D. Inference Engine for Expert Systems: This allows both forward and backward chaining. 11 Coding and the associated compilation are not required, thus avoiding grammatical and typographical errors. In addition, the user can easily modify the designed inference network in a graphical fashion. An ex<strong>amp</strong>le of the inference network for car diagnosis has been demonstrated. Rules can be represented by transitions and preconditions, or symptoms can be represented by tokens in places. Clicking the “Auto” button of the “Simulate” submenu of the “Analysis” menu fires the production rules (transitions) and, when the firing terminates, the places holding tokens indicate the cause of the problem. 8.9 Conclusions The tool, based on the synthesis rules and the algorithm, helps designers to construct large PNs interactively and to synthesize an automated manufacturing system in a user-friendly fashion. None of the existing tools integrate drawing, file manipulation, analysis, simulation, animation, reduction, synthesis, and property query in one software package. Furthermore, because PNs model discrete-event systems, the tool finds applications in communication protocols, flexible manufacturing systems, (extended) finite state machines, expert systems, interactive parallel debuggers, 11 digital signal processing, 5,7,11 etc. We have enhanced the tool to include models not only of PNs but also of state diagrams and data flow graphs (DFGs) with few code changes. Thus a designer can choose the model with which he is familiar. For instance, DSP professionals do not know PNs well. They can, however, draw DFGs and obtain iteration bounds, critical loops, rate-optimal scheduling, etc. by just clicking a button. 4,5,65 We have also implemented a reduction algorithm based on the rules; the code is very simple, containing less than 100 lines. The distinct point of this approach is that, besides the possibility of continuous enhancement, while reducing, it can discover wrong designs and suggest how to fix the problem based on the knitting rules. This work overcomes some drawbacks of most existing synthesis approaches; i.e., they do not • Deal with the algorithm and CAD tool using graphical user interface for synthesis explicitly • Show how to continuously update their synthesis techniques • Indicate how to extend the synthesis for analysis • Show temporal relationships among processes after synthesis • Find the maximum concurrency of the synthesized net. References 1. Agerwala, T. and Y. Choed-Amphai, A synthesis rule for concurrent systems, Proc. of <strong>Design</strong> Automation Conference, 1978, pp. 305–311. 2. Berthelot, G., Checking properties of nets using transformations, in Advances in Petri Nets, G. Rozenberg (ed.), 1985, Springer-Verlag, pp. 19–40. 2a. Chao, D.Y., Application of a synthesis algorithm to flexible manufacturing systems, Journal of Information Science and <strong>Engineering</strong>, Vol. 14, No. 2, June 1998, pp. 409–477. 3. Chao, D. Y. and D. T. Wang, Synchronized choice ordinary Petri net, (Invited) Proc. 1995 IEEE Int’l Conf. SMC, Vancouver, Canada, October 22–25, pp. 1442–1447. 4. Chao, D. Y. and D. T. Wang, XPN-FMS: A modeling and simulation software for FMS using Petri nets and X windows,” International Journal of Flexible <strong>Manufactur</strong>ing Systems, Vol. 7, No. 4, October 1955, pp. 339–360. 5. Chao, D. Y. and D. T. Wang, Iteration bounds of single-rate data flow graphs for concurrent processing, IEEE Trans. Circuits Syst., CAS-40, No. 9, September 1993, pp. 629–634. 6. Chao, D. Y. and D. T. Wang, Two theoretical and practical aspects of knitting techniques—invariants and a new class of Petri net, IEEE Trans. SMC_27, No. 6, December 1997, pp. 962–977.
