2017
DOI: 10.1177/1687814017691210
|View full text |Cite
|
Sign up to set email alerts
|

Construct the closed-form solution of A-net of Petri nets by case study

Abstract: After our researches on the effect of a non-sharing resource in a kth order which is the concept of customization manufacturing, in this article we extend the research on the closed-form solution of control-related states to the so-called Anet which has one top non-sharing circle subnet connected to the idle place of left process in a deficient kth order system and is the fundamental model of different productions sharing the same common parts in manufacturing. The formulas just are depended on the parameter k… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…Figure 3(a,b)). According to the concept of a Complete reachability graph, Chao (2014) split the reachability graph of a PN N into reachable (from the initial state), live (reachable to the initial state), forbidden (reachable to the livelock (Chao & Yu, 2017) or deadlock states only), livelock (Chao & Yu, 2017) (reachable to the livelock state only), deadlock (reachable to no state), non-reachable (from the initial state) and non-reachable+ empty-siphon states (both non-reachable states in a N and the rev(N)). Due to the independence between the set of live and forbidden states, we have F = R -L, where R, F and L are the number of reachable, forbidden and live states of a PN.…”
Section: Theoretical Framework For Constructing Cfs For Pnsmentioning
confidence: 99%
See 2 more Smart Citations
“…Figure 3(a,b)). According to the concept of a Complete reachability graph, Chao (2014) split the reachability graph of a PN N into reachable (from the initial state), live (reachable to the initial state), forbidden (reachable to the livelock (Chao & Yu, 2017) or deadlock states only), livelock (Chao & Yu, 2017) (reachable to the livelock state only), deadlock (reachable to no state), non-reachable (from the initial state) and non-reachable+ empty-siphon states (both non-reachable states in a N and the rev(N)). Due to the independence between the set of live and forbidden states, we have F = R -L, where R, F and L are the number of reachable, forbidden and live states of a PN.…”
Section: Theoretical Framework For Constructing Cfs For Pnsmentioning
confidence: 99%
“…The formulas are consistent with the reachability analysis using the INA (Integrated Net Analyzer) tool (Starke, 1992). Chao and Yu (2017) showed that the Deficient k-th order system is the essential element of a k-th order system with a non-sharing sub-net (NNS) (as shown in Figure 5) because the NNS will share some tokens in the idle place of left-hand-side process. Beside, Chao and Yu showed that there are so-called livelock states that presently INA cannot detect in such a system.…”
Section: Constructing Cfs For Gen-one Systemmentioning
confidence: 99%
See 1 more Smart Citation