Modified Banker s algorithm for scheduling in multi-agv systems
|
|
- Marilynn Lang
- 5 years ago
- Views:
Transcription
1 2011 IEEE International Conference on Automation Science and Engineering Trieste, Italy - August 24-27, 2011 ThC3.1 Modified Banker s algorithm for scheduling in multi-agv systems Luka Kalinovcic, Tamara Petrovic, Stjepan Bogdan, Vedran Bobanac Abstract In today s highly complex multi-agv systems key research objective is finding a scheduling and routing policy that avoids deadlock while assuring that vehicle utilization is as high as possible. It is well known that finding such an optimal policy is a NP-hard task in general case. Therefore, big part of the research is oriented towards finding various suboptimal policies that can be applied to real world plants. In this paper we propose modified Banker s algorithm for scheduling in multi-agv systems. A predetermined mission s path is executed in a way that some non-safe states are allowed in order to achieve better utilization of vehicles. A graph-based method of polynomial complexity for verification of these states is given. Algorithm is tested on a layout of a real plant for packing and warehousing palettes. Results shown at the of the paper demonstrate advantages of the proposed method compared with other methods based on Banker s algorithm. I. INTRODUCTION Introduction of automated guided vehicles (AGVs) into automated materials handling systems, flexible manufacturing systems and containers handling systems has brought many notable advantages, but it also requires the use of effective on-line supervisory control strategies able to solve potential problems that arise in such a multi-agv system layout. Control of AGVs includes mission assignment, routing and scheduling and it can be performed either on-line or off-line. Off-line planning requires the knowledge of all tasks prior to execution of an control algorithm, while on-line (sometimes referred to as dynamic) planning allows new tasks to appear although the planning has been already done. AGV routing is focused on the spatial dimension of the problem, that is, determination of paths in the space domain, while scheduling provides deadlock free execution of the path. Which strategy will be used deps on various elements. For example, missions can be assigned to AGVs according to given priority. The notion of preemption is another issue that should be considered; once a mission is assigned to an AGV, question is whether it can be interrupted before it is finished. Also, positioning of idle AGVs, in most cases ignored by the researchers, in practice plays a very important role. Various methods for AGV routing and scheduling are currently in use [1-4], but new methods which employ faster and computationally more efficient algorithms are still the subject of intensive research. Very good reviews of the field can be L. Kalinovcic, T. Petrovic and S. Bogdan are with the Laboratory for Robotics and Intelligent Control Systems, Department of Control and Computer Engineering, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia stjepan.bogdan@fer.hr, tamara.petrovic@fer.hr V. Bobanac is with the Laboratory for Renewable Energy Sources, Department of Control and Computer Engineering, Faculty of Electrical Engineering and Computing, University of Zagreb, Zagreb, Croatia vedran.bobanac@fer.hr found in [5, 6, 7]. Many modern AGVs are free-ranging, i.e. instead of using a predefined path, the layout vehicles can travel with no restrictions as long as the collisions with other vehicles and obstacles are avoided. Usually such approach is based on heuristic-behavior and fuzzy algorithms [8, 9, 10]. However, due to very restrictive security issues, traditional centralized decision-making structures still dominate in the industrial implementations. In [11] authors propose a deadlock resolution by using a technique frequently adopted for vehicle management in AGV systems, so called the zone control. Authors allow the route of an AGV to change dynamically, as long as any path assigned to a vehicle s in the docking station. The control algorithm performs a simple one-step look-ahead policy to check if the configuration resulting from the vehicle movement corresponds to a deadlock situation or not. In [12] two types of AGVs are modeled by Petri nets; centralized - an AGV is exclusively assigned to a job until the job is completed, and decentralized - an AGV is shared by multiple jobs. In [13] authors use Colored Resource - Oriented Petri nets for the lower level logical control in an AGV system. There proposed method achieved better results on the typical case study system compared to others that are currently in use. However, its application is in general case of exponential complexity. A different approach to routing and scheduling is used in [14]. Author models the system as a Resource Allocation system (RAS) and uses a scheduling policy that is based on standard Banker s algorithm. Deadlocks are efficiently avoided, while AGVs move on paths that are not priory fixed (as long as the scheduling policy allows it). Property of such a system, which is direct consequence of the applied Banker s algorithm, is that at any allowed state there must exist an ordering of vehicles (missions) that guarantees sequential, one vehicle at a time, termination of all active missions. Main drawback is unavailability to resolve some potential livelocks. The objective of our work was to develop a scheduling algorithm that would, when compared to previous algorithms, provide an increase in vehicle utilization. The proposed modified Banker s algorithm does that by exting the set of states that system is allowed to achieve, while traveling the shortest fixed distance and ensuring that all missions can be safely executed. It is important to emphasize that the method is of low computational complexity and very simple to implement in real-world plants. Work described here is an extension of research presented in [15]. The paper is organized in the following way. First, we define key terms used throughout the paper. Then, a thorough /11/$ IEEE 351
