Modified Banker s algorithm for scheduling in multi-agv systems

Size: px
Start display at page:

Download "Modified Banker s algorithm for scheduling in multi-agv systems"

Transcription

1 2011 IEEE International Conference on Automation Science and Engineering Trieste, Italy - August 24-27, 2011 ThC3.1 Modified Banker s algorithm for scheduling in multi-agv systems Luka Kalinovcic, Tamara Petrovic, Stjepan Bogdan, Vedran Bobanac Abstract In today s highly complex multi-agv systems key research objective is finding a scheduling and routing policy that avoids deadlock while assuring that vehicle utilization is as high as possible. It is well known that finding such an optimal policy is a NP-hard task in general case. Therefore, big part of the research is oriented towards finding various suboptimal policies that can be applied to real world plants. In this paper we propose modified Banker s algorithm for scheduling in multi-agv systems. A predetermined mission s path is executed in a way that some non-safe states are allowed in order to achieve better utilization of vehicles. A graph-based method of polynomial complexity for verification of these states is given. Algorithm is tested on a layout of a real plant for packing and warehousing palettes. Results shown at the of the paper demonstrate advantages of the proposed method compared with other methods based on Banker s algorithm. I. INTRODUCTION Introduction of automated guided vehicles (AGVs) into automated materials handling systems, flexible manufacturing systems and containers handling systems has brought many notable advantages, but it also requires the use of effective on-line supervisory control strategies able to solve potential problems that arise in such a multi-agv system layout. Control of AGVs includes mission assignment, routing and scheduling and it can be performed either on-line or off-line. Off-line planning requires the knowledge of all tasks prior to execution of an control algorithm, while on-line (sometimes referred to as dynamic) planning allows new tasks to appear although the planning has been already done. AGV routing is focused on the spatial dimension of the problem, that is, determination of paths in the space domain, while scheduling provides deadlock free execution of the path. Which strategy will be used deps on various elements. For example, missions can be assigned to AGVs according to given priority. The notion of preemption is another issue that should be considered; once a mission is assigned to an AGV, question is whether it can be interrupted before it is finished. Also, positioning of idle AGVs, in most cases ignored by the researchers, in practice plays a very important role. Various methods for AGV routing and scheduling are currently in use [1-4], but new methods which employ faster and computationally more efficient algorithms are still the subject of intensive research. Very good reviews of the field can be L. Kalinovcic, T. Petrovic and S. Bogdan are with the Laboratory for Robotics and Intelligent Control Systems, Department of Control and Computer Engineering, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia stjepan.bogdan@fer.hr, tamara.petrovic@fer.hr V. Bobanac is with the Laboratory for Renewable Energy Sources, Department of Control and Computer Engineering, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia vedran.bobanac@fer.hr found in [5, 6, 7]. Many modern AGVs are free-ranging, i.e. instead of using a predefined path, the layout vehicles can travel with no restrictions as long as the collisions with other vehicles and obstacles are avoided. Usually such approach is based on heuristic-behavior and fuzzy algorithms [8, 9, 10]. However, due to very restrictive security issues, traditional centralized decision-making structures still dominate in the industrial implementations. In [11] authors propose a deadlock resolution by using a technique frequently adopted for vehicle management in AGV systems, so called the zone control. Authors allow the route of an AGV to change dynamically, as long as any path assigned to a vehicle s in the docking station. The control algorithm performs a simple one-step look-ahead policy to check if the configuration resulting from the vehicle movement corresponds to a deadlock situation or not. In [12] two types of AGVs are modeled by Petri nets; centralized - an AGV is exclusively assigned to a job until the job is completed, and decentralized - an AGV is shared by multiple jobs. In [13] authors use Colored Resource - Oriented Petri nets for the lower level logical control in an AGV system. There proposed method achieved better results on the typical case study system compared to others that are currently in use. However, its application is in general case of exponential complexity. A different approach to routing and scheduling is used in [14]. Author models the system as a Resource Allocation system (RAS) and uses a scheduling policy that is based on standard Banker s algorithm. Deadlocks are efficiently avoided, while AGVs move on paths that are not priory fixed (as long as the scheduling policy allows it). Property of such a system, which is direct consequence of the applied Banker s algorithm, is that at any allowed state there must exist an ordering of vehicles (missions) that guarantees sequential, one vehicle at a time, termination of all active missions. Main drawback is unavailability to resolve some potential livelocks. The objective of our work was to develop a scheduling algorithm that would, when compared to previous algorithms, provide an increase in vehicle utilization. The proposed modified Banker s algorithm does that by exting the set of states that system is allowed to achieve, while traveling the shortest fixed distance and ensuring that all missions can be safely executed. It is important to emphasize that the method is of low computational complexity and very simple to implement in real-world plants. Work described here is an extension of research presented in [15]. The paper is organized in the following way. First, we define key terms used throughout the paper. Then, a thorough /11/$ IEEE 351

