Token-based pull production control systems: an introductory overview

被引:0
|
作者
Pedro L. González-R
José M. Framinan
Henry Pierreval
机构
[1] University of Seville,Industrial Management School of Engineering
[2] Clermont University,LIMOS and IFMA
来源
关键词
Just in time; Production control; Pull; Token; Kanban; Conwip; Customized; Hybrid;
D O I
暂无
中图分类号
学科分类号
摘要
Since the advent of Kanban, pull systems have been widely used in practice and have been widely studied by researchers. During the last decades, several types of pull systems have emerged. Numerous articles have been published to introduce new paradigms or new principles for just-in-time systems as well as new approaches to evaluate them or to optimize their performance. An important feature of these systems, which is common to many other production control systems, is the use of tokens, which usually consist of cards that authorize certain production tasks to be performed. Tokens can be used in various manners to control production and can be combined with several other mechanisms with the objective of reducing the work in progress and the lead times, while meeting customers’ demand. This article proposes an introductory overview of existing research works in this area. In this respect, we suggest a classification of pull-inspired production control systems, which allows us to distinguish up to 18 different systems. For each type of system, we study its basic principles, the flow control strategy, and the parameters affecting its performance. This survey aims at facilitating the understanding of the different proposals made by researchers and highlighting their common points and differences.
引用
收藏
页码:5 / 22
页数:17
相关论文
共 50 条
  • [31] Determinants of pigeons' choices in token-based self-control procedures
    Hackenberg, TD
    Vaidya, M
    [J]. JOURNAL OF THE EXPERIMENTAL ANALYSIS OF BEHAVIOR, 2003, 79 (02) : 207 - 218
  • [32] TOKEN-BASED MEDIUM ACCESS CONTROL SOLUTION FOR UNDERWATER ACOUSTIC BROADCAST
    Egbo, H. N.
    Hallin, N. J.
    Ray, P. L.
    O'Rourke, M.
    Frenzel, J. F.
    Edwards, D. B.
    [J]. OCEANS 2009, VOLS 1-3, 2009, : 1769 - 1777
  • [33] A simple token-based algorithm for the mutual exclusion problem in distributed systems
    Peyman Neamatollahi
    Yasser Sedaghat
    Mahmoud Naghibzadeh
    [J]. The Journal of Supercomputing, 2017, 73 : 3861 - 3878
  • [34] A token-based delay optimal algorithm for mutual exclusion in distributed systems
    Saxena, P.C.
    Gupta, Sangita
    [J]. Computer Standards and Interfaces, 1999, 21 (01): : 33 - 50
  • [35] Introductory overview: Systems and control methods for operational management support in agricultural production systems
    van Mourik, Simon
    van der Tol, Rik
    Linker, Raphael
    Reyes-Lastiri, Daniel
    Kootstra, Gert
    Koerkamp, Peter Groot
    van Henten, Eldert J.
    [J]. ENVIRONMENTAL MODELLING & SOFTWARE, 2021, 139 (139)
  • [36] Learning Token-Based Representation for Image Retrieval
    Wu, Hui
    Wang, Min
    Zhou, Wengang
    Hu, Yang
    Li, Houqiang
    [J]. THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / THE TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 2703 - 2711
  • [37] Decentralized token generation scheme for token-based mutual exclusion algorithms
    Manivannan, D
    Singhal, M
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 1996, 11 (01): : 45 - 54
  • [38] A token-based single sign-on protocol
    Hui, L
    Ting, S
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 180 - 185
  • [39] TOKEN-BASED EXTRACTION OF STRAIGHT-LINES
    BOLDT, M
    WEISS, R
    RISEMAN, E
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1989, 19 (06): : 1581 - 1594
  • [40] An active attack on the token-based security protocol
    Abdelshafy, M.A.
    Elsaholy, M.S.
    Darwish, M.G.
    [J]. Journal of Engineering and Applied Science, 2001, 48 (02): : 365 - 383