2 description of scheduling policy based on the modified Banker s algorithm for AGV systems is given together with formal proofs of system stability. The proposed policy is tested by simulation and compared to other strategies based on Banker s algorithm. Results are presented at the of the paper. II. A MULTI-AGV PLANT LAYOUT REPRESENTATION Usually, when it comes to the mathematical analysis and the design of supervisory control algorithm, a layout of a considered multi-agv plant can be represented by a graph whose intersections and s of paths are referred to as graph nodes, while paths themselves are represented by arcs. Let us use for this purpose an undirected graph H = (N, A), which contains a set of nodes, N = {n 1, n 2,..., n p } and a set of arcs, A = {a 1, a 2,..., a q }. Three different types of nodes are present in the system: idle nodes (battery charging) I i, workstation nodes (palletization cell, manufacturing cell, warehouse drop off) W i, and crossroads nodes C i. Set of available vehicles is denoted as R. We make the following assumptions: 1) a vehicle can reside only on arcs, 2) only one vehicle at the time is allowed to occupy an arc (if paths are lengthy or wide, they can be segmented into a set of arcs), 3) each vehicle has its idle node, 4) vehicles are not allowed to drive backwards nor make U-turns, except on workstation positioning arcs. In the proposed approach a mission, starting and ing on an idle positioning arc (an arc with dead- in idle node), is executed by a vehicle that visits workstation nodes in particular given order, I i W k W l... I i. Once mission is finished, the vehicle resides on the idle positioning arc, waiting for a new mission assignment. Hence, mission m i is defined as m i = (σ r, r), where σ r is a mission path, and r R is a vehicle assigned to mission m i. A path σ r = a p a q a s... a p of length σ r, is defined as a sequence of arcs that connect visited nodes, with σ r (j) representing j-th arc of σ r. For each vehicle r we define its arc index k r such that k r = i means that r occupies i-th arc of σ r. For example, in system depicted in Fig. 1 [14], we can define mission m 1 = (σ 2, 2) as I 2 W 2 W 1 I 2. The mission is executed by vehicle 2 with σ 2 = and σ 2 (6) = 13. In case vehicle is positioned on arc 13 for the second time, we have k 2 = 6. A set of active paths, Σ = {σ 1, σ 2,..., σ l }, is defined as the set of all paths currently assigned to missions, and set K = {k 1, k 2,..., k l }, is defined as the set of all arcs indexes. Thus, the state of the system is uniquely defined with the set of active paths and the set of occupied arcs, S = (Σ, K). The state of the system S 0 = (Σ, K) is called initial if k r K : k r = 1. For the final state of the system, S F = (Σ, K), one has k r K : k r = σ r. Fig. 1: An example of muli-agv system Definition 1: (allowed state) State S = (Σ, K) is allowed if p, q R, p q : σ p (k p ) σ q (k q ). In other words, state S is allowed if each vehicle resides on a different arc. It should be noted that by definitions the initial S 0 and the final S F states are allowed. Following definitions describe how the system state can be changed. Definition 2: (state change by vehicle movement) Let S = (Σ, K) and S = (Σ, K ) be two states and let there exists r such that { 1 r R, k i ki, i r = k i + 1, i = r then we say that state S is changed to state S movement of vehicle r, denoted as S r S. Definition 3: (state change by new mission assignment) Let S = (Σ, K) and S = (Σ, K ) be two states and let there exists r such that { 1 r R, k r = σ r, k i ki, i r = 1, i = r i r : σ i = σ i then we say that state S is changed to state S by new mission assignment to vehicle r, denoted as S r S. Now we can define properties of the system states. Definition 4: (deadlock state) State S = (Σ, K) is deadlock state if there is no vehicle r such that S r S and S = (Σ, K ) is allowed state. Evidently, no allowed movements of vehicles are possible once system gets in deadlock state. As a consequence, missions cannot be completed and system is not able to reach final state. Definition 5: (safe state) State S = (Σ, K) is safe state if there exists a sequence of vehicles movements, r 1 r 2... r M, such that S r 1 S r 2 S... r M S F. by 352
3 In other words, state is safe if there is at least one scenario of vehicle moves such that all active missions can be successfully completed. Except for safe and deadlock states there is a third, remaining group of states from which system is inevitably going to up in deadlock, regardless of the control policy. These states are commonly referred to as higher level deadlocks [11]. III. SCHEDULING IN MULTI-AGV SYSTEM Prior to execution of scheduling policy, routing algorithm has to assign a path to each newly requested mission. Usually the shortest distance path is assigned to the mission, although, sometimes the shortest distance does not necessarily mean the shortest traveling time as on some parts of the floor shop vehicles are required to travel very slow due to curves or security reasons. There are many known methods for calculation of paths of the graph representing the system layout [16,17]. Some approaches allow the path to change dynamically [14]. As the routing in multi-agv systems is out of the scope of this paper, in a case study presented at the of the paper set Σ is comprised of predetermined shortest distance paths. A problem of scheduling in multi-agv system that we are interested to solve is formalized as follows: having defined initial state of the system S 0 = (Σ, K) and final state of the system S F = (Σ, K) find a scheduling algorithm such that transition from S 0 to S F is free of deadlock states. There exists a trivial solution to this problem; a scheduling algorithm which executes one mission at a time, i.e. one vehicle is moving while all other vehicles remain in their idle positioning arcs. Once the first vehicle finishes its mission second mission is started and so on. Clearly, performance of such an algorithm, in sense of vehicle utilization, is very poor. However, direct consequence of this algorithm is the following corollary. Corollary 1: The initial state S 0 = (Σ, K) is safe. According to Definition 3. state transition can be initiated by a new mission assignment. As the proposed method allows dynamic assignment of mission (once a vehicle is positioned on idle positioning arc), in the next lemma we show that such action does not influence state safety. Lemma 1: Let S = (Σ, K) is a safe state and let S = (Σ, K ) is such that S r S. Then S is a safe state. Lemma 1 is important as it states that under any scheduling policy new mission assignment does not influence the system stability as long as each vehicle has its idle node. System in safe state shall remain in safe state upon new mission assignment. Conclusion that can be drawn from Corollary 1 and Lemma 1 is that system can up in a deadlock state only by vehicle movement. Hence, each time a vehicle request allocation of next arc on its mission s path, scheduling policy should allow it if and only if the resulting state is safe. Fig. 2: An example However, in the general case, detection of state safety is NP-complete problem [18]. Therefore, minimally restrictive control policy, where only deadlock and higher level deadlock states are forbidden and only safe permitted, is computationally intractable and inapplicable in real world. On the price of