2 description of scheduling policy based on the modified Banker s algorithm for AGV systems is given together with formal proofs of system stability. The proposed policy is tested by simulation and compared to other strategies based on Banker s algorithm. Results are presented at the of the paper. II. A MULTI-AGV PLANT LAYOUT REPRESENTATION Usually, when it comes to the mathematical analysis and the design of supervisory control algorithm, a layout of a considered multi-agv plant can be represented by a graph whose intersections and s of paths are referred to as graph nodes, while paths themselves are represented by arcs. Let us use for this purpose an undirected graph H = (N, A), which contains a set of nodes, N = {n 1, n 2,..., n p } and a set of arcs, A = {a 1, a 2,..., a q }. Three different types of nodes are present in the system: idle nodes (battery charging) I i, workstation nodes (palletization cell, manufacturing cell, warehouse drop off) W i, and crossroads nodes C i. Set of available vehicles is denoted as R. We make the following assumptions: 1) a vehicle can reside only on arcs, 2) only one vehicle at the time is allowed to occupy an arc (if paths are lengthy or wide, they can be segmented into a set of arcs), 3) each vehicle has its idle node, 4) vehicles are not allowed to drive backwards nor make U-turns, except on workstation positioning arcs. In the proposed approach a mission, starting and ing on an idle positioning arc (an arc with dead- in idle node), is executed by a vehicle that visits workstation nodes in particular given order, I i W k W l... I i. Once mission is finished, the vehicle resides on the idle positioning arc, waiting for a new mission assignment. Hence, mission m i is defined as m i = (σ r, r), where σ r is a mission path, and r R is a vehicle assigned to mission m i. A path σ r = a p a q a s... a p of length σ r, is defined as a sequence of arcs that connect visited nodes, with σ r (j) representing j-th arc of σ r. For each vehicle r we define its arc index k r such that k r = i means that r occupies i-th arc of σ r. For example, in system depicted in Fig. 1 [14], we can define mission m 1 = (σ 2, 2) as I 2 W 2 W 1 I 2. The mission is executed by vehicle 2 with σ 2 = and σ 2 (6) = 13. In case vehicle is positioned on arc 13 for the second time, we have k 2 = 6. A set of active paths, Σ = {σ 1, σ 2,..., σ l }, is defined as the set of all paths currently assigned to missions, and set K = {k 1, k 2,..., k l }, is defined as the set of all arcs indexes. Thus, the state of the system is uniquely defined with the set of active paths and the set of occupied arcs, S = (Σ, K). The state of the system S 0 = (Σ, K) is called initial if k r K : k r = 1. For the final state of the system, S F = (Σ, K), one has k r K : k r = σ r. Fig. 1: An example of muli-agv system Definition 1: (allowed state) State S = (Σ, K) is allowed if p, q R, p q : σ p (k p ) σ q (k q ). In other words, state S is allowed if each vehicle resides on a different arc. It should be noted that by definitions the initial S 0 and the final S F states are allowed. Following definitions describe how the system state can be changed. Definition 2: (state change by vehicle movement) Let S = (Σ, K) and S = (Σ, K ) be two states and let there exists r such that { 1 r R, k i ki, i r = k i + 1, i = r then we say that state S is changed to state S movement of vehicle r, denoted as S r S. Definition 3: (state change by new mission assignment) Let S = (Σ, K) and S = (Σ, K ) be two states and let there exists r such that { 1 r R, k r = σ r, k i ki, i r = 1, i = r i r : σ i = σ i then we say that state S is changed to state S by new mission assignment to vehicle r, denoted as S r S. Now we can define properties of the system states. Definition 4: (deadlock state) State S = (Σ, K) is deadlock state if there is no vehicle r such that S r S and S = (Σ, K ) is allowed state. Evidently, no allowed movements of vehicles are possible once system gets in deadlock state. As a consequence, missions cannot be completed and system is not able to reach final state. Definition 5: (safe state) State S = (Σ, K) is safe state if there exists a sequence of vehicles movements, r 1 r 2... r M, such that S r 1 S r 2 S... r M S F. by 352

3 In other words, state is safe if there is at least one scenario of vehicle moves such that all active missions can be successfully completed. Except for safe and deadlock states there is a third, remaining group of states from which system is inevitably going to up in deadlock, regardless of the control policy. These states are commonly referred to as higher level deadlocks [11]. III. SCHEDULING IN MULTI-AGV SYSTEM Prior to execution of scheduling policy, routing algorithm has to assign a path to each newly requested mission. Usually the shortest distance path is assigned to the mission, although, sometimes the shortest distance does not necessarily mean the shortest traveling time as on some parts of the floor shop vehicles are required to travel very slow due to curves or security reasons. There are many known methods for calculation of paths of the graph representing the system layout [16,17]. Some approaches allow the path to change dynamically [14]. As the routing in multi-agv systems is out of the scope of this paper, in a case study presented at the of the paper set Σ is comprised of predetermined shortest distance paths. A problem of scheduling in multi-agv system that we are interested to solve is formalized as follows: having defined initial state of the system S 0 = (Σ, K) and final state of the system S F = (Σ, K) find a scheduling algorithm such that transition from S 0 to S F is free of deadlock states. There exists a trivial solution to this problem; a scheduling algorithm which executes one mission at a time, i.e. one vehicle is moving while all other vehicles remain in their idle positioning arcs. Once the first vehicle finishes its mission second mission is started and so on. Clearly, performance of such an algorithm, in sense of vehicle utilization, is very poor. However, direct consequence of this algorithm is the following corollary. Corollary 1: The initial state S 0 = (Σ, K) is safe. According to Definition 3. state transition can be initiated by a new mission assignment. As the proposed method allows dynamic assignment of mission (once a vehicle is positioned on idle positioning arc), in the next lemma we show that such action does not influence state safety. Lemma 1: Let S = (Σ, K) is a safe state and let S = (Σ, K ) is such that S r S. Then S is a safe state. Lemma 1 is important as it states that under any scheduling policy new mission assignment does not influence the system stability as long as each vehicle has its idle node. System in safe state shall remain in safe state upon new mission assignment. Conclusion that can be drawn from Corollary 1 and Lemma 1 is that system can up in a deadlock state only by vehicle movement. Hence, each time a vehicle request allocation of next arc on its mission s path, scheduling policy should allow it if and only if the resulting state is safe. Fig. 2: An example However, in the general case, detection of state safety is NP-complete problem [18]. Therefore, minimally restrictive control policy, where only deadlock and higher level deadlock states are forbidden and only safe permitted, is computationally intractable and inapplicable in real world. On the price of sacrificing optimality, today s scheduling algorithms allow only those safe states that can be verified in polynomial time. One of such commonly used scheduling algorithms is standard Banker s algorithm, which is described in the following paragraph. In the remainder of the paper term Banker s algorithm will be used instead of standard Banker s algorithm. A. Banker s algorithm in multi-agv systems First thing in defining Banker s algorithm is to identify system resources and processes, which use a certain number of resources. In multi-agv systems one associates resources with arcs and processes with missions (vehicles). In such scenario a vehicle, that executes particular mission, requests allocation of next arc on its path, solely if that arc is not occupied by some other vehicle. Banker s algorithm then checks if this allocation will allow all vehicles to finish their missions in a sequential manner, one by one. If the new state is proved to be safe, requested arc shall be granted to the vehicle and vehicle continues with execution of the assigned mission. In case state is not proved to be safe, movement will be forbidden. Let us examine a system shown in Fig. 2 There are 4 vehicles, 6 workstation nodes and 4 idle position nodes. Layout comprises 24 arcs (it should be noted that numbers in Fig. 2 represent arcs IDs, not weights). Vehicles 1, 3 and 4 are returning to their idle positioning arcs, while vehicle 2 is moving towards workstation W 1 and then back to its idle node I 2. Vehicle 1, as the vehicle that is closest to an intersection, requests arc 13. Using Banker s algorithm we will check the safety of that consequent state, with vehicle 1 positioned on arc 13. Formally, we first define all resources that a particular process already holds (allocates). For system in Fig.2 vehicle 1 holds arc 13, vehicle 2 holds arc 15, vehicle 3 holds arc 8 and vehicle 4 holds arc 17. Further, we define resources 353

