Research Article

Deadlock Prevention Policy with Behavioral Optimality or Suboptimality Achieved by the Redundancy Identification of Constraints and the Rearrangement of Monitors

Algorithm 1

Extraction of necessary constraints.
Input: A Petri net , and a set of constraints .
Output: A set of necessary constraints .
(1) begin
(2) .    denotes a set of necessary constraints
(3) while  
  (3.1) Choose a constraint from ; .
  (3.2) Enforce to the MIP problem of .
  (3.3) if  {there exists a maximal unmarked siphon}
    (3.3.1) .
(4) Output .
(5) end