sacrificing optimality, today s scheduling algorithms allow only those safe states that can be verified in polynomial time. One of such commonly used scheduling algorithms is standard Banker s algorithm, which is described in the following paragraph. In the remainder of the paper term Banker s algorithm will be used instead of standard Banker s algorithm. A. Banker s algorithm in multi-agv systems First thing in defining Banker s algorithm is to identify system resources and processes, which use a certain number of resources. In multi-agv systems one associates resources with arcs and processes with missions (vehicles). In such scenario a vehicle, that executes particular mission, requests allocation of next arc on its path, solely if that arc is not occupied by some other vehicle. Banker s algorithm then checks if this allocation will allow all vehicles to finish their missions in a sequential manner, one by one. If the new state is proved to be safe, requested arc shall be granted to the vehicle and vehicle continues with execution of the assigned mission. In case state is not proved to be safe, movement will be forbidden. Let us examine a system shown in Fig. 2 There are 4 vehicles, 6 workstation nodes and 4 idle position nodes. Layout comprises 24 arcs (it should be noted that numbers in Fig. 2 represent arcs IDs, not weights). Vehicles 1, 3 and 4 are returning to their idle positioning arcs, while vehicle 2 is moving towards workstation W 1 and then back to its idle node I 2. Vehicle 1, as the vehicle that is closest to an intersection, requests arc 13. Using Banker s algorithm we will check the safety of that consequent state, with vehicle 1 positioned on arc 13. Formally, we first define all resources that a particular process already holds (allocates). For system in Fig.2 vehicle 1 holds arc 13, vehicle 2 holds arc 15, vehicle 3 holds arc 8 and vehicle 4 holds arc 17. Further, we define resources 353
4 needed by processes to be finished. Let us suppose that vehicles are using shortest paths, then vehicle 1 needs arcs 1, 5, 15,vehicle 2 arcs 2, 5, 7, 15, vehicle 3 arcs 3, 6, 8, 14, 17 and vehicle 4 needs arcs 4, 6. The outcome of Banker s algorithm, is a sequence describing order in which missions can be carried out, one by one. That sequence is not necessary unique. In our case sequences are, for example (m i here denotes mission of vehicle i), m 2 m 1 m 4 m 3 and m 4 m 2 m 1 m 3, hence, current state is safe. For example, m 1 m 2 m 4 m 3 is not a valid sequence for Banker s algorithm since mission m 1, that is first in the sequence, cannot be finished with no movement of other vehicles in the system (vehicle 2 in particular). Here should be noted that vehicles are not going to necessarily execute missions as given in the output sequence. From the scheduling point of the view it is only important to know that such an option exist. In the remainder of the paper this kind of missions sequence will be called BA-sequence and the associated state BA-safe state (in the literature these states are sometimes referred to as ordered [14]). Formal procedure for determination of system BA-safety is as follows. First, one has to form directed wait-for graph [19]: G = (N g, A g ), N g = {n 1, n 2,..., n n }, and a ij = (n i, n j ) A g iff vehicle j occupies an arc that is on the path needed by vehicle i to finish its mission. As an example of graph formation let us consider situation depicted in Fig. 2. Vehicle 2 occupies arc 15 which is part of the path required for vehicle 1 to complete its mission, hence, in the graph there is an edge from node n 1 to node n 2. Vehicle 4 occupies arc 17. Since this arc belongs to the path executed by vehicle 3, there is an edge from node n 3 to node n 4. Vehicles 2 and 4 have open paths and as such they have no output arcs. Fig. 3: Wait-for graph for system in Fig. 2 If a node has no output arcs, its outdegree is equal to zero. That means that its mission path is not occupied by any other vehicle and the vehicle corresponding to the node can advance to its final arc. The correlation between wait-for graph of state S and its BA-safety is given as: Theorem 1: State S = (Σ, K) is BA-safe if and only if wait-for graph G = (N g, A g ) is acyclic. Proof : Proof of biconditional (P Q) is split into two stages: i)(q P ): If G is acyclic, then state S is BA-safe. Let us assume that graph G is acyclic. Since every acyclic directed graph has at least one node with outdegree zero, the vehicle corresponding to that node can safely finish its mission with no movement of other vehicles. Hence, its node can be removed from the graph. The graph remains acyclic, still having at least one node with outdegree zero. If we continue with this procedure, all nodes will be removed. These nodes, in the exact order of their removal, form a BA sequence, that is, S is BA-safe. ii)( Q P ): If G has at least one cycle, then state S is not BA-safe. Let us assume that graph G contains a cycle of nodes: n 1 n 2... n k n 1. None of the nodes belonging to that cycle has outdegree equal to zero. That means none of vehicles that correspond to the cycle nodes will be able to finish their missions with no movement of other vehicles in the system, that is, BA-sequence cannot be formed. In the text that follows we define an algorithm for checking of BA-safety based on Theorem 1. Algorithm sequentially removes nodes with outdegree zero from wait-for graph. Algorithm terminates either if all nodes have been removed (state is BA-safe) or if there are no nodes with outdegree zero (graph has a cycle and state is not BA-safe). For graph G with n nodes algorithm complexity is O(n 2 ). Algorithm 1: BA-SAFETY CHECK (G = (N g, A g)) output; % state is BA-safe while ( n i N g : outdegree(n i ) = 0) N g = N g\n i if N g = output := true else output := false B. Modified banker s algorithm in multi-agv systems In general, set of BA-safe states is a subset of a wider set of safe states that can eventually reach final state. Scheduling policy that allows for system to be only in a BA-safe state often results in low vehicle utilization and long vehicle waiting times. For example, let us examine the situation depicted in Fig. 4. Vehicle 1 has just visited workstation W 3 and it is returning to idle node I 1 by using arcs 14, 13, 15, 5 and 1. In the same time vehicle 2 has a mission m 2 (visit workstations W 1 and W 3 ) such that σ 2 = {2, 5, 15, 7, 13, 14, 9, 14, 13, 15, 5, 2}. In its current position vehicle 2 requests arc 5. It can be shown, by execution of Banker s algorithm, that a new state obtained by allocation of arc 5 to vehicle 2 is not BA-safe since vehicle 1 cannot finish its mission. Arc 5 is allocated by vehicle 2, and vehicle 2 is not able to proceed due to allocation of arc 14 by vehicle 1 - deadlock. Hence, Banker s algorithm would prevent vehicle 2 to proceed to arc 5. Let us, nevertheless, continue to observe what happens if vehicle 2 proceeds to arc 5 and then requests allocation of arc 15. As with the previous arc, result is not BA-safe state. We continue with the previous reasoning and now vehicle 2 requests arc 354
