genetic algorithm for planning cable telecommunication networks. Appl. Soft Comput. 2001, 1, 21. [Google Scholar] [CrossRef]
- Balubal, C.B.; Bernardo, A.R.D.; Lasheras, B.L.L.; Uyehara, R.A.; Bandala, A.A.; Dadios, E.P. Cabling and cost optimization system for IP based networks through Genetic Algorithm. In Proceedings of the 2014 IEEE Region 10 Symposium, Kuala Lumpur, Malaysia, 14 April 2014. [Google Scholar] [CrossRef]
- Vanhatupa, T.; Hannikainen, M.; Hamalainen, T.D. Genetic Algorithm to Optimize Node Placement and Configuration for WLAN Planning. In Proceedings of the 4th International Symposium on Wireless Communication Systems, Trondheim, Norway, 17 October 2007. [Google Scholar] [CrossRef]
- Yun, Z.; Lim, S.; Iskander, M.F. An Integrated Method of Ray Tracing and Genetic Algorithm for Optimizing Coverage in Indoor Wireless Networks. IEEE Antennas Wirel. Propag. Lett. 2008, 7, 145–148. [Google Scholar] [CrossRef]
- Lee, J.; Han, B.; Lim, H.; Kim, Y.; Saxena, N.; Chung, T. Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments. Comput. J. 2009, 52, 938–949. [Google Scholar] [CrossRef]
- Weicker, N.; Szabo, G.; Weicker, K.; Widmayer, P. Evolutionary multiobjective optimization for base station transmitter placement with frequency assignment. IEEE Trans. Evol. Comput. 2003, 7, 189–203. [Google Scholar] [CrossRef]
- Liu, Y.; Wei, H.; Zhang, H.; Wang, H.; An, W.; Long, K. An Efficient Geometry-Induced Genetic Algorithm for Base Station Placement in Cellular Networks. IEEE Access 2019, 7, 108604. [Google Scholar] [CrossRef]
- Xue, Z. Routing Optimization of Sensor Nodes in the Internet of Things Based on Genetic Algorithm. IEEE Sens. J. 2021, 21, 25142–25150. [Google Scholar] [CrossRef]
- Fan, Q.; Wu, S.; Zhou, X.; Li, L.; Wang, Z. A Genetic Algorithm Based on Auxiliary-Individual-Directed Crossover for Internet-of-Things Applications. IEEE Internet Things J. 2021, 8, 5518. [Google Scholar] [CrossRef]
- Li, X.; Liu, Y.; Ji, H.; Zhang, H.; Leung, V.C.M. Optimizing Resources Allocation for Fog Computing-Based Internet of Things Networks. IEEE Access 2019, 7, 64907. [Google Scholar] [CrossRef]
- Zhang, Y.; Yu, W.; Chen, X.; Jiang, J. Parallel Genetic Algorithm to Extend the Lifespan of Internet of Things in 5G Networks. IEEE Access 2020, 8, 149630. [Google Scholar] [CrossRef]
- De Oliveira, A.C.M.; Lorena, L.A.N. A constructive genetic algorithm for gate matrix layout problems. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2002, 21, 969–974. [Google Scholar] [CrossRef] [Green Version]
- Yang, C. Genetic Algorithm Based Faulty Parameter Identification for Linear Analog Circuit. IEEE Access 2020, 8, 213357. [Google Scholar] [CrossRef]
- Saha, D.; Sur-Kolay, S. Guided GA-Based Multiobjective Optimization of Placement and Assignment of TSVs in 3-D ICs. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2019, 27, 1742–1750. [Google Scholar] [CrossRef]
- Zhang, J.; Chung, H.S.H.; Lo, W.L.; Hui, S.Y.; Wu, A.K.M. Implementation of a decoupled optimization technique for design of switching regulators using genetic algorithms. IEEE Trans. Power Electron. 2001, 16, 752–763. [Google Scholar] [CrossRef] [Green Version]
- Zhang, J.; Chung, H.S.H.; Lo, W.L. Pseudocoevolutionary genetic algorithms for power electronic circuits optimization. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 2006, 36, 590–598. [Google Scholar] [CrossRef]
- Delbem, A.C.B.; de Carvalho, A.C.P.L.F.; Bretas, N.G. Main chain representation for evolutionary algorithms applied to distribution system reconfiguration. IEEE Trans. Power Syst. 2005, 20, 425–436. [Google Scholar] [CrossRef]
- Carrano, E.G.; Soares, L.A.E.; Takahashi, R.H.C.; Saldanha, R.R.; Neto, O.M. Electric distribution network multiobjective design using a problem-specific genetic algorithm. IEEE Trans. Power Deliv. 2006, 21, 995–1005. [Google Scholar] [CrossRef]
- Hong, Y.Y.; Ho, S.Y. Determination of network configuration considering multiobjective in distribution systems using genetic algorithms. IEEE Trans. Power Syst. 2005, 20, 1062–1069. [Google Scholar] [CrossRef]
- Celli, G.; Ghiani, E.; Mocci, S.; Pilo, F. A multiobjective evolutionary algorithm for the sizing and siting of distributed generation. IEEE Trans. Power Syst. 2005, 20, 750–757. [Google Scholar] [CrossRef]
