2018
DOI: 10.1177/0306419018759921
|View full text |Cite
|
Sign up to set email alerts
|

Conversion methodologies from Signal Interpreted Petri Nets to Ladder Diagram and C language in Arduino

Abstract: With the advent of electronics in the last decades, automation is becoming a wide and strong area to be studied. Its applications go from industrial machinery and robotics processes to home illumination and security system processes. Electronic components are becoming more efficient, more productive, safer and cheaper, which justifies its growing usage. Inside automation's area is an area called discrete event systems, which presents an organized and graphical way to represent these events through a tool calle… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…The GHENeSys model of this subsystem presents sequences of access control, activation of operating conditions, and opening of the general synoptic or mimic with access to the auxiliary windows of the SCADA (alarms, trend, reports, and statistical analyzer). Each stage is represented with macro-places and their conditions with auxiliary places and extended arcs that allow simulating its execution in any normal or dangerous situation, which is not allowed to be studied integrally in other discrete methodologies (Aly & Kotb, 2018;Borges & Lima, 2018;Lin et al, 2016;Lutz-Ley & Lopez-Mellado, 2018;Yue et al, 2019;). These macro-places encapsulate the execution details of each one, as in the case of the synoptic or general mimic which these internal details are enlarged in the low hierarchical model (Figure 7).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The GHENeSys model of this subsystem presents sequences of access control, activation of operating conditions, and opening of the general synoptic or mimic with access to the auxiliary windows of the SCADA (alarms, trend, reports, and statistical analyzer). Each stage is represented with macro-places and their conditions with auxiliary places and extended arcs that allow simulating its execution in any normal or dangerous situation, which is not allowed to be studied integrally in other discrete methodologies (Aly & Kotb, 2018;Borges & Lima, 2018;Lin et al, 2016;Lutz-Ley & Lopez-Mellado, 2018;Yue et al, 2019;). These macro-places encapsulate the execution details of each one, as in the case of the synoptic or general mimic which these internal details are enlarged in the low hierarchical model (Figure 7).…”
Section: Resultsmentioning
confidence: 99%
“…A list of related works involving PN extensions: Controlled PN (CtlPNs) and Labeled PN (LPN) (Holloway et al, 1997), Signal Interpreted PN (SIPN) (Frey & Litz, 1998), Automation PN (APN) (Uzam et al, 1998), among others, reveal techniques that can ensure the modeling of the global behavior of the system. However, several current studies (Borges & Lima, 2018;Kaid et al, 2020;Luo et al, 2018;Theis et al, 2019) highlight the gap between these PN control design methods and their implementation in the most widely used industrial device, PLCs. In (Silva et al, 2010), it is deepened in which factors have favored this difference and its solution variants (SIPN, APN, and GPN) comparatively.…”
Section: Methodsmentioning
confidence: 99%
“…In addition, literature shows the use of other PLC programming languages as well. References evolve from the mentioned LDs [19][20][21][22] and/or instruction lists [23,24] to more recent proposals in standard programming languages [25] or structured text (ST) [26], for portability to different PLCs. In a recent paper, Ref.…”
Section: Related Work and Proposalmentioning
confidence: 99%
“…Modeling of conversion techniques [31][32][33][34][35][36][37][38][39][40][41][42][43][44][45] have been performed by applying several techniques based on PNs in ladder diagram. Jones et al [31,32] propose a method for the translation of PN to LD via token pass ladder logic (TPLL).…”
Section: Introductionmentioning
confidence: 99%