5 Fig. 4: An example of temporarily BA-unsafe state 7 which is next on the path. This time state of the system is BA-safe. We can summarize described scenario as follows: although allocation of arc 5 to vehicle 2 leads system to temporarily BA-unsafe state, since there exist free pathway from arc 5 to arc 7 and since the system is BA-safe when vehicle 2 resides on arc 7, granting of arc 5 to vehicle 2 is allowed and would not cause the system deadlock. Let us denote this kind of temporarily BA-unsafe state as Modified Banker s safe state. Formal definitions are given as follows: Definition 6: (Modified Banker s (MBA) sequence) Sequence r 1 r 2... r M is called MBA sequence if there exist k, 1 k M such that: i) (i, j), 1 i < j k : r i = r j and ii) (i, j), k < i < j M : r i = r j r i = r i+1 =... = r j For example, sequence is MBA sequence (k = 2), while is not (k = 2, property ii) does not hold for i = 3 and j = 7). Definition 7: State S = (Σ, K) is MBA-safe state if there exists MBA sequence r 1 r 2... r M, such that S r 1 S r 2 S... r M S F. In other words, state S is MBA-safe if by moving of a single vehicle on its path, system can reach BA-safe state and thus can reach final state. Proposition 1: Every BA-safe state is also a MBA-safe state. Algorithm for checking of MBA-safety uses previously defined wait-for graph and Algorithm 1, with certain modifications. Let us assume that vehicle r requests allocation of next arc on its mission s path. First, we associate to vehicle r an integer value that is equal to the maximum number of arcs that r can transverse on its path without being intercepted by any other vehicle. Let us denote this value as e max. For system in Fig. 4, when vehicle 2 requests arc 5, e max = 4, since vehicle 2 can move freely along arcs 5, 15, 7 and 13. Further, for each j-th position of the vehicle, 1 j e max, we construct wait-for graph and using Algorithm 1 check whether that particular state is BA-safe. If during this process BA-safe state is reached, we conclude that moving the vehicle on the requested arc (j = 1) results in MBAsafe state and the procedure is terminated. Otherwise, state is not MBA nor BA safe. For system with n active missions (vehicles) algorithm complexity is O(e max n 2 ). It should be noted here that, if the procedure terminates for exactly j = 1, then state is BA (and MBA) - safe. Described procedure is formally given as Algorithm 2. Algorithm 2: MBA-SAFETY CHECK (r, e max ) using: BA-SAFETY CHECK if e max = 0 return(false) else for j = 1 to e max construct G j = (N g, A g ) %r moves forward for j arcs if G j G j 1 if BA-SAFETY CHECK (G j ) return (true) return (false) The scheduling policy is given in the following Theorem: Theorem 2: Let multi-agv system be in state S = (Σ, K) and let vehicle r requests arc a. The system is deadlock free if allocating a to r leads to a new state, S = (Σ, K ), S r S, which is MBA-safe. Proof: Initial state of the system is MBA-safe according to Corollary 1. Further, state can be changed only in to ways: if a new mission is assigned to vehicle, and if vehicle (upon request for arc allocation) advances to the next arc on path. New mission assignment results in MBA-safe state (Lemma 1). Let us assume that control policy is such that enables only those arc allocation requests that result in MBA-safe state. Under such policy, all reachable system states are MBA-safe. Since definition of MBA-state implies that system can always reach its final state, we conclude that under the given control policy system is deadlock free. IV. SIMULATION RESULTS The proposed multi-agv scheduling algorithm has been extensively tested on various layouts of factory floors. Here we present results obtained for the layout depicted in Fig. 5; a layout has 4 idle nodes, 8 workstations and 34 arcs. It replicates layout from a real plant for packing and warehousing palettes. Tests were done in the following way. A set of
6 Fig. 5: A case study layout predefined missions consisting of three to eight workstations for each vehicle was defined and executed in the same order for standard Banker s algorithm (BA), for Reveliotis variation of Banker s algorithm (RBA) [14] and for here described modified Banker s algorithm (MBA). For RBA, which determines vehicle s path dynamically, performance based policy was designed to prefer deadlock-free path with least traveling distance to next workstation on mission s path. Obtained results are shown in Table I. For each vehicle average traveled distance, average mission execution time and average vehicle waiting time in seconds have been calculated. TABLE I: CASE STUDY RESULTS Vh.1 Vh.2 Vh.3 Vh.4 Avg. BA traveling RBA distance [m] MBA Avg. miss. BA execution RBA time [s] MBA Avg. miss. BA waiting RBA time [s] MBA It can be seen that average travel distances for BA and MBA are the same (since both algorithms execute the shortest path) and lower than in RBA. Moreover, total traveling times for MBA system are lower than those for BA and RBA. In summary, obtained results show that MBA algorithm, when compared to other two, provides faster mission execution with least traveled distance, that is, least energy consumption. Since RBA algorithm allows a vehicle to chose an alternative (longer) path if the shortest one is not safe, RBA results with the lowest vehicle waiting time. Although results show clear advantages of MBA algorithm over RBA, finding mathematical framework that would allow exact comparison of these two methods for general system layout is still an open question. V. CONCLUSION A new scheduling algorithm for multi-agv systems has been proposed. Algorithm is based on Banker s algorithm, which is modified to allow unsafe system states under specific circumstances in order to decrease unnecessary vehicle waiting times and mission execution times. Algorithms for verification of system safety are based on graphs and are of polynomial complexity with respect to number of missions. Results obtained by simulation of four vehicles working in a factory layout demonstrate significant improvement of resource utilization compared with the other variations of Banker s algorithm for AGV systems. Currently, authors are working on the extension of proposed method to the systems with mission priorities. REFERENCES [1] A. J. Broadbent, C. B. Besant, S. K. Premi, and S. P. Walker, Free ranging AGV Systems: Promises, Problems and Pathways, Proc. of the 2nd Int l