{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:35Z","timestamp":1777704635313,"version":"3.51.4"},"reference-count":21,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T00:00:00Z","timestamp":1589760000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2020,6,25]]},"abstract":"<jats:p>When resources are limited and the perception tasks are time-constrained, if multiple perception tasks request the response at the same time, it is easy to cause scheduling deadlocks in the perception layer and affect its access speed and perception efficiency. This paper studies the mathematical feature expression method of task and resource allocation when deadlock occurs in the perception layer. According to the conditions of deadlock mutual exclusion, non preemption, request and hold, cycle waiting, a deadlock detection model of hierarchical scheduling system based on time constraints is adopted to establish the time constraint relationship of the deadlock detector and the genetic algorithm is applied to solve the problem of multi-tasks deadlock relieving strategy optimization in the perceptive layer. The research results and simulation experiments show that the deadlock relieving optimization method based on genetic algorithm can quickly relieve the deadlock, ensure the minimum cost of relieving, and significantly improve the efficiency of deadlock relieving.<\/jats:p>","DOI":"10.3233\/jifs-179824","type":"journal-article","created":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T11:54:07Z","timestamp":1589889247000},"page":"7521-7529","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["IoT perception layer scheduling deadlock relieving optimization method"],"prefix":"10.1177","volume":"38","author":[{"given":"Yuebin","family":"Zhou","sequence":"first","affiliation":[{"name":"Department of Mechanical Engineering, Hubei University of Arts &amp; Science, Xiangyang, China"}]},{"given":"Jianlong","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Shantou University, Shantou, China"}]}],"member":"179","published-online":{"date-parts":[[2020,5,18]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"699","article-title":"Synchronized Progress in Interconnection Networks (SPIN): A New Theory for Deadlock Freedom","author":"Ramrakhyani A.","year":"2018","unstructured":"RamrakhyaniA., GratzP.V., KrishnaT., Synchronized Progress in Interconnection Networks (SPIN): A New Theory for Deadlock Freedom, International Symposium on Computer Architecture (2018), 699\u2013711.","journal-title":"International Symposium on Computer Architecture"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3204947"},{"issue":"6","key":"e_1_3_2_4_2","first-page":"1551","article-title":"Internet of things based vehicle monitoring system","volume":"4","author":"Kaley G.","year":"2017","unstructured":"KaleyG., NairG., DeshmukhM., Internet of things based vehicle monitoring system, International Research Journal of Engineering and Technology4(6) (2017), 1551\u20131554.","journal-title":"International Research Journal of Engineering and Technology"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.08.016"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.11.021"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/s18072093"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28466-3_50"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlamp.2016.05.003"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40092-018-0278-2"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89366-2_5"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2014.2376471"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2018.1.00020"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2017.1.00014"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.4064\/cm6959-8-2016"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169367"},{"key":"e_1_3_2_18_2","first-page":"118","article-title":"Deadlock Detection in Distributed Systems Using the IMDS Formalism