2019
DOI: 10.7166/30-1-1849
|View full text |Cite
|
Sign up to set email alerts
|

Design and Implementation of Deadlock Control for Automated Manufacturing Systems

Abstract: Petri nets are robust mathematical tools for the modelling, handling, and control of deadlock problems in automated manufacturing systems (AMSs). Several methods have been proposed to prevent deadlocks in AMSs. However, it is important to convert the controlled system represented by Petri nets into the program of a programmable logic controller (PLC) for the implementation of automation tasks. This study proposes a methodology based on Petri nets for deadlock prevention, and generates PLC codes for an AMS. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
7

Relationship

5
2

Authors

Journals

citations
Cited by 17 publications
(21 citation statements)
references
References 39 publications
0
21
0
Order By: Relevance
“…Therefore, our future research will investigate the proposed model to have an automatic way to test the applicability of the ICTPN model for real world systems. It is crucial to come up with a means to convert the ICTPN model into ladder diagrams (LDs) for implementation on programmable logic controllers (PLCs) [24], using adaptive control techniques [39], or using surveillance systems [40]. We will also consider to model and schedule automated manufacturing systems [41] and social networks [42] using the proposed model methodology.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, our future research will investigate the proposed model to have an automatic way to test the applicability of the ICTPN model for real world systems. It is crucial to come up with a means to convert the ICTPN model into ladder diagrams (LDs) for implementation on programmable logic controllers (PLCs) [24], using adaptive control techniques [39], or using surveillance systems [40]. We will also consider to model and schedule automated manufacturing systems [41] and social networks [42] using the proposed model methodology.…”
Section: Discussionmentioning
confidence: 99%
“…Traditional Petri nets are popularly used to model, simulate, control, and analyze automated manufacturing systems (AMSs). Existing traditional Petri net studies assumed one or more of the following: (1) the system configuration is recognized and does not change throughout the operation, (2) there is no addition of new machines and no removal of old machines, and machine failures are not addressed, (3) rework is not required, and (4) products to be manufactured are identified, their process routes are specified, and the addition of new products is not applicable [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32]. This means that traditional Petri net models do not undergo dynamic configurations, such as processing failures and rework, machine breakdowns, addition of new machines, addition of new products, removal of old machines, or change processing routes induced by the competitive global market.…”
Section: Definition Of Intelligent Colored Token Petri Netsmentioning
confidence: 99%
“…Various methods developed using PNs in LD have been employed in the modeling, simulation, analysis, and control of transformation algorithms [28][29][30][31][32][33][34][35][36][37][38][39][40][41][42]. Using the token pass ladder logic (TPLL), Jones et al [28,29] design a concept for the conversion of PN into LD.…”
Section: Introductionmentioning
confidence: 99%
“…Petri nets can also be used to provide behavioral features, such as boundedness and liveness [5,6]. From a technical perspective, several policies based on Petri nets have been proposed; these policies are based on three strategies: (i) deadlock detection and recovery, (ii) deadlock avoidance, and (iii) deadlock prevention [5,7]. Most of these policies have proposed deadlock control in Petri nets through structural analysis [3,8] and reachability graph analysis [9][10][11].…”
Section: Introductionmentioning
confidence: 99%