Conf. on Aut.Mat.Hand, pp , May 1985, Birmingham. [2] S. C. Daniels, Real-time Conflict Resolution in Automated Guided Vehicle Scheduling, Ph.D. thesis, 1988, Dept. of Industrial Eng., Penn. State University, USA. [3] G. Desaulniers, A. Langevin, and D. Riopel, Dispatching and conflictfree routing of automated guided vehicles: an exact approach, Int l J. of Flex. Man. Sys, vol. 15, Oct 2003, pp [4] R. H. Mhring, E. Khler, E. Gawrilow, and B. Stenzel, Conflict-free Real-time AGV Routing, Proc. of the of 3rd Int l C. on Applied Infrastructure Research, pp , October 2004, Berlin. [5] F. Taghaboni-Dutta, and J. M. A. Tanchoco, Comparison of Dynamic Routing Techniques for Automated Guided Vehicle Systems, Int l J. of Production Research, vol. 33, 1995, pp [6] T. Le-Anh and M.B.M. De Koster, A Review Of Design And Control Of Automated Guided Vehicle Systems, ERIM Report series research in management, ERS LIS, [7] L. Qiu, W.J. Hsu, S.Y. Huang, and H. Wang, Scheduling and routing algorithms for AGVs: a survey, Int l J. of Prod. Res., vol. 40, February 2002, pp [8] M. B. Duinkerken, M. van der Zee and Gabriel Lodewijks, Dynamic Free Range Routing for Automated Guided Vehicles, Proc of the 2006 IEEE Int l Conf on Net., Sensing and Control, [9] S. Berman and Y. Edan, Decentralized autonomous AGV system for material handling, Int l J. of Prod. Res., vol. 40, 15, pp , [10] D.G. Lindeijer, Controlling automated traffic agents, Ph.D. Dissertation, Tech. Uni of Delft, [11] M. P. Fanti, B. Turchianod, Deadlock Avoidance in Automated Guided Vehicle Systems, Proc of 2001 IEEE/ASME Int l Conf on Advanced Intelligent Mechatronics, Como, 2001, pp [12] D. Y. Lee, F. DiCesare, Integrated Scheduling of Flexible Manufacturing Systems Employing Automated Guided Vehicles, IEEE Trans. on Ind. Electr., Vol. 41, 6, 1994, pp [13] N. Q. Wu, M. C. Zhou, Shortest Routing of Bidirectional Automated Guided Vehicles Avoiding Deadlock and Blocking, IEEE/ASME Trans. on Mechatr., Vol. 12, 1, 2007, pp [14] S. A. Reveliotis, Conflict resolution in AGV systems, IIE Trans, vol.32, no. 7, 2000, pp [15] V.Bobanac, S.Bogdan, Routing and scheduling in Multi-AGV systems based on dynamic banker algorithm, Mediterranean Conference on Control and Automation, Ajaccio, [16] R. A. Wysk, N. S. Yang, and S. Joshi, Detection of deadlocks in flexible manufacturing cells, IEEE Trans. Robot. Autom., vol. 7, no. 6, 1991, pp [17] S. Bogdan, M. Puncec, Z. Kovacic, The shortest path determination in AGV systems by using string composition, CD-ROM Proceedings of ICIT03, Maribor, [18] S. A. Reveliotis, Real-time management of resource allocation systems, Springer s International Series, Vol 79., 2005 [19] A. Silberschatz, P.B. Galvin, G. Gagne, Operating System Concepts, Wiley Publishing,
Conflict-free Real-time AGV Routing
Conflict-free Real-time AGV Routing Rolf H. Möhring, Ekkehard Köhler, Ewgenij Gawrilow, and Björn Stenzel Technische Universität Berlin, Institut für Mathematik, MA 6-1, Straße des 17. Juni 136, 1623 Berlin,
More informationJoint Entity Resolution
Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationDeadlocks. Operating System Concepts - 7 th Edition, Feb 14, 2005
Deadlocks Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock 7.2 Silberschatz,
More informationThe Application of Spline Functions and Bézier Curves to AGV Path Planning
IEEE ISIE 2005, June 20-23, 2005, Dubrovnik, Croatia The Application of Spline Functions and Bézier Curves to AGV Path Planning K. Petrinec, Z. Kova i University of Zagreb / Faculty of Electrical Engineering
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationSystemic Solutions to Deadlock in FMS
Systemic Solutions to Deadlock in FMS Xu gang, Wu zhi Ming Abstract In order to solve deadlock in FMS, an integrated design method for FMS is presented. This method is based on deadlock free scheduling,
More informationThe Pennsylvania State University. The Graduate School SEARCH-BASED MAXIMALLY PERMISSIVE DEADLOCK AVOIDANCE IN FLEXIBLE MANUFACTURING CELLS
The Pennsylvania State University The Graduate School Department of Industrial and Manufacturing Engineering SEARCH-BASED MAXIMALLY PERMISSIVE DEADLOCK AVOIDANCE IN FLEXIBLE MANUFACTURING CELLS A Thesis
More informationPETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH
PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH Gašper Mušič (a) (a) University of Ljubljana Faculty of Electrical Engineering Tržaška 25, Ljubljana, Slovenia (a) gasper.music@fe.uni-lj.si
More informationUNIT-3 DEADLOCKS DEADLOCKS
UNIT-3 DEADLOCKS Deadlocks: System Model - Deadlock Characterization - Methods for Handling Deadlocks - Deadlock Prevention. Deadlock Avoidance - Deadlock Detection - Recovery from Deadlock DEADLOCKS Definition:
More informationConcurrent & Distributed 7Systems Safety & Liveness. Uwe R. Zimmer - The Australian National University
Concurrent & Distributed 7Systems 2017 Safety & Liveness Uwe R. Zimmer - The Australian National University References for this chapter [ Ben2006 ] Ben-Ari, M Principles of Concurrent and Distributed Programming
More informationDetermining Resource Needs of Autonomous Agents in Decoupled Plans
Determining Resource Needs of Autonomous Agents in Decoupled Plans Jasper Oosterman a Remco Ravenhorst a Pim van Leeuwen b Cees Witteveen a a Delft University of Technology, Algorithmics group, Delft b
More informationAPPROXIMATING A PARALLEL TASK SCHEDULE USING LONGEST PATH
APPROXIMATING A PARALLEL TASK SCHEDULE USING LONGEST PATH Daniel Wespetal Computer Science Department University of Minnesota-Morris wesp0006@mrs.umn.edu Joel Nelson Computer Science Department University
More informationChapter 7: Deadlocks. Operating System Concepts 8 th Edition,
Chapter 7: Deadlocks, Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance
More informationChapter 7: Deadlocks. Chapter 7: Deadlocks. The Deadlock Problem. Chapter Objectives. System Model. Bridge Crossing Example
Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance
More informationDeadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis
Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Wenle Zhang and Robert P. Judd School of Electrical Engineering and Computer Science Ohio University
More informationChapter 7: Deadlocks. Operating System Concepts 9 th Edition
Chapter 7: Deadlocks Silberschatz, Galvin and Gagne 2013 Chapter 7: Deadlocks System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection
More informationDeadlock. A Bit More on Synchronization. The Deadlock Problem. Deadlock Characterization. Operating Systems 2/7/2005. CSC 256/456 - Spring
A Bit More on Synchronization Deadlock CS 256/456 Dept. of Computer Science, University of Rochester Synchronizing interrupt handlers: Interrupt handlers run at highest priority and they must not block.
