We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 3,995 results
  1. Deadlock avoidance based on connectivity detection and dynamic backtracking for path planning

    The main purpose of this paper is to solve the deadlock problem encountered by the algorithm in robot path planning, so as to improve the efficiency...

    ** Yu, **aoming You, Sheng Liu in Soft Computing
    Article 20 October 2022
  2. On-line Deadlock-free Planning of N-industrial-robot Arms With Independent Controllers Using Advanced Esca** Method

    This work presents an on-line deadlock avoidance system for N-industrial-robot arms utilizing an advanced esca** method. Robots within the same...

    Ahmad Yasser Afaghani, Jamal Eldeen Afaghani, Yasumichi Aiyama in International Journal of Control, Automation and Systems
    Article 25 August 2023
  3. Novel Deadlock Control for Smartphone Manufacturing Systems Using Petri Nets

    Currently, the marketing strategy in the manufacturing industry is becoming more and more competitive. Thus, the production efficiency becomes the...

    Yi-Nan Lin, Sheng-Kuan Wang, ... Ting-Jui Huang in International Journal of Control, Automation and Systems
    Article 11 March 2022
  4. A Survey of Deadlock Detection Algorithms

    A deadlock is a situation in which two processes which share the identical resource are dependent on one another and prevents each other from...
    Palak Vij, Sayali Nikam, Amit Dua in Sustainable Advanced Computing
    Conference paper 2022
  5. Deadlock Detection in OpenPEARL

    OpenPEARL is an open source build system for PEARL, a DIN-standard programming language designed for building multitasking and real-time...
    Conference paper 2023
  6. Routing Deadlock Problem in Certain Orthogonal Switches and Its Solvent

    High-radix interconnection networks are one of the current hot spots in studying high-performance interconnection networks, and the switch fabric...
    Conference paper 2022
  7. On the Design and Performance Analysis of Deadlock Controller for Automated Manufacturing Systems with Unreliable Resources

    Deadlock problems in highly automated manufacturing system (AMS) have recently received considerable interest from both industry and academia. In...
    Mohammad Ashraful Karim Chowdhury, M. Krid, ... A. Mostafa in Proceedings of the 4th International Conference on Numerical Modelling in Engineering
    Conference paper 2022
  8. Deadlock Analysis and Resolution for Multi-robot Systems

    Collision avoidance for multirobot systems is a well studied problem. Recently, control barrier functions (CBFs) have been proposed for synthesizing...
    Jaskaran Singh Grover, Changliu Liu, Katia Sycara in Algorithmic Foundations of Robotics XIV
    Conference paper 2021
  9. An Agent-Based Simulation Model for Deadlock Prevention in an Aisle-to-Aisle SBS/RS

    Flexibility and high throughput rate in storage and retrieval systems are essential criteria in today’s competitive marketing. Recent developments in...
    Ecem Eroglu, Banu Yetkin Ekren in Industrial Engineering in the Internet-of-Things World
    Conference paper 2022
  10. ACRA: Adaptive meta-heuristic based Clustering and Routing Algorithm for IoT-assisted wireless sensor network

    Opportunistic routing  is crucial for the development and management of an efficient and flexible network in Internet of Things (IoT) assisted...

    Soni Chaurasia, Kamal kumar in Peer-to-Peer Networking and Applications
    Article 10 July 2023
  11. Deadlock and Collision Avoidance in Railway Networks with Dynamic Routing: A Petri Net Approach with Partial Controllability and Observability

    This paper proposes a deadlocks and collision-free train control synthesis. The proposed control routes dynamically the trains in a railway node...
    Paul Cazenave, Manel Khlif-Bouassida, Armand Toguyéni in 15th European Workshop on Advanced Control and Diagnosis (ACD 2019)
    Conference paper 2022
  12. A New Multi-resource Deadlock Detection Algorithm Using Directed Graph Requests in Distributed Database Systems

    In distributed system, a single database is spread physically across computers in multiple locations called distributed database. One of the most...
    Khalid Al-Hussaini, Nabeel A. Al-Amdi, Fuaad Hasan Abdulrazzak in Innovative Systems for Intelligent Health Informatics
    Conference paper 2021
  13. Enhanced Vehicle Detection Mechanism for Traffic Management in Smart Cities

    Nowadays Road traffic is a major issue in develo** and under-develo** countries. With the rampant increase in traffic, society faces major...

    Wania Tahir, Raja Asif Wagan, ... Shumaila Hussain in Wireless Personal Communications
    Article 01 April 2024
  14. Ant Colony Algorithm for Path Planning Based on Grid Feature Point Extraction

    Aimed at the problems of a traditional ant colony algorithm, such as the path search direction and field of view, an inability to find the shortest...

    Article 07 February 2023
  15. Related Work on Deadlock and Termination Detection Techniques

    Because many deadlock detection techniques evolved, even the concept of deadlock varies across papers.
    Chapter 2020
  16. Novel Approach to Identify and Eliminate Deadlocks in the ‘C’ Program

    The programming system of any organization comprises various types of interrelationships, like period dependency, sequence dependency, called-calling...
    Conference paper 2023
  17. Formal Modeling and Verifying Dubbo Using Process Algebra

    Dubbo is a high-performance, lightweight Java Remote Procedure Call (RPC) framework developed by Alibaba, which provides interface-oriented remote...

    Zhiru Hou, Jiaqi Yin, ... Phan Cong Vinh in Mobile Networks and Applications
    Article 23 October 2023
  18. Formal verification of reconfigurable systems

    Automation is one of the foremost technological trends in mining. Automation empowers mining companies to work around the clock and maximize...

    Muhammad Abdul Basit Ur Rahim, Muhammad Ahsan Ur Raheem, ... Muhammad Rafiq Mufti in Soft Computing
    Article 06 May 2023
  19. Deadlock Detection Examples: The Dedan Environment at Work

    The example of deadlock detection is presented for the system in which two distributed computations, each one running on its own server, use two...
    Chapter 2020
  20. A Priority Inheritance Centered Locking Protocol for DRTDBS

    In distributed real-time applications, the static 2 Phase Locking with High Priority (S2PL-HP) protocol may resolve data conflict(s) among...

    Sarvesh Pandey, Udai Shanker in Wireless Personal Communications
    Article 11 March 2023
Did you find what you were looking for? Share feedback.