- Wang, C.; Gao, Y. Determination of Power Distribution Network Configuration Using Non-Revisiting Genetic Algorithm. IEEE Trans. Power Syst. 2013, 28, 3638–3648. [Google Scholar] [CrossRef]
- Mossolly, M.; Ghali, K.; Ghaddar, N. Optimal control strategy for a multi-zone air conditioning system using a genetic algorithm. Energy 2009, 34, 58. [Google Scholar] [CrossRef]
- Wang, S.; Jin, X. Model-based optimal control of VAV air-conditioning system using genetic algorithm. Build. Environ. 2000, 35, 471. [Google Scholar] [CrossRef]
- Seong, N.C.; Kim, J.H.; Choi, W. Optimal Control Strategy for Variable Air Volume Air-Conditioning Systems Using Genetic Algorithms. Sustainability 2019, 11, 5122. [Google Scholar] [CrossRef] [Green Version]
- Chang, Y.C. Genetic algorithm based optimal chiller loading for energy conservation. Appl. Therm. Eng. 2005, 25, 2800. [Google Scholar] [CrossRef]
- Poli, R.; Kennedy, J.; Blackwell, T. Particle swarm optimization. Swarm Intell. 2007, 1, 33. [Google Scholar] [CrossRef]
- Bratton, D.; Kennedy, J. Defining a Standard for Particle Swarm Optimization. In Proceedings of the 2007 IEEE Swarm Intelligence Symposium, Honolulu, Hawaii, 1 April 2007. [Google Scholar] [CrossRef]
- Rutenbar, R.A. Simulated annealing algorithms: An overview. IEEE Circuits Devices Mag. 1989, 5, 19–26. [Google Scholar] [CrossRef]
- Granville, V.; Krivanek, M.; Rasson, J.P. Simulated annealing: A proof of convergence. IEEE Trans. Pattern Anal. Mach. Intell. 1994, 16, 652–656. [Google Scholar] [CrossRef]
- Hanafi, S. On the Convergence of Tabu Search. J. Heuristics 2001, 7, 47. [Google Scholar] [CrossRef]
- Glover, F.; Hanafi, S. Tabu search and finite convergence. Discret. Appl. Math. 2002, 119, 3. [Google Scholar] [CrossRef] [Green Version]
- Dorigo, M.; Birattari, M.; Stutzle, T. Ant colony optimization. IEEE Comput. Intell. Mag. 2006, 1, 28–39. [Google Scholar] [CrossRef]
- Martens, D.; De Backer, M.; Haesen, R.; Vanthienen, J.; Snoeck, M.; Baesens, B. Classification with Ant Colony Optimization. IEEE Trans. Evol. Comput. 2007, 11, 651–665. [Google Scholar] [CrossRef]
Device | Node 1 | Node 2 | …… | Node NN−1 | Node NN |
---|---|---|---|---|---|
Device 1 | C1, 1 | C1, 2 | C1, Nn−1 | C1, Nn | |
Device 2 | C2, 1 | C1, 2 | C1, Nn−1 | C1, Nn | |
………….. | |||||
Device ND−1 | C Nd−1, 1 | C Nd−1, 2 | C Nd-1, Nn−1 | C Nd−1, Nn | |
Device ND | C Nd, 1 | C Nd, 2 | C Nd, Nn−1 | C Nd, Nn |
Gene | Considered Variable | Variability Interval | Kind of Variable | Number of Bits |
---|---|---|---|---|
1 | Link 1: source device, destination node | 1 ÷ ND, 1 ÷ NN, | Integer, Integer | Int (log2 (ND) + 1), Int (log2 (NN) + 1). |
2 | Link 2: source device, destination node | 1 ÷ ND, 1 ÷ NN, | Integer, Integer | Int (log2 (ND) + 1), Int (log2 (NN) + 1). |
…… | …… | …… | …… | …… |
ND−1 | Link ND−1: source device, destination node | 1 ÷ ND, 1 ÷ NN, | Integer, Integer | Int (log2 (ND) + 1), Int (log2 (NN) + 1). |
ND | Link ND: source device, destination node | 1 ÷ ND, 1 ÷ NN, | Integer, Integer | Int (log2 (ND) + 1), Int (log2 (NN) + 1). |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Garzia, F. The Fellini Museum of Rimini in Italy and the Genetic Algorithms-Based Method to Optimize the Design of an Integrated System Network and Installations. Heritage 2022, 5, 1310-1329. https://doi.org/10.3390/heritage5020068
Garzia F. The Fellini Museum of Rimini in Italy and the Genetic Algorithms-Based Method to Optimize the Design of an Integrated System Network and Installations. Heritage. 2022; 5(2):1310-1329. https://doi.org/10.3390/heritage5020068
Chicago/Turabian StyleGarzia, Fabio. 2022. "The Fellini Museum of Rimini in Italy and the Genetic Algorithms-Based Method to Optimize the Design of an Integrated System Network and Installations" Heritage 5, no. 2: 1310-1329. https://doi.org/10.3390/heritage5020068
APA StyleGarzia, F. (2022). The Fellini Museum of Rimini in Italy and the Genetic Algorithms-Based Method to Optimize the Design of an Integrated System Network and Installations. Heritage, 5(2), 1310-1329. https://doi.org/10.3390/heritage5020068