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationMODELLING DEADLOCK AVOIDANCE IN AGV SYSTEMS VIA COLOURED PETRI NETS
MODELLING DEADLOCK AVOIDANCE IN AGV SYSTEMS VIA COLOURED PETRI NETS Michal Žarnay 1, Ladislav Jančík 2, Petr Cenek 1 1 University of Žilina, Faculty of Management Science and Informatics 01008 Žilina,
More informationChapter 7: Deadlocks. Operating System Concepts 8 th Edition,
Chapter 7: Deadlocks, Silberschatz, Galvin and Gagne 2009 Chapter Objectives To develop a description of deadlocks, which prevent sets of concurrent processes from completing their tasks To present a number
More informationChapter 7 : 7: Deadlocks Silberschatz, Galvin and Gagne 2009 Operating System Concepts 8th Edition, Chapter 7: Deadlocks
Chapter 7: Deadlocks, Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance
More informationChapter 7: Deadlocks. Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009!
Chapter 7: Deadlocks Operating System Concepts 8 th Edition,! Silberschatz, Galvin and Gagne 2009! Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling
More informationAbstract Path Planning for Multiple Robots: An Empirical Study
Abstract Path Planning for Multiple Robots: An Empirical Study Charles University in Prague Faculty of Mathematics and Physics Department of Theoretical Computer Science and Mathematical Logic Malostranské
More informationChapter 6. Deadlocks
Chapter 6 Deadlocks 6.. Resources 6.. Introduction to deadlocks 6.3. The ostrich algorithm 6.6. Deadlock prevention 6.4. Deadlock detection and recovery 6.5. Deadlock avoidance 6.7. Other issues Learning
More informationCS420: Operating Systems. Deadlocks & Deadlock Prevention
Deadlocks & Deadlock Prevention James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts, 9th Edition by Silberschatz, Galvin, Gagne The Deadlock Problem
More informationOutlook. Deadlock Characterization Deadlock Prevention Deadlock Avoidance
Deadlocks Outlook Deadlock Characterization Deadlock Prevention Deadlock Avoidance Deadlock Detection and Recovery e 2 Deadlock Characterization 3 Motivation System owns many resources of the types Memory,
More informationA step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs
A step towards the Bermond-Thomassen conjecture about disjoint cycles in digraphs Nicolas Lichiardopol Attila Pór Jean-Sébastien Sereni Abstract In 1981, Bermond and Thomassen conjectured that every digraph
More informationModule 11. Directed Graphs. Contents
Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................
More informationOPERATING SYSTEMS. Prescribed Text Book. Operating System Principles, Seventh Edition. Abraham Silberschatz, Peter Baer Galvin and Greg Gagne
OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne 1 DEADLOCKS In a multi programming environment, several processes
More informationAn Eternal Domination Problem in Grids
Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger
More informationChapter 7: Deadlocks. Operating System Concepts with Java 8 th Edition
Chapter 7: Deadlocks 7.1 Silberschatz, Galvin and Gagne 2009 Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock
More informationA Reduction of Conway s Thrackle Conjecture
A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854
More informationDynamic Wavelength Assignment for WDM All-Optical Tree Networks
Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of
More informationOperating Systems. Designed and Presented by Dr. Ayman Elshenawy Elsefy
Operating Systems Designed and Presented by Dr. Ayman Elshenawy Elsefy Dept. of Systems & Computer Eng.. AL-AZHAR University Website : eaymanelshenawy.wordpress.com Email : eaymanelshenawy@yahoo.com Reference
More informationGeometric Unique Set Cover on Unit Disks and Unit Squares
CCCG 2016, Vancouver, British Columbia, August 3 5, 2016 Geometric Unique Set Cover on Unit Disks and Unit Squares Saeed Mehrabi Abstract We study the Unique Set Cover problem on unit disks and unit squares.
