DOI QR코드

DOI QR Code

A Conflict Detection Method Based on Constraint Satisfaction in Collaborative Design

  • Yang, Kangkang (School of Power and Mechanical Engineering, Wuhan University) ;
  • Wu, Shijing (School of Power and Mechanical Engineering, Wuhan University) ;
  • Zhao, Wenqiang (School of Power and Mechanical Engineering, Wuhan University) ;
  • Zhou, Lu (School of Power and Mechanical Engineering, Wuhan University)
  • Received : 2015.03.11
  • Accepted : 2015.05.28
  • Published : 2015.06.30

Abstract

Hierarchical constraints and constraint satisfaction were analyzed in order to solve the problem of conflict detection in collaborative design. The constraints were divided into two sets: one set consisted of known constraints and the other of unknown constraints. The constraints of the two sets were detected with corresponding methods. The set of the known constraints was detected using an interval propagation algorithm, a back propagation (BP) neural network was proposed to detect the set with the unknown constraints. An immune algorithm (IA) was utilized to optimize the weights and the thresholds of the BP neural network, and the steps were designed for the optimization process. The results of the simulation indicated that the BP neural network that was optimized by IA has a better performance in terms of convergent speed and global searching ability than a genetic algorithm. The constraints were described using the eXtensible Markup Language (XML) for computers to be able to automatically recognize and establish the constraint network. The implementation of the conflict detection system was designed based on constraint satisfaction. A wind planetary gear train is taken as an example of collaborative design with a conflict detection system.

Keywords

References

  1. P. A. Yvars, "A CSP approach for the network of product lifecycle constraints consistency in a collaborative design context," Engineering Applications of Artificial Intelligence, vol. 22, no. 6, pp. 961-970, 2009. https://doi.org/10.1016/j.engappai.2008.11.006
  2. X. L. Meng, H. Yi, Z. H. Ni, and Y. Liu, "Research on technologies of constraint-based conflict detection in collaborative design," Computer Integrated Manufacturing Systems, vol. 10, no. 11, pp. 1426-1432, 2004.
  3. X. P. Hu, J. Wang, and Z. H. Xu, "Constraint network modeling and conflict detection in vertical collaboration design," Mechanical & Electrical Engineering Magazine, vol. 26, no. 5, pp. 44-47, 2009.
  4. K. Slimani, D. F. Da Silva, L. Medini, and P. Ghodous, "Conflict mitigation in collaborative design," International Journal of Production Research, vol. 44, no. 9, pp. 1681-1702, 2006. https://doi.org/10.1080/00207540500445198
  5. J. Zhu, X. D. Song, "A Conflict Detection Algorithm Based on the Design History in Collaborative CAD Design," Computer & Digital Engineering, vol. 5, no. 40, pp. 79-81, 2012.
  6. H. S. Zhao, L. Tian, and B. S. Tong, "Constraint-based conflict detection and negotiation in collaborative design," Computer Integrated Manufacturing Systems, vol. 8, no. 11, pp. 896-900, 2002.
  7. H. C. Xie, D. Chen, and X. Kong, "Constraint-based conflict detection in collaborative design," China Mechanical Engineering, vol. 13, no. 18, pp. 1590-1593, 2002.
  8. D. Y. Wang and W. D. Jin, "Conflict detection algorithm in collaborative design," Computer Applications, vol. 27, no. 3, pp. 650-652, 2007.
  9. Y. Xiong, W. H. Fan, and G. L. Xiong, "Research and realization of distributed conflict detection System," Computer Engineering, vol. 35, no. 20, pp. 23-27, 2009.
  10. L. Jaulin, "Interval constraint propagation with application to bounded-error estimation," Automatica, vol. 36, no. 10, pp. 1547-1552, 2000. https://doi.org/10.1016/S0005-1098(00)00068-6
  11. M. Klein, "Supporting conflict resolution in cooperative design systems," IEEE Transactions on Systems, Man and Cybernetics, vol. 21, no. 6, pp. 1379-1390, 1991. https://doi.org/10.1109/21.135683
  12. J. D. J. R. Avila, A. F. Ramirez, and C. Aviles-Cruz, "Nonlinear system identification with a feedforward neural network and an optimal bounded ellipsoid algorithm," WSEAS Transactions on Computers, vol. 7, no. 5, pp. 542-551, 2008.
  13. D. B. Yuan, X. Li, and N. Zhu, "Penetration depth forecast using BP neural network-based system," Journal of Computational Information Systems, vol. 10, no. 12, pp. 5001-5008, 2014.
  14. Y. F. Zhang, Z. Y. Xiong, Y. Chen, G. Y. Li, and X. F. Geng, "Immune algorithms based on data processing in intrusion detection," Journal of Computational Information Systems, vol. 4, no. 1, pp. 293-300, 2008.
  15. K. L. Hsu, H. V. Gupta, and S. Sorooshian, "Artificial neural network modeling of the rainfall-runoff process," Water Resources Research, vol. 31, no. 10, pp. 2517-2530, 1995. https://doi.org/10.1029/95WR01955
  16. Z. Wang, D. Miao, and Z. Du. "Modified particle filter algorithm for mobile robot simultaneous localization and mapping," in Proceedings of International Technology and Innovation Conference 2009 (ITIC 2009), Xian, China, 2009, pp. 1-5.
  17. D. Xu, F. F. Yap, X. Han, and G. L. Wen, "Identification of spring-force factors of suspension systems using progressive neural network on a validated computer model," Inverse Problems in Engineering, vol. 11, no. 1, pp. 55-74, 2003. https://doi.org/10.1080/1068276021000020177
  18. H. Gopalakrishnan and D. Kosanovic, "Operational planning of combined heat and power plants through genetic algorithms for mixed 0-1 nonlinear programming," Computers & Operations Research, vol. 56, pp. 51-67, 2015. https://doi.org/10.1016/j.cor.2014.11.001
  19. Y. Liu, D. Yang, S. Tang, T. Wang, and J. Gao, "Validating key constraints over XML document using XPath and structure checking," Future Generation Computer Systems, vol. 21, no. 4, pp. 583-595, 2005. https://doi.org/10.1016/j.future.2004.12.001
  20. B. Huang, S. Yi, and W. T. Chan, "Spatio-temporal information integration in XML," Future Generation Computer Systems, vol. 20, no. 7, pp. 1157-1170, 2004. https://doi.org/10.1016/j.future.2003.11.005
  21. S. C. Haw and C. S. Lee, "Extending path summary and region encoding for efficient structural query processing in native XML databases," Journal of Systems and Software, vol. 82, no. 6, pp. 1025-1035, 2009. https://doi.org/10.1016/j.jss.2009.01.007