7. Chao, D. Y. and D. T. Wang, Application of final matrix to data flow graph scheduling using multiprocessors, MIS Review, Vol. 5, December 1995, pp. 65–80. 8. Chao, D. Y. and D. T. Wang, X-Window implementation of an algorithm to synthesize ordinary Petri nets, Journal of National Cheng Chi University, Vol. 73, October 1996, pp. 451–496. 9. Chao, D. Y., M. C. Zhou, and D. T. Wang, Extending knitting technique to Petri net synthesis of automated manufacturing systems, The Computer Journal, Oxford University Press, Vol. 37, No. 1–2, 1994, pp. 1–10. 10. Chao, D. Y. and D. T. Wang, A synthesis technique of general Petri nets, J. Systems Integration, Vol. 4, No. 1, 1994, pp. 67–102. 11. Chao, D. Y. and D. T. Wang, An interactive tool for design, simulation, verification, and synthesis for protocols, Software-Practice and Experience, an International Journal, Vol. 24, No. 8, August 1994, pp. 747–783. 12. Chao, D. Y. and D. T. Wang, Petri net synthesis and synchronization using knitting technique, Proc. 1994 IEEE Int’l Conf. SMC, San Antonio, TX, October 2–5, pp. 652–657. 13. Chao, D. Y. and D. T. Wang, Knitting technique and structural matrix for deadlock analysis and synthesis of Petri nets with sequential exclusion, Proc. 1994 IEEE Int’l Conf. SMC, San Antonio, TX, October 2–5, pp. 1334–1339. 14. Chao, D. Y. and D. T. Wang, Knitting technique with TP-PT generations for Petri net synthesis, (Invited) Proc. 1995 IEEE Int’l Conf. SMC, Vancouver, Canada, October 22–25, pp. 1454–1459. 15. Chao, D. Y. and D. T. Wang, Linear algebra based verification of well-behaved properties and Pinvariants of Petri nets synthesized using knitting technique, MIS Review, Vol. 5, December 1995, pp. 27–48. 16. Chen, Y., W. T. Tsai, and D. Y. Chao, Dependency analysis—a compositional technique for building large Petri net, IEEE Trans. on Parallel and Distributed Systems, PDS-4, No. 4, 1993, pp. 414–426. 17. Chu, W. W. and K. K. Leung, Task response time model and its application for real-time distributed processing systems, Proc. 1984 IEEE Real Time Syst. Symp., pp. 225–236. 18. Datta, A. and S. Ghosh, Synthesis of a class of deadlock-free Petri nets, Journal of ACM, Vol. 31, No. 3, 1984, pp. 486–506. 19. Datta, A., Modular synthesis of deadlock-free control structures, in Foundations of Software Technology and Theoretical Computer Science, G. Goos and J. Hartmanis, (eds.), Springer-Verlag, Vol. 241, 1986, pp. 288–318. 20. Dong, T., The Modeling, Analysis, and Synthesis of Communication Protocols, Ph.D. Dissertation, Computer Science Division, EECS. 21. Esparza, J. and M. Silva, Circuits, handles, bridges, and nets, in LNCS, Advances in Petri Nets 1991, Springer-Verlag, pp. 210–242. 22. Esparza, J. and M. Silva, On the analysis and synthesis of free choice systems, in LNCS, Advances in Petri Nets 1991, Springer-Verlag, pp. 243–286. 23. Huang, J. P., Modeling of software partition for distributed real-time application, IEEE Trans. on Software Eng., SE-11, October 1985, pp. 1113–1126. 24. Hyung, L-K. and J. Favrel, Analysis of Petri nets by hierarchical reduction and partition, in IASTED Modelling and Simulation, Acta Press, Zurich, Switzerland, 1982, pp. 363–366. 25. Hyung, L-K. and J. Favrel, Hierarchical reduction method for analysis of decomposition of Petri nets, IEEE Trans. Syst., Man, Cybern., SMC-15, No.2, March 1985, pp. 272–280. 26. Hyung, L-K., Generalized Petri net reduction method, IEEE Trans. Syst., Man, Cybern., SMC-17, No. 2, 1987, pp. 297–303. 27. Koh, I. and F. DiCesare, Modular transformation methods for generalized Petri nets and their application to automated manufacturing systems, IEEE Trans. Syst., Man, Cybern., SMC-26, No. 6, 1991, pp. 1512–1522. 28. Jeng, M. D. and F. DiCesare, A review of synthesis techniques for Petri nets with applications to automated manufacturing systems, IEEE Trans. Syst., Man, Cybern., SMC-23, No. 1, 1993, pp. 301–312.