More informationIntroduction to Deadlocks
Unit 5 Introduction to Deadlocks Structure 5.1 Introduction Objectives 5.2 System Model 5.3 Deadlock Characterization Necessary Conditions for Deadlock Resource-Allocation Graph. 5.4 Deadlock Handling
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More informationSIMULATION STUDY OF FLEXIBLE MANUFACTURING CELL BASED ON TOKEN-ORIENTED PETRI NET MODEL
ISSN 1726-4529 Int j simul model 15 (2016) 3, 566-576 Original scientific paper SIMULATION STUDY OF FLEXIBLE MANUFACTURING CELL BASED ON TOKEN-ORIENTED PETRI NET MODEL Nie, X. D. *,** ; Chen, X. D. **
More informationStar Decompositions of the Complete Split Graph
University of Dayton ecommons Honors Theses University Honors Program 4-016 Star Decompositions of the Complete Split Graph Adam C. Volk Follow this and additional works at: https://ecommons.udayton.edu/uhp_theses
More informationChapter 8: Deadlocks. The Deadlock Problem
Chapter 8: Deadlocks System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock Combined Approach to Deadlock
More informationThe Deadlock Problem
Deadlocks The Deadlock Problem A set of blocked processes each holding a resource and waiting to acquire a resource held by another process in the set. Example System has 2 disk drives. P1 and P2 each
More informationChapter 7: Deadlocks
Chapter 7: Deadlocks Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from
More informationSOLVING DEADLOCK STATES IN MODEL OF RAILWAY STATION OPERATION USING COLOURED PETRI NETS
SOLVING DEADLOCK STATES IN MODEL OF RAILWAY STATION OPERATION USING COLOURED PETRI NETS Michal Žarnay University of Žilina, Faculty of Management Science and Informatics, Address: Univerzitná 8215/1, Žilina,
More informationFuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem
Fuzzy Inspired Hybrid Genetic Approach to Optimize Travelling Salesman Problem Bindu Student, JMIT Radaur binduaahuja@gmail.com Mrs. Pinki Tanwar Asstt. Prof, CSE, JMIT Radaur pinki.tanwar@gmail.com Abstract
More informationHYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu
HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,
More informationChordal Graphs: Theory and Algorithms
Chordal Graphs: Theory and Algorithms 1 Chordal graphs Chordal graph : Every cycle of four or more vertices has a chord in it, i.e. there is an edge between two non consecutive vertices of the cycle. Also
More informationChapter 8: Deadlocks. Operating System Concepts with Java
Chapter 8: Deadlocks System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock Combined Approach to Deadlock
More informationFundamentals of Operating Systems (COMP355/L) A Student's Manual for Practice Exercises
Fundamentals of Operating Systems (COMP355/L) A Student's Manual for Practice Exercises Text Book: Operating System Concepts 9 th Edition Silberschatz, Galvin and Gagne 2013 1 Practice Exercises #1 Chapter
More informationThe Deadlock Problem
Chapter 7: Deadlocks The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection Recovery from Deadlock The Deadlock
More information1344 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 42, NO. 10, OCTOBER 1997
1344 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 42, NO. 10, OCTOBER 1997 Polynomial-Complexity Deadlock Avoidance Policies for Sequential Resource Allocation Systems Spiridon A. Reveliotis, Member, IEEE,
More informationRecognizing Interval Bigraphs by Forbidden Patterns
Recognizing Interval Bigraphs by Forbidden Patterns Arash Rafiey Simon Fraser University, Vancouver, Canada, and Indiana State University, IN, USA arashr@sfu.ca, arash.rafiey@indstate.edu Abstract Let
More informationParameterized graph separation problems
Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht
More informationDistributed minimum spanning tree problem
Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with
More informationEfficient Prefix Computation on Faulty Hypercubes
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 1-21 (21) Efficient Prefix Computation on Faulty Hypercubes YU-WEI CHEN AND KUO-LIANG CHUNG + Department of Computer and Information Science Aletheia
More informationComplexity Results on Graphs with Few Cliques
Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School
More informationMODERN OPERATING SYSTEMS. Third Edition ANDREW S. TANENBAUM. Chapter 6 Deadlocks
MODERN OPERATING SYSTEMS Third Edition ANDREW S. TANENBAUM Chapter 6 Deadlocks Preemptable and Nonpreemptable Resources Sequence of events required to use a resource: 1. Request the resource. 2. Use the
More informationDeadlock. Concepts to discuss. A System Model. Deadlock Characterization. Deadlock: Dining-Philosophers Example. Deadlock: Bridge Crossing Example
Concepts to discuss Deadlock CSCI 315 Operating Systems Design Department of Computer Science Deadlock Livelock Spinlock vs. Blocking Notice: The slides for this lecture have been largely based on those
More informationOn the Max Coloring Problem
On the Max Coloring Problem Leah Epstein Asaf Levin May 22, 2010 Abstract We consider max coloring on hereditary graph classes. The problem is defined as follows. Given a graph G = (V, E) and positive
More informationOn Meaning Preservation of a Calculus of Records
On Meaning Preservation of a Calculus of Records Emily Christiansen and Elena Machkasova Computer Science Discipline University of Minnesota, Morris Morris, MN 56267 chri1101, elenam@morris.umn.edu Abstract
More informationINTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP*
South Bohemia Mathematical Letters Volume 24, (2016), No. 1, 10-16. INTERSECTION OF CURVES FACTS, COMPUTATIONS, APPLICATIONS IN BLOWUP* PAVEL CHALMOVIANSKÝ abstrakt. We deal with application of intersection
More informationObstacle-Aware Longest-Path Routing with Parallel MILP Solvers
, October 20-22, 2010, San Francisco, USA Obstacle-Aware Longest-Path Routing with Parallel MILP Solvers I-Lun Tseng, Member, IAENG, Huan-Wen Chen, and Che-I Lee Abstract Longest-path routing problems,
More informationGeneric Methodologies for Deadlock-Free Routing
Generic Methodologies for Deadlock-Free Routing Hyunmin Park Dharma P. Agrawal Department of Computer Engineering Electrical & Computer Engineering, Box 7911 Myongji University North Carolina State University
More informationAlgorithmic Aspects of Acyclic Edge Colorings
Algorithmic Aspects of Acyclic Edge Colorings Noga Alon Ayal Zaks Abstract A proper coloring of the edges of a graph G is called acyclic if there is no -colored cycle in G. The acyclic edge chromatic number
More informationLecture 7 Deadlocks (chapter 7)
Bilkent University Department of Computer Engineering CS342 Operating Systems Lecture 7 Deadlocks (chapter 7) Dr. İbrahim Körpeoğlu http://www.cs.bilkent.edu.tr/~korpe 1 References The slides here are
More informationNP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.
CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT
More informationPrinciples of AI Planning. Principles of AI Planning. 7.1 How to obtain a heuristic. 7.2 Relaxed planning tasks. 7.1 How to obtain a heuristic
Principles of AI Planning June 8th, 2010 7. Planning as search: relaxed planning tasks Principles of AI Planning 7. Planning as search: relaxed planning tasks Malte Helmert and Bernhard Nebel 7.1 How to
More informationMOST attention in the literature of network codes has
3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces
More informationOperating Systems. Lecture 07: Resource allocation and Deadlock Management. Elvis C. Foster
Operating Systems Lecture 7: Resource allocation and Deadlock Management Lecture 3 started the discussion of process management, with the emphasis on CPU scheduling. This lecture continues that discussion
More informationGreedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d
Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,
More informationDeadlock. Chapter Objectives
Deadlock This chapter will discuss the following concepts: The Deadlock Problem System Model Deadlock Characterization Methods for Handling Deadlocks Deadlock Prevention Deadlock Avoidance Deadlock Detection
More informationEDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m
EDGE-COLOURED GRAPHS AND SWITCHING WITH S m, A m AND D m GARY MACGILLIVRAY BEN TREMBLAY Abstract. We consider homomorphisms and vertex colourings of m-edge-coloured graphs that have a switching operation
More information! What is a deadlock? ! What causes a deadlock? ! How do you deal with (potential) deadlocks? Maria Hybinette, UGA
Chapter 8: Deadlock Questions? CSCI 4730 Operating Systems! What is a deadlock?! What causes a deadlock?! How do you deal with (potential) deadlocks? Deadlock Deadlock: What is a deadlock? Example: Two
More informationA Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net
582 JOURNAL OF SOFTWARE, VOL. 9, NO. 3, MARCH 2014 A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net Qiaoli Zhuang School of Information Science and Technology,
More information22 Elementary Graph Algorithms. There are two standard ways to represent a
VI Graph Algorithms Elementary Graph Algorithms Minimum Spanning Trees Single-Source Shortest Paths All-Pairs Shortest Paths 22 Elementary Graph Algorithms There are two standard ways to represent a graph
More informationIMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS
IMPERATIVE PROGRAMS BEHAVIOR SIMULATION IN TERMS OF COMPOSITIONAL PETRI NETS Leontyev Denis Vasilevich, Kharitonov Dmitry Ivanovich and Tarasov Georgiy Vitalievich ABSTRACT Institute of Automation and
More informationPACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS
PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed
More information3 SOLVING PROBLEMS BY SEARCHING
48 3 SOLVING PROBLEMS BY SEARCHING A goal-based agent aims at solving problems by performing actions that lead to desirable states Let us first consider the uninformed situation in which the agent is not
More informationCOP 4610: Introduction to Operating Systems (Spring 2016) Chapter 7 Deadlocks. Zhi Wang Florida State University
COP 4610: Introduction to Operating Systems (Spring 2016) Chapter 7 Deadlocks Zhi Wang Florida State University Contents Deadlock problem System model Handling deadlocks deadlock prevention deadlock avoidance
More informationChapter seven: Deadlock and Postponement
Chapter seven: Deadlock and Postponement -One problem that arises in multiprogrammed systems is deadlock. A process or thread is in a state of deadlock if it is waiting for a particular event that will
More informationMANUFACTURING agility has emerged as an important
796 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 14, NO. 5, OCTOBER 1998 A Correct and Scalable Deadlock Avoidance Policy for Flexible Manufacturing Systems Mark A. Lawley, Spyros A. Reveliotis,
More informationFault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults
Fault-Tolerant Wormhole Routing Algorithms in Meshes in the Presence of Concave Faults Seungjin Park Jong-Hoon Youn Bella Bose Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationDEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS
Asian Journal of Control, Vol. 9, No. 2, pp. 111-120, June 2007 111 DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS Wenle Zhang and Robert P. Judd ABSTRACT
More informationDesigning Views to Answer Queries under Set, Bag,and BagSet Semantics
Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Rada Chirkova Department of Computer Science, North Carolina State University Raleigh, NC 27695-7535 chirkova@csc.ncsu.edu Foto Afrati
More informationReductions and Satisfiability
Reductions and Satisfiability 1 Polynomial-Time Reductions reformulating problems reformulating a problem in polynomial time independent set and vertex cover reducing vertex cover to set cover 2 The Satisfiability
More informationMobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm
Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm Saiyad Sharik Kaji Prof.M.B.Chandak WCOEM, Nagpur RBCOE. Nagpur Department of Computer Science, Nagpur University, Nagpur-441111
More informationA Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing
A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,
More informationColumn Generation Method for an Agent Scheduling Problem
Column Generation Method for an Agent Scheduling Problem Balázs Dezső Alpár Jüttner Péter Kovács Dept. of Algorithms and Their Applications, and Dept. of Operations Research Eötvös Loránd University, Budapest,
More informationRuntime Monitoring of Multi-Agent Manufacturing Systems for Deadlock Detection Based on Models
2009 21st IEEE International Conference on Tools with Artificial Intelligence Runtime Monitoring of Multi-Agent Manufacturing Systems for Deadlock Detection Based on Models Nariman Mani, Vahid Garousi,
More informationMore on Synchronization and Deadlock
Examples of OS Kernel Synchronization More on Synchronization and Deadlock Two processes making system calls to read/write on the same file, leading to possible race condition on the file system data structures
More informationFigure 2.1: A bipartite graph.
Matching problems The dance-class problem. A group of boys and girls, with just as many boys as girls, want to dance together; hence, they have to be matched in couples. Each boy prefers to dance with
More informationFault-Tolerant Routing Algorithm in Meshes with Solid Faults
Fault-Tolerant Routing Algorithm in Meshes with Solid Faults Jong-Hoon Youn Bella Bose Seungjin Park Dept. of Computer Science Dept. of Computer Science Dept. of Computer Science Oregon State University
More informationFig Bridge crossing - deadlock
e-pg Pathshala Subject: Computer Science Paper: Operating Systems Module 16: Deadlocks Introduction Module No: CS/OS/16 Quadrant 1 e-text 16.1 Introduction Any system has many processes and a number of
More informationFaster parameterized algorithms for Minimum Fill-In
Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal
More informationImplementation of Process Networks in Java
Implementation of Process Networks in Java Richard S, Stevens 1, Marlene Wan, Peggy Laramie, Thomas M. Parks, Edward A. Lee DRAFT: 10 July 1997 Abstract A process network, as described by G. Kahn, is a
More informationVertex 3-colorability of claw-free graphs
Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,
More informationContext-Aware Route Planning
Context-Aware Route Planning Adriaan W. ter Mors, Cees Witteveen, Jonne Zutt, and Fernando A. Kuipers Delft University of Technology, The Netherlands Abstract. In context-aware route planning, there is
More informationEulerian disjoint paths problem in grid graphs is NP-complete
Discrete Applied Mathematics 143 (2004) 336 341 Notes Eulerian disjoint paths problem in grid graphs is NP-complete Daniel Marx www.elsevier.com/locate/dam Department of Computer Science and Information
More information