4 needed by processes to be finished. Let us suppose that vehicles are using shortest paths, then vehicle 1 needs arcs 1, 5, 15,vehicle 2 arcs 2, 5, 7, 15, vehicle 3 arcs 3, 6, 8, 14, 17 and vehicle 4 needs arcs 4, 6. The outcome of Banker s algorithm, is a sequence describing order in which missions can be carried out, one by one. That sequence is not necessary unique. In our case sequences are, for example (m i here denotes mission of vehicle i), m 2 m 1 m 4 m 3 and m 4 m 2 m 1 m 3, hence, current state is safe. For example, m 1 m 2 m 4 m 3 is not a valid sequence for Banker s algorithm since mission m 1, that is first in the sequence, cannot be finished with no movement of other vehicles in the system (vehicle 2 in particular). Here should be noted that vehicles are not going to necessarily execute missions as given in the output sequence. From the scheduling point of the view it is only important to know that such an option exist. In the remainder of the paper this kind of missions sequence will be called BA-sequence and the associated state BA-safe state (in the literature these states are sometimes referred to as ordered [14]). Formal procedure for determination of system BA-safety is as follows. First, one has to form directed wait-for graph [19]: G = (N g, A g ), N g = {n 1, n 2,..., n n }, and a ij = (n i, n j ) A g iff vehicle j occupies an arc that is on the path needed by vehicle i to finish its mission. As an example of graph formation let us consider situation depicted in Fig. 2. Vehicle 2 occupies arc 15 which is part of the path required for vehicle 1 to complete its mission, hence, in the graph there is an edge from node n 1 to node n 2. Vehicle 4 occupies arc 17. Since this arc belongs to the path executed by vehicle 3, there is an edge from node n 3 to node n 4. Vehicles 2 and 4 have open paths and as such they have no output arcs. Fig. 3: Wait-for graph for system in Fig. 2 If a node has no output arcs, its outdegree is equal to zero. That means that its mission path is not occupied by any other vehicle and the vehicle corresponding to the node can advance to its final arc. The correlation between wait-for graph of state S and its BA-safety is given as: Theorem 1: State S = (Σ, K) is BA-safe if and only if wait-for graph G = (N g, A g ) is acyclic. Proof : Proof of biconditional (P Q) is split into two stages: i)(q P ): If G is acyclic, then state S is BA-safe. Let us assume that graph G is acyclic. Since every acyclic directed graph has at least one node with outdegree zero, the vehicle corresponding to that node can safely finish its mission with no movement of other vehicles. Hence, its node can be removed from the graph. The graph remains acyclic, still having at least one node with outdegree zero. If we continue with this procedure, all nodes will be removed. These nodes, in the exact order of their removal, form a BA sequence, that is, S is BA-safe. ii)( Q P ): If G has at least one cycle, then state S is not BA-safe. Let us assume that graph G contains a cycle of nodes: n 1 n 2... n k n 1. None of the nodes belonging to that cycle has outdegree equal to zero. That means none of vehicles that correspond to the cycle nodes will be able to finish their missions with no movement of other vehicles in the system, that is, BA-sequence cannot be formed. In the text that follows we define an algorithm for checking of BA-safety based on Theorem 1. Algorithm sequentially removes nodes with outdegree zero from wait-for graph. Algorithm terminates either if all nodes have been removed (state is BA-safe) or if there are no nodes with outdegree zero (graph has a cycle and state is not BA-safe). For graph G with n nodes algorithm complexity is O(n 2 ). Algorithm 1: BA-SAFETY CHECK (G = (N g, A g)) output; % state is BA-safe while ( n i N g : outdegree(n i ) = 0) N g = N g\n i if N g = output := true else output := false B. Modified banker s algorithm in multi-agv systems In general, set of BA-safe states is a subset of a wider set of safe states that can eventually reach final state. Scheduling policy that allows for system to be only in a BA-safe state often results in low vehicle utilization and long vehicle waiting times. For example, let us examine the situation depicted in Fig. 4. Vehicle 1 has just visited workstation W 3 and it is returning to idle node I 1 by using arcs 14, 13, 15, 5 and 1. In the same time vehicle 2 has a mission m 2 (visit workstations W 1 and W 3 ) such that σ 2 = {2, 5, 15, 7, 13, 14, 9, 14, 13, 15, 5, 2}. In its current position vehicle 2 requests arc 5. It can be shown, by execution of Banker s algorithm, that a new state obtained by allocation of arc 5 to vehicle 2 is not BA-safe since vehicle 1 cannot finish its mission. Arc 5 is allocated by vehicle 2, and vehicle 2 is not able to proceed due to allocation of arc 14 by vehicle 1 - deadlock. Hence, Banker s algorithm would prevent vehicle 2 to proceed to arc 5. Let us, nevertheless, continue to observe what happens if vehicle 2 proceeds to arc 5 and then requests allocation of arc 15. As with the previous arc, result is not BA-safe state. We continue with the previous reasoning and now vehicle 2 requests arc 354

