2012
DOI: 10.1080/00207543.2011.590540
|View full text |Cite
|
Sign up to set email alerts
|

Solving siphons with the minimal cardinality in Petri nets and its applications to deadlock control

Abstract: Siphons can be used to characterise deadlock states and solve deadlock problems in Petri nets that model flexible manufacturing systems. By modifying the objective function and adding new constraints to the mixedinteger programming (MIP) method proposed by Park and Reveliotis, this paper presents a revised MIP (RMIP) to directly solve siphons, called smart siphons, with the minimal cardinality as well as the minimal number of resource places. Accordingly, an iterative siphon-based control (ISC) method adds a p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 41 publications
0
17
0
Order By: Relevance
“…By analysing the relationship between the states of deadlocks or livelocks and the presence of smart siphons, and then adding new constraints to an MIP method in [31], the RMIP method is described below…”
Section: Revised Mip Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…By analysing the relationship between the states of deadlocks or livelocks and the presence of smart siphons, and then adding new constraints to an MIP method in [31], the RMIP method is described below…”
Section: Revised Mip Methodsmentioning
confidence: 99%
“…That is to say, it is need for p to be sufficiently marked and then ν p = 1 can lead to z t = 1. To distinguish the solution of the MIP method in [31], the solution of the above RMIP method is called NSS.…”
Section: Revised Mip Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…[18][19][20][21][22][23] The structural analysis based deadlock prevention has been extensively studied by researchers, in which siphon computation and control play an essential role. [24][25][26][27][28][29][30] However, current advanced approaches such as those in Chen et al 31 produce maximally permissive supervisors while not being able to synthesize large controllers since reachability analysis of the PN must be employed;…”
Section: Introductionmentioning
confidence: 99%