Evaluation of Permutation-Based Mutation Operators on the Problem of Automatic Connection Matching in Closed-Loop Control System

Vladimir Mironovich*, Maxim Buzdalov, Valeriy Vyatkin

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterScientificpeer-review

Abstract

Successful application of evolutionary algorithms for large scale practical problems requires careful consideration of all the different elements of the applied evolutionary approach. Recently, a method was introduced for automatic matching of connections in a closed-loop control system that uses evolutionary algorithm in conjunction with model checking. In order to improve the method we consider using the permutation-based individual encoding, as it more realistically reflects real life scenarios, where the connections are matched on a one-to-one basis. Evaluation of the fitness function based on the model checking is computationally expensive, thus it is necessary to choose the best mutation operator in terms of the number of fitness function evaluations required to find the optimum solution. In this paper we evaluate the applicability of the permutation-based encoding for the problem of connection matching in the closed-loop control system and evaluate the performance of several permutation-based operators commonly used for ordering problems.

Original languageEnglish
Title of host publicationStudies in Fuzziness and Soft Computing, STUDFUZZ
Subtitle of host publicationRecent Advances in Soft Computing and Cybernetics
EditorsR. Matoušek, J. Kůdela
Pages41-51
Number of pages11
ISBN (Electronic)978-3-030-61659-5
DOIs
Publication statusPublished - 6 Feb 2021
MoE publication typeA3 Part of a book or another research book

Publication series

NameStudies in Fuzziness and Soft Computing
Volume403
ISSN (Print)1434-9922
ISSN (Electronic)1860-0808

Keywords

  • Industrial control systems
  • Mutation operators
  • Permutation encoding
  • Search-based software engineering

Fingerprint Dive into the research topics of 'Evaluation of Permutation-Based Mutation Operators on the Problem of Automatic Connection Matching in Closed-Loop Control System'. Together they form a unique fingerprint.

Cite this