5 Fig. 4: An example of temporarily BA-unsafe state 7 which is next on the path. This time state of the system is BA-safe. We can summarize described scenario as follows: although allocation of arc 5 to vehicle 2 leads system to temporarily BA-unsafe state, since there exist free pathway from arc 5 to arc 7 and since the system is BA-safe when vehicle 2 resides on arc 7, granting of arc 5 to vehicle 2 is allowed and would not cause the system deadlock. Let us denote this kind of temporarily BA-unsafe state as Modified Banker s safe state. Formal definitions are given as follows: Definition 6: (Modified Banker s (MBA) sequence) Sequence r 1 r 2... r M is called MBA sequence if there exist k, 1 k M such that: i) (i, j), 1 i < j k : r i = r j and ii) (i, j), k < i < j M : r i = r j r i = r i+1 =... = r j For example, sequence is MBA sequence (k = 2), while is not (k = 2, property ii) does not hold for i = 3 and j = 7). Definition 7: State S = (Σ, K) is MBA-safe state if there exists MBA sequence r 1 r 2... r M, such that S r 1 S r 2 S... r M S F. In other words, state S is MBA-safe if by moving of a single vehicle on its path, system can reach BA-safe state and thus can reach final state. Proposition 1: Every BA-safe state is also a MBA-safe state. Algorithm for checking of MBA-safety uses previously defined wait-for graph and Algorithm 1, with certain modifications. Let us assume that vehicle r requests allocation of next arc on its mission s path. First, we associate to vehicle r an integer value that is equal to the maximum number of arcs that r can transverse on its path without being intercepted by any other vehicle. Let us denote this value as e max. For system in Fig. 4, when vehicle 2 requests arc 5, e max = 4, since vehicle 2 can move freely along arcs 5, 15, 7 and 13. Further, for each j-th position of the vehicle, 1 j e max, we construct wait-for graph and using Algorithm 1 check whether that particular state is BA-safe. If during this process BA-safe state is reached, we conclude that moving the vehicle on the requested arc (j = 1) results in MBAsafe state and the procedure is terminated. Otherwise, state is not MBA nor BA safe. For system with n active missions (vehicles) algorithm complexity is O(e max n 2 ). It should be noted here that, if the procedure terminates for exactly j = 1, then state is BA (and MBA) - safe. Described procedure is formally given as Algorithm 2. Algorithm 2: MBA-SAFETY CHECK (r, e max ) using: BA-SAFETY CHECK if e max = 0 return(false) else for j = 1 to e max construct G j = (N g, A g ) %r moves forward for j arcs if G j G j 1 if BA-SAFETY CHECK (G j ) return (true) return (false) The scheduling policy is given in the following Theorem: Theorem 2: Let multi-agv system be in state S = (Σ, K) and let vehicle r requests arc a. The system is deadlock free if allocating a to r leads to a new state, S = (Σ, K ), S r S, which is MBA-safe. Proof: Initial state of the system is MBA-safe according to Corollary 1. Further, state can be changed only in to ways: if a new mission is assigned to vehicle, and if vehicle (upon request for arc allocation) advances to the next arc on path. New mission assignment results in MBA-safe state (Lemma 1). Let us assume that control policy is such that enables only those arc allocation requests that result in MBA-safe state. Under such policy, all reachable system states are MBA-safe. Since definition of MBA-state implies that system can always reach its final state, we conclude that under the given control policy system is deadlock free. IV. SIMULATION RESULTS The proposed multi-agv scheduling algorithm has been extensively tested on various layouts of factory floors. Here we present results obtained for the layout depicted in Fig. 5; a layout has 4 idle nodes, 8 workstations and 34 arcs. It replicates layout from a real plant for packing and warehousing palettes. Tests were done in the following way. A set of

6 Fig. 5: A case study layout predefined missions consisting of three to eight workstations for each vehicle was defined and executed in the same order for standard Banker s algorithm (BA), for Reveliotis variation of Banker s algorithm (RBA) [14] and for here described modified Banker s algorithm (MBA). For RBA, which determines vehicle s path dynamically, performance based policy was designed to prefer deadlock-free path with least traveling distance to next workstation on mission s path. Obtained results are shown in Table I. For each vehicle average traveled distance, average mission execution time and average vehicle waiting time in seconds have been calculated. TABLE I: CASE STUDY RESULTS Vh.1 Vh.2 Vh.3 Vh.4 Avg. BA traveling RBA distance [m] MBA Avg. miss. BA execution RBA time [s] MBA Avg. miss. BA waiting RBA time [s] MBA It can be seen that average travel distances for BA and MBA are the same (since both algorithms execute the shortest path) and lower than in RBA. Moreover, total traveling times for MBA system are lower than those for BA and RBA. In summary, obtained results show that MBA algorithm, when compared to other two, provides faster mission execution with least traveled distance, that is, least energy consumption. Since RBA algorithm allows a vehicle to chose an alternative (longer) path if the shortest one is not safe, RBA results with the lowest vehicle waiting time. Although results show clear advantages of MBA algorithm over RBA, finding mathematical framework that would allow exact comparison of these two methods for general system layout is still an open question. V. CONCLUSION A new scheduling algorithm for multi-agv systems has been proposed. Algorithm is based on Banker s algorithm, which is modified to allow unsafe system states under specific circumstances in order to decrease unnecessary vehicle waiting times and mission execution times. Algorithms for verification of system safety are based on graphs and are of polynomial complexity with respect to number of missions. Results obtained by simulation of four vehicles working in a factory layout demonstrate significant improvement of resource utilization compared with the other variations of Banker s algorithm for AGV systems. Currently, authors are working on the extension of proposed method to the systems with mission priorities. REFERENCES [1] A. J. Broadbent, C. B. Besant, S. K. Premi, and S. P. Walker, Free ranging AGV Systems: Promises, Problems and Pathways, Proc. of the 2nd Int l Conf. on Aut.Mat.Hand, pp , May 1985, Birmingham. [2] S. C. Daniels, Real-time Conflict Resolution in Automated Guided Vehicle Scheduling, Ph.D. thesis, 1988, Dept. of Industrial Eng., Penn. State University, USA. [3] G. Desaulniers, A. Langevin, and D. Riopel, Dispatching and conflictfree routing of automated guided vehicles: an exact approach, Int l J. of Flex. Man. Sys, vol. 15, Oct 2003, pp [4] R. H. Mhring, E. Khler, E. Gawrilow, and B. Stenzel, Conflict-free Real-time AGV Routing, Proc. of the of 3rd Int l C. on Applied Infrastructure Research, pp , October 2004, Berlin. [5] F. Taghaboni-Dutta, and J. M. A. Tanchoco, Comparison of Dynamic Routing Techniques for Automated Guided Vehicle Systems, Int l J. of Production Research, vol. 33, 1995, pp [6] T. Le-Anh and M.B.M. De Koster, A Review Of Design And Control Of Automated Guided Vehicle Systems, ERIM Report series research in management, ERS LIS, [7] L. Qiu, W.J. Hsu, S.Y. Huang, and H. Wang, Scheduling and routing algorithms for AGVs: a survey, Int l J. of Prod. Res., vol. 40, February 2002, pp [8] M. B. Duinkerken, M. van der Zee and Gabriel Lodewijks, Dynamic Free Range Routing for Automated Guided Vehicles, Proc of the 2006 IEEE Int l Conf on Net., Sensing and Control, [9] S. Berman and Y. Edan, Decentralized autonomous AGV system for material handling, Int l J. of Prod. Res., vol. 40, 15, pp , [10] D.G. Lindeijer, Controlling automated traffic agents, Ph.D. Dissertation, Tech. Uni of Delft, [11] M. P. Fanti, B. Turchianod, Deadlock Avoidance in Automated Guided Vehicle Systems, Proc of 2001 IEEE/ASME Int l Conf on Advanced Intelligent Mechatronics, Como, 2001, pp [12] D. Y. Lee, F. DiCesare, Integrated Scheduling of Flexible Manufacturing Systems Employing Automated Guided Vehicles, IEEE Trans. on Ind. Electr., Vol. 41, 6, 1994, pp [13] N. Q. Wu, M. C. Zhou, Shortest Routing of Bidirectional Automated Guided Vehicles Avoiding Deadlock and Blocking, IEEE/ASME Trans. on Mechatr., Vol. 12, 1, 2007, pp [14] S. A. Reveliotis, Conflict resolution in AGV systems, IIE Trans, vol.32, no. 7, 2000, pp [15] V.Bobanac, S.Bogdan, Routing and scheduling in Multi-AGV systems based on dynamic banker algorithm, Mediterranean Conference on Control and Automation, Ajaccio, [16] R. A. Wysk, N. S. Yang, and S. Joshi, Detection of deadlocks in flexible manufacturing cells, IEEE Trans. Robot. Autom., vol. 7, no. 6, 1991, pp [17] S. Bogdan, M. Puncec, Z. Kovacic, The shortest path determination in AGV systems by using string composition, CD-ROM Proceedings of ICIT03, Maribor, [18] S. A. Reveliotis, Real-time management of resource allocation systems, Springer s International Series, Vol 79., 2005 [19] A. Silberschatz, P.B. Galvin, G. Gagne, Operating System Concepts, Wiley Publishing,