- Page 1 and 2:
COMPUTER-AIDED DESIGN, ENGINEERING,
- Page 3 and 4:
Library of Congress Cataloging-in-P
- Page 5 and 6:
Editor Cornelius T. Leondes, B.S.,
- Page 7 and 8:
Chapter 1 Chapter 2 Chapter 3 Chapt
- Page 9 and 10:
the implementation of the IPD syste
- Page 11 and 12:
In our IPD system implementations,
- Page 13 and 14:
2. Specification of analysis-specif
- Page 15 and 16:
FIGURE 1.2 base or the design insta
- Page 17 and 18:
FIGURE 1.4 System architecture of t
- Page 19 and 20:
of a beam is considered for FEA. Th
- Page 21 and 22:
FIGURE 1.7 through the control expe
- Page 23 and 24:
2. machining facility (e.g., gang m
- Page 25 and 26:
from the FBDS. The user also specif
- Page 27 and 28:
Depending on the type of feature to
- Page 29 and 30:
TABLE 1.6 Tolerance synthesis is de
- Page 31 and 32:
FIGURE 1.12 Display of the NC tool
- Page 33 and 34:
component geometric entities and va
- Page 35 and 36:
FIGURE 1.14 The system architecture
- Page 37 and 38:
TABLE 1.10 User Input for the Toler
- Page 39 and 40:
TABLE 1.11 Tolerance Specifications
- Page 41 and 42:
7. Z. Young and I. R. Groose. A rul
- Page 43 and 44:
FIGURE 2.1 Tool paths generated for
- Page 45 and 46:
FIGURE 2.2 sented by instances of f
- Page 47 and 48:
TABLE 2.1 A CAD-Generated Hole Conf
- Page 49 and 50:
FIGURE 2.6 mounted on the rotary ta
- Page 51 and 52:
FIGURE 2.8 fixture for the machinin
- Page 53 and 54:
FIGURE 2.10 or best-fit, or the cur
- Page 55 and 56:
FIGURE 2.11 Linear approximation of
- Page 57 and 58:
FIGURE 2.13 Circular approximation
- Page 59 and 60:
FIGURE 2.14(b) Circular approximati
- Page 61 and 62:
FIGURE 2.16 Types of biarcs. FIGURE
- Page 63 and 64:
FIGURE 2.18 Approximation of scanne
- Page 65 and 66:
FIGURE 2.20 A touch trigger probe c
- Page 67 and 68:
TABLE 2.4 Substitute Elements in CM
- Page 69 and 70:
FIGURE 2.21 CMM planning requiremen
- Page 71 and 72:
Product Model Representation for Co
- Page 73 and 74:
© 2001 by CRC Press LLC TABLE 2.5
- Page 75 and 76:
TABLE 2.7 Partial Listing of Dimens
- Page 77 and 78:
24. Makinouchi, S., Okamoto, M., an
- Page 79 and 80:
Bijan Shirinzadeh Monash University
- Page 81 and 82:
FIGURE 3.1 Trends in flexible manuf
- Page 83 and 84:
FIGURE 3.3 and constrain different
- Page 85 and 86:
Other Fixturing Techniques There ar
- Page 87 and 88:
FIGURE 3.6 contact point. The geome
- Page 89 and 90:
FIGURE 3.8 The vertical support fix
- Page 91 and 92:
and moments about the contact point
- Page 93 and 94:
een identified, the normals are use
- Page 95 and 96:
one of choosing the variables: such
- Page 97 and 98:
Fixture Module Location An importan
- Page 99 and 100:
FIGURE 3.15 Illustration of functio
- Page 101 and 102:
FIGURE 3.18 Minimum separation test
- Page 103 and 104:
direction) the face, respectively.
