Iterative deadlock prevention strategies based on siphons have drawn increasing attention. For iterative strategies, selecting which siphon to control at each iteration has an influence on the final supervisor in structural complexity, computational complexity, and behavioral permissiveness. In this paper, we define two kinds of emptiable siphons and provide two modified mixed-integer programming (MIP) formulations to compute such siphons. On the basis of them, a three-stage iterative deadlock prevention policy that specifies the siphon control order is proposed. The experimental results show that a supervisor with a simpler structure, higher behavioral permissiveness, and lower computational complexity can be obtained by the proposed strategy since neither the exhaustive siphon enumeration nor the reachability analysis is required. INDEX TERMS Deadlock prevention, discrete event systems, mixed integer programming, Petri nets.
This paper deals with the problems of computational and structural complexity in designing maximally permissive liveness-enforcing supervisors for a class of Petri nets called Systems of Simple Sequential Processes with Resources (S 3 PR) without ξ-resources. The supervisor consists of two parts: the first part proposes an algorithm to extract a desired emptied strict minimal siphon (SMS) from a given emptied siphon based on loop resource subsets. This is faster than the existing ones. The second part proposes a siphon-based deadlock prevention policy, which can obtain a maximally permissive liveness-enforcing supervisor with reduced structural complexity and no weighted monitors, owing to the contribution of the first part, which can compute a desired SMS such that one with the smallest number of resource places is selected first for control. Several flexible manufacturing systems are used to show the proposed method and its superior performance over the previous ones.
A cyber-physical system (CPS) typically consists of the plant, sensors, actuators, the controller and a communication network. The communication network connects the individual components to achieve the computing and communication in the CPS. It also makes the CPS vulnerable to network attacks. How to deal with the network attacks in CPSs has become a research hotspot. This paper surveys the types of network attacks in CPSs, the intrusion detection methods and the attack defense strategies. The future research directions of CPSs network security are also presented.INDEX TERMS Cyber-physical systems, network attacks, intrusion detection, defense strategies.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.