Conflict-free Real-time AGV Routing

Conflict-free Real-time AGV Routing Conflict-free Real-time AGV Routing Rolf H. Möhring, Ekkehard Köhler, Ewgenij Gawrilow, and Björn Stenzel Technische Universität Berlin, Institut für Mathematik, MA 6-1, Straße des 17. Juni 136, 1623 Berlin,

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Deadlocks. Operating System Concepts - 7 th Edition, Feb 14, 2005

Deadlocks. Operating System Concepts - 7 th Edition, Feb 14, 2005 Deadlocks Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock 7.2 Silberschatz,

More information

The Application of Spline Functions and Bézier Curves to AGV Path Planning

The Application of Spline Functions and Bézier Curves to AGV Path Planning IEEE ISIE 2005, June 20-23, 2005, Dubrovnik, Croatia The Application of Spline Functions and Bézier Curves to AGV Path Planning K. Petrinec, Z. Kova i University of Zagreb / Faculty of Electrical Engineering

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Systemic Solutions to Deadlock in FMS

Systemic Solutions to Deadlock in FMS Systemic Solutions to Deadlock in FMS Xu gang, Wu zhi Ming Abstract In order to solve deadlock in FMS, an integrated design method for FMS is presented. This method is based on deadlock free scheduling,

More information

The Pennsylvania State University. The Graduate School SEARCH-BASED MAXIMALLY PERMISSIVE DEADLOCK AVOIDANCE IN FLEXIBLE MANUFACTURING CELLS

The Pennsylvania State University. The Graduate School SEARCH-BASED MAXIMALLY PERMISSIVE DEADLOCK AVOIDANCE IN FLEXIBLE MANUFACTURING CELLS The Pennsylvania State University The Graduate School Department of Industrial and Manufacturing Engineering SEARCH-BASED MAXIMALLY PERMISSIVE DEADLOCK AVOIDANCE IN FLEXIBLE MANUFACTURING CELLS A Thesis

More information

PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH

PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH Gašper Mušič (a) (a) University of Ljubljana Faculty of Electrical Engineering Tržaška 25, Ljubljana, Slovenia (a) gasper.music@fe.uni-lj.si

More information

UNIT-3 DEADLOCKS DEADLOCKS

UNIT-3 DEADLOCKS DEADLOCKS UNIT-3 DEADLOCKS Deadlocks: System Model - Deadlock Characterization - Methods for Handling Deadlocks - Deadlock Prevention. Deadlock Avoidance - Deadlock Detection - Recovery from Deadlock DEADLOCKS Definition:

More information

Concurrent & Distributed 7Systems Safety & Liveness. Uwe R. Zimmer - The Australian National University

Concurrent & Distributed 7Systems Safety & Liveness. Uwe R. Zimmer - The Australian National University Concurrent & Distributed 7Systems 2017 Safety & Liveness Uwe R. Zimmer - The Australian National University References for this chapter [ Ben2006 ] Ben-Ari, M Principles of Concurrent and Distributed Programming

More information

Determining Resource Needs of Autonomous Agents in Decoupled Plans

Determining Resource Needs of Autonomous Agents in Decoupled Plans Determining Resource Needs of Autonomous Agents in Decoupled Plans Jasper Oosterman a Remco Ravenhorst a Pim van Leeuwen b Cees Witteveen a a Delft University of Technology, Algorithmics group, Delft b