- Page 105 and 106:
FIGURE 3.21 Software structure for
- Page 107 and 108:
3.8 Conclusion A reconfigurable fix
- Page 109 and 110:
Heui Jae Pahk Seoul National Univer
- Page 111 and 112:
FIGURE 4.1(b) Conceptual framework
- Page 113 and 114:
4.3 Measurement Points Sampling and
- Page 115 and 116:
Surface S2 Measurement Path FIGURE
- Page 117 and 118:
FIGURE 4.4 Rough phase alignment ba
- Page 119 and 120:
deviation between the nominal CAD d
- Page 121 and 122:
FIGURE 4.6(a) Sum of squares distan
- Page 123 and 124:
FIGURE 4.7(c) Trailing edge. (c) th
- Page 125 and 126:
FIGURE 4.8(a) Profile tolerance of
- Page 127 and 128:
The calculated minimum form error i
- Page 129 and 130:
FIGURE 4.11(a) A typical mold havin
- Page 131 and 132:
FIGURE 4.11(d) Inspection results f
- Page 133 and 134:
FIGURE 4.12(c) Maximum deviation (p
- Page 135 and 136:
5.1 Introduction Developments in th
- Page 137 and 138:
process plan for a part (Figure 5.3
- Page 139 and 140:
FIGURE 5.5 leading to the developme
- Page 141 and 142:
the previously stored process plan
- Page 143 and 144:
FIGURE 5.7 Techniques of defining a
- Page 145 and 146:
Feature Recognition and Extraction
- Page 147 and 148:
in relation to another feature (e.g
- Page 149 and 150:
FIGURE 5.9 Framework for building a
- Page 151 and 152:
FIGURE 5.10 Process plan content.
- Page 153 and 154:
FIGURE 5.12 Schematic sketch of the
- Page 155 and 156:
Several techniques of defining a fe
- Page 157 and 158:
TABLE 5.1 Data Structure for Repres
- Page 159 and 160:
FIGURE 5.16 Classification of the t
- Page 161 and 162:
system to ensure that the part bein
- Page 163 and 164:
FIGURE 5.19 Graphical model of the
- Page 165 and 166:
TABLE 5.4 Data Structure for Repres
- Page 167 and 168:
FIGURE 5.20 Mapping between machini
- Page 169 and 170:
algorithms. (Some details of the pr
- Page 171 and 172:
FIGURE 5.24 An example rotational p
- Page 173 and 174:
FIGURE 5.26 Down_face-turn-up_face
- Page 175 and 176:
FIGURE 5.27 Procedure for machine t
- Page 177 and 178:
FIGURE 5.28 Determining the number
- Page 179 and 180:
DL is needed to be set only if the
- Page 181 and 182:
FIGURE 5.31 Operation sequencing co
- Page 183 and 184:
Cutting Tool Selection Selection of
- Page 185 and 186:
1. A tool is searched for in the da
- Page 187 and 188:
FIGURE 5.32 Inputs to optimization
- Page 189 and 190:
When these values are substituted,
- Page 191 and 192:
Usually, maximum and minimum speed
- Page 193 and 194:
FIGURE 5.33 Solution methodology.
- Page 195 and 196:
TABLE 5.6 Process Plan Internal Rep
- Page 197 and 198:
In a strict theoretical perspective
- Page 199 and 200:
18. Domazet, D. S. and Lu, S. C. Y,
- Page 201 and 202:
63. Prasad, A. V. S. R. K., Rao, P.
- Page 203 and 204:
CAD systems. The sample consists of
- Page 205 and 206:
learn to master the new system. An
- Page 207 and 208:
Although researchers appear to agre
- Page 209 and 210:
Link and Zmud28 found that organic
- Page 211 and 212:
Informal Training Informal CAD trai
- Page 213 and 214:
informal training programs, felt th
- Page 215 and 216:
6. C. A. Beatty, Tall Tales and Rea
- Page 217 and 218:
A.Y.C. Nee National University of S
- Page 219 and 220:
FIGURE 7.1 Planning, design, and ma
- Page 221 and 222:
A metal stamping can have the follo
- Page 223 and 224:
FIGURE 7.3 Strips used to notch out
- Page 225 and 226:
A Skeletal Approach for the Recogni
- Page 227 and 228:
These findings can be used to devel
- Page 229 and 230:
Semi-Direct Piloting In cases where
- Page 231 and 232:
a larger value, the die operations
- Page 233 and 234:
FIGURE 7.9 Symbolic relationship be
- Page 235 and 236:
FIGURE 7.11 The shape of the envelo
- Page 237 and 238:
TABLE 7.1 Schema for the Generation
- Page 239 and 240:
strong reasons to support a move to
- Page 241 and 242:
FIGURE 7.16 3-D CAD model of a part
- Page 243 and 244:
References Cheok, B.T. et al. (1994
- Page 245 and 246:
include the once forbidden generati
- Page 247 and 248:
A temporal matrix (T-Matrix) is pro
- Page 249 and 250:
FIGURE 8.1 A basic process. (From R
- Page 251 and 252: FIGURE 8.4(a) Generate a new IG usi
- Page 253 and 254: Note if the pair of nodes are both
- Page 255 and 256: TABLE 8.1 Summary of the Rules Cond
- Page 257 and 258: The correctness of these rules is e
- Page 259 and 260: needs to show that after each full
- Page 261 and 262: ule is violated, a warning should b
- Page 263 and 264: Π1 Π3 Π4 FIGURE 8.8(a) After add
- Page 265 and 266: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
- Page 267 and 268: A ik � ‘U’ and is in a cycle
- Page 269 and 270: FIGURE 8.12(a) Add [p2 t7 p7 t8 p4]
- Page 271 and 272: FIGURE 8.12(c) Add a token to p8 vi
- Page 273 and 274: FIGURE 8.12(e) Add [p8 t9 p14 t10 p
- Page 275 and 276: FIGURE 8.13 An example of rule TT.0
- Page 277 and 278: FIGURE 8.14 A GPN model of a machin
- Page 279 and 280: FIGURE 8.15(b) The first exclusive
- Page 281 and 282: FIGURE 8.15(d) The last exclusive T
- Page 283 and 284: FIGURE 8.15(f) After entering the a
- Page 285 and 286: FIGURE 8.15(h) Completion of Compon
- Page 287 and 288: FIGURE 8.15(j) Two PP-generations:
- Page 289 and 290: FIGURE 8.15(l) The last exclusive T
- Page 291 and 292: t1 t5 p1 p5 t6 (a) t2 t3 t4 2 2 p2
- Page 293 and 294: FIGURE 8.17 An example of partial f
- Page 295 and 296: Theorem 10: If pi → pk in a synth
- Page 297 and 298: Note that control transitions are o
- Page 299 and 300: t j than the lower at , it indicate
- Page 301: • Programming logic and VLSI arra
- Page 305 and 306: 53. Villaroel, J. L., J. Martinez,
- Page 307 and 308: q u : the numerator of the least ra
- Page 309 and 310: geometric modeling, engineering ana
- Page 311 and 312: In dimension driven or parametric d
- Page 313 and 314: FIGURE 9.3 configuration of bodies
- Page 315 and 316: FIGURE 9.6 FIGURE 9.7 Geometric Int
- Page 317 and 318: FIGURE 9.8 Intersection of degrees
- Page 319 and 320: will introduce a way to propagate p
- Page 321 and 322: Completeness of Dimensions Complete
- Page 323 and 324: FIGURE 9.12 3-D constraints. © 200
- Page 325 and 326: The distance constraint from pt �
- Page 327 and 328: therefore: Now merge the lists and
- Page 329 and 330: Quantity analysis methods have the
- Page 331 and 332: y a revolute joint. By selecting al