More information

APPROXIMATING A PARALLEL TASK SCHEDULE USING LONGEST PATH

APPROXIMATING A PARALLEL TASK SCHEDULE USING LONGEST PATH APPROXIMATING A PARALLEL TASK SCHEDULE USING LONGEST PATH Daniel Wespetal Computer Science Department University of Minnesota-Morris wesp0006@mrs.umn.edu Joel Nelson Computer Science Department University

More information

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition, Chapter 7: Deadlocks, Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance

More information

Chapter 7: Deadlocks. Chapter 7: Deadlocks. The Deadlock Problem. Chapter Objectives. System Model. Bridge Crossing Example

Chapter 7: Deadlocks. Chapter 7: Deadlocks. The Deadlock Problem. Chapter Objectives. System Model. Bridge Crossing Example Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance

More information

Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis

Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Wenle Zhang and Robert P. Judd School of Electrical Engineering and Computer Science Ohio University

More information

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition

Chapter 7: Deadlocks. Operating System Concepts 9 th Edition Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter 7: Deadlocks System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection

More information

Deadlock. A Bit More on Synchronization. The Deadlock Problem. Deadlock Characterization. Operating Systems 2/7/2005. CSC 256/456 - Spring

Deadlock. A Bit More on Synchronization. The Deadlock Problem. Deadlock Characterization. Operating Systems 2/7/2005. CSC 256/456 - Spring A Bit More on Synchronization Deadlock CS 256/456 Dept. of Computer Science, University of Rochester Synchronizing interrupt handlers: Interrupt handlers run at highest priority and they must not block.

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

MODELLING DEADLOCK AVOIDANCE IN AGV SYSTEMS VIA COLOURED PETRI NETS

MODELLING DEADLOCK AVOIDANCE IN AGV SYSTEMS VIA COLOURED PETRI NETS MODELLING DEADLOCK AVOIDANCE IN AGV SYSTEMS VIA COLOURED PETRI NETS Michal Žarnay 1, Ladislav Jančík 2, Petr Cenek 1 1 University of Žilina, Faculty of Management Science and Informatics 01008 Žilina,

More information

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition, Chapter 7: Deadlocks, Silberschatz, Galvin and Gagne 2009 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number

More information

Chapter 7 : 7: Deadlocks Silberschatz, Galvin and Gagne 2009 Operating System Concepts 8th Edition, Chapter 7: Deadlocks

Chapter 7 : 7: Deadlocks Silberschatz, Galvin and Gagne 2009 Operating System Concepts 8th Edition, Chapter 7: Deadlocks Chapter 7: Deadlocks, Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance

More information

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009!

Chapter 7: Deadlocks. Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009! Chapter 7: Deadlocks Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009! Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling

More information

Abstract Path Planning for Multiple Robots: An Empirical Study

Abstract Path Planning for Multiple Robots: An Empirical Study Abstract Path Planning for Multiple Robots: An Empirical Study Charles University in Prague Faculty of Mathematics and Physics Department of Theoretical Computer Science and Mathematical Logic Malostranské

More information

Chapter 6. Deadlocks

Chapter 6. Deadlocks Chapter 6 Deadlocks 6.. Resources 6.. Introduction to deadlocks 6.3. The ostrich algorithm 6.6. Deadlock prevention 6.4. Deadlock detection and recovery 6.5. Deadlock avoidance 6.7. Other issues Learning

More information

CS420: Operating Systems. Deadlocks & Deadlock Prevention

CS420: Operating Systems. Deadlocks & Deadlock Prevention Deadlocks & Deadlock Prevention James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts, 9th Edition by Silberschatz, Galvin, Gagne The Deadlock Problem

More information

Outlook. Deadlock Characterization Deadlock Prevention Deadlock Avoidance

Outlook. Deadlock Characterization Deadlock Prevention Deadlock Avoidance Deadlocks Outlook Deadlock Characterization Deadlock Prevention Deadlock Avoidance Deadlock Detection and Recovery e 2 Deadlock Characterization 3 Motivation System owns many resources of the types Memory,

More information

A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs

A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs Nicolas Lichiardopol Attila Pór Jean-Sébastien Sereni Abstract In 1981, Bermond and Thomassen conjectured that every digraph

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

OPERATING SYSTEMS. Prescribed Text Book. Operating System Principles, Seventh Edition. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne

OPERATING SYSTEMS. Prescribed Text Book. Operating System Principles, Seventh Edition. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne 1 DEADLOCKS In a multi programming environment, several processes

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

Chapter 7: Deadlocks. Operating System Concepts with Java 8 th Edition

Chapter 7: Deadlocks. Operating System Concepts with Java 8 th Edition Chapter 7: Deadlocks 7.1 Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

Operating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy

Operating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy Operating Systems Designed and Presented by Dr. Ayman Elshenawy Elsefy Dept. of Systems & Computer Eng.. AL-AZHAR University Website : eaymanelshenawy.wordpress.com Email : eaymanelshenawy@yahoo.com Reference

More information

Geometric Unique Set Cover on Unit Disks and Unit Squares

Geometric Unique Set Cover on Unit Disks and Unit Squares CCCG 2016, Vancouver, British Columbia, August 3 5, 2016 Geometric Unique Set Cover on Unit Disks and Unit Squares Saeed Mehrabi Abstract We study the Unique Set Cover problem on unit disks and unit squares.

More information

Introduction to Deadlocks

Introduction to Deadlocks Unit 5 Introduction to Deadlocks Structure 5.1 Introduction Objectives 5.2 System Model 5.3 Deadlock Characterization Necessary Conditions for Deadlock Resource-Allocation Graph. 5.4 Deadlock Handling

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

SIMULATION STUDY OF FLEXIBLE MANUFACTURING CELL BASED ON TOKEN-ORIENTED PETRI NET MODEL

SIMULATION STUDY OF FLEXIBLE MANUFACTURING CELL BASED ON TOKEN-ORIENTED PETRI NET MODEL ISSN 1726-4529 Int j simul model 15 (2016) 3, 566-576 Original scientific paper SIMULATION STUDY OF FLEXIBLE MANUFACTURING CELL BASED ON TOKEN-ORIENTED PETRI NET MODEL Nie, X. D. *,** ; Chen, X. D. **

More information

Star Decompositions of the Complete Split Graph

Star Decompositions of the Complete Split Graph University of Dayton ecommons Honors Theses University Honors Program 4-016 Star Decompositions of the Complete Split Graph Adam C. Volk Follow this and additional works at: https://ecommons.udayton.edu/uhp_theses

More information

Chapter 8: Deadlocks. The Deadlock Problem

Chapter 8: Deadlocks. The Deadlock Problem Chapter 8: Deadlocks System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock Combined Approach to Deadlock

More information

The Deadlock Problem

The Deadlock Problem Deadlocks The Deadlock Problem A set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set. Example System has 2 disk drives. P1 and P2 each

More information

Chapter 7: Deadlocks

Chapter 7: Deadlocks Chapter 7: Deadlocks Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from

More information

SOLVING DEADLOCK STATES IN MODEL OF RAILWAY STATION OPERATION USING COLOURED PETRI NETS

SOLVING DEADLOCK STATES IN MODEL OF RAILWAY STATION OPERATION USING COLOURED PETRI NETS SOLVING DEADLOCK STATES IN MODEL OF RAILWAY STATION OPERATION USING COLOURED PETRI NETS Michal Žarnay University of Žilina, Faculty of Management Science and Informatics, Address: Univerzitná 8215/1, Žilina,

More information

Fuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem

Fuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem Fuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem Bindu Student, JMIT Radaur binduaahuja@gmail.com Mrs. Pinki Tanwar Asstt. Prof, CSE, JMIT Radaur pinki.tanwar@gmail.com Abstract

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

Chordal Graphs: Theory and Algorithms

Chordal Graphs: Theory and Algorithms Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also

More information

Chapter 8: Deadlocks. Operating System Concepts with Java

Chapter 8: Deadlocks. Operating System Concepts with Java Chapter 8: Deadlocks System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock Combined Approach to Deadlock

More information

Fundamentals of Operating Systems (COMP355/L) A Student's Manual for Practice Exercises

Fundamentals of Operating Systems (COMP355/L) A Student's Manual for Practice Exercises Fundamentals of Operating Systems (COMP355/L) A Student's Manual for Practice Exercises Text Book: Operating System Concepts 9 th Edition Silberschatz, Galvin and Gagne 2013 1 Practice Exercises #1 Chapter

More information

The Deadlock Problem

The Deadlock Problem Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock The Deadlock

More information

1344 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 42, NO. 10, OCTOBER 1997

1344 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 42, NO. 10, OCTOBER 1997 1344 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 42, NO. 10, OCTOBER 1997 Polynomial-Complexity Deadlock Avoidance Policies for Sequential Resource Allocation Systems Spiridon A. Reveliotis, Member, IEEE,

More information

Recognizing Interval Bigraphs by Forbidden Patterns

Recognizing Interval Bigraphs by Forbidden Patterns Recognizing Interval Bigraphs by Forbidden Patterns Arash Rafiey Simon Fraser University, Vancouver, Canada, and Indiana State University, IN, USA arashr@sfu.ca, arash.rafiey@indstate.edu Abstract Let

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Efficient Prefix Computation on Faulty Hypercubes

Efficient Prefix Computation on Faulty Hypercubes JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

MODERN OPERATING SYSTEMS. Third Edition ANDREW S. TANENBAUM. Chapter 6 Deadlocks

MODERN OPERATING SYSTEMS. Third Edition ANDREW S. TANENBAUM. Chapter 6 Deadlocks MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 6 Deadlocks Preemptable and Nonpreemptable Resources Sequence of events required to use a resource: 1. Request the resource. 2. Use the

More information

Deadlock. Concepts to discuss. A System Model. Deadlock Characterization. Deadlock: Dining-Philosophers Example. Deadlock: Bridge Crossing Example

Deadlock. Concepts to discuss. A System Model. Deadlock Characterization. Deadlock: Dining-Philosophers Example. Deadlock: Bridge Crossing Example Concepts to discuss Deadlock CSCI 315 Operating Systems Design Department of Computer Science Deadlock Livelock Spinlock vs. Blocking Notice: The slides for this lecture have been largely based on those

More information

On the Max Coloring Problem

On the Max Coloring Problem On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive

More information

On Meaning Preservation of a Calculus of Records

On Meaning Preservation of a Calculus of Records On Meaning Preservation of a Calculus of Records Emily Christiansen and Elena Machkasova Computer Science Discipline University of Minnesota, Morris Morris, MN 56267 chri1101, elenam@morris.umn.edu Abstract

More information

INTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP*

INTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP* South Bohemia Mathematical Letters Volume 24, (2016), No. 1, 10-16. INTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP* PAVEL CHALMOVIANSKÝ abstrakt. We deal with application of intersection

More information

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers

Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers , October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,

More information

Generic Methodologies for Deadlock-Free Routing

Generic Methodologies for Deadlock-Free Routing Generic Methodologies for Deadlock-Free Routing Hyunmin Park Dharma P. Agrawal Department of Computer Engineering Electrical & Computer Engineering, Box 7911 Myongji University North Carolina State University

More information

Algorithmic Aspects of Acyclic Edge Colorings

Algorithmic Aspects of Acyclic Edge Colorings Algorithmic Aspects of Acyclic Edge Colorings Noga Alon Ayal Zaks Abstract A proper coloring of the edges of a graph G is called acyclic if there is no -colored cycle in G. The acyclic edge chromatic number

More information

Lecture 7 Deadlocks (chapter 7)

Lecture 7 Deadlocks (chapter 7) Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 7 Deadlocks (chapter 7) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The slides here are

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Principles of AI Planning. Principles of AI Planning. 7.1 How to obtain a heuristic. 7.2 Relaxed planning tasks. 7.1 How to obtain a heuristic

Principles of AI Planning. Principles of AI Planning. 7.1 How to obtain a heuristic. 7.2 Relaxed planning tasks. 7.1 How to obtain a heuristic Principles of AI Planning June 8th, 2010 7. Planning as search: relaxed planning tasks Principles of AI Planning 7. Planning as search: relaxed planning tasks Malte Helmert and Bernhard Nebel 7.1 How to

More information

MOST attention in the literature of network codes has

MOST attention in the literature of network codes has 3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces

More information

Operating Systems. Lecture 07: Resource allocation and Deadlock Management. Elvis C. Foster

Operating Systems. Lecture 07: Resource allocation and Deadlock Management. Elvis C. Foster Operating Systems Lecture 7: Resource allocation and Deadlock Management Lecture 3 started the discussion of process management, with the emphasis on CPU scheduling. This lecture continues that discussion

More information

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Deadlock. Chapter Objectives

Deadlock. Chapter Objectives Deadlock This chapter will discuss the following concepts: The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection

More information

EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m

EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m GARY MACGILLIVRAY BEN TREMBLAY Abstract. We consider homomorphisms and vertex colourings of m-edge-coloured graphs that have a switching operation

More information

! What is a deadlock? ! What causes a deadlock? ! How do you deal with (potential) deadlocks? Maria Hybinette, UGA

! What is a deadlock? ! What causes a deadlock? ! How do you deal with (potential) deadlocks? Maria Hybinette, UGA Chapter 8: Deadlock Questions? CSCI 4730 Operating Systems! What is a deadlock?! What causes a deadlock?! How do you deal with (potential) deadlocks? Deadlock Deadlock: What is a deadlock? Example: Two

More information

A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net

A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net 582 JOURNAL OF SOFTWARE, VOL. 9, NO. 3, MARCH 2014 A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net Qiaoli Zhuang School of Information Science and Technology,

More information

22 Elementary Graph Algorithms. There are two standard ways to represent a

22 Elementary Graph Algorithms. There are two standard ways to represent a VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph

More information

IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS

IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich ABSTRACT Institute of Automation and

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

3 SOLVING PROBLEMS BY SEARCHING

3 SOLVING PROBLEMS BY SEARCHING 48 3 SOLVING PROBLEMS BY SEARCHING A goal-based agent aims at solving problems by performing actions that lead to desirable states Let us first consider the uninformed situation in which the agent is not

More information

COP 4610: Introduction to Operating Systems (Spring 2016) Chapter 7 Deadlocks. Zhi Wang Florida State University

COP 4610: Introduction to Operating Systems (Spring 2016) Chapter 7 Deadlocks. Zhi Wang Florida State University COP 4610: Introduction to Operating Systems (Spring 2016) Chapter 7 Deadlocks Zhi Wang Florida State University Contents Deadlock problem System model Handling deadlocks deadlock prevention deadlock avoidance

More information

Chapter seven: Deadlock and Postponement

Chapter seven: Deadlock and Postponement Chapter seven: Deadlock and Postponement -One problem that arises in multiprogrammed systems is deadlock. A process or thread is in a state of deadlock if it is waiting for a particular event that will

More information

MANUFACTURING agility has emerged as an important

MANUFACTURING agility has emerged as an important 796 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 14, NO. 5, OCTOBER 1998 A Correct and Scalable Deadlock Avoidance Policy for Flexible Manufacturing Systems Mark A. Lawley, Spyros A. Reveliotis,

More information

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults

Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Seungjin Park Jong-Hoon Youn Bella Bose Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science

More information

CSE 417 Branch & Bound (pt 4) Branch & Bound

CSE 417 Branch & Bound (pt 4) Branch & Bound CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity

More information

DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS

DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS Asian Journal of Control, Vol. 9, No. 2, pp. 111-120, June 2007 111 DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS Wenle Zhang and Robert P. Judd ABSTRACT

More information

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Rada Chirkova Department of Computer Science, North Carolina State University Raleigh, NC 27695-7535 chirkova@csc.ncsu.edu Foto Afrati

More information

Reductions and Satisfiability

Reductions and Satisfiability Reductions and Satisfiability 1 Polynomial-Time Reductions reformulating problems reformulating a problem in polynomial time independent set and vertex cover reducing vertex cover to set cover 2 The Satisfiability

More information

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

Column Generation Method for an Agent Scheduling Problem

Column Generation Method for an Agent Scheduling Problem Column Generation Method for an Agent Scheduling Problem Balázs Dezső Alpár Jüttner Péter Kovács Dept. of Algorithms and Their Applications, and Dept. of Operations Research Eötvös Loránd University, Budapest,

More information

Runtime Monitoring of Multi-Agent Manufacturing Systems for Deadlock Detection Based on Models

Runtime Monitoring of Multi-Agent Manufacturing Systems for Deadlock Detection Based on Models 2009 21st IEEE International Conference on Tools with Artificial Intelligence Runtime Monitoring of Multi-Agent Manufacturing Systems for Deadlock Detection Based on Models Nariman Mani, Vahid Garousi,

More information

More on Synchronization and Deadlock

More on Synchronization and Deadlock Examples of OS Kernel Synchronization More on Synchronization and Deadlock Two processes making system calls to read/write on the same file, leading to possible race condition on the file system data structures

More information

Figure 2.1: A bipartite graph.

Figure 2.1: A bipartite graph. Matching problems The dance-class problem. A group of boys and girls, with just as many boys as girls, want to dance together; hence, they have to be matched in couples. Each boy prefers to dance with

More information

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults

Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Jong-Hoon Youn Bella Bose Seungjin Park Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Oregon State University

More information

Fig Bridge crossing - deadlock

Fig Bridge crossing - deadlock e-pg Pathshala Subject: Computer Science Paper: Operating Systems Module 16: Deadlocks Introduction Module No: CS/OS/16 Quadrant 1 e-text 16.1 Introduction Any system has many processes and a number of

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

Implementation of Process Networks in Java

Implementation of Process Networks in Java Implementation of Process Networks in Java Richard S, Stevens 1, Marlene Wan, Peggy Laramie, Thomas M. Parks, Edward A. Lee DRAFT: 10 July 1997 Abstract A process network, as described by G. Kahn, is a

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information

Context-Aware Route Planning

Context-Aware Route Planning Context-Aware Route Planning Adriaan W. ter Mors, Cees Witteveen, Jonne Zutt, and Fernando A. Kuipers Delft University of Technology, The Netherlands Abstract. In context-aware route planning, there is

More information

Eulerian disjoint paths problem in grid graphs is NP-complete

Eulerian disjoint paths problem in grid graphs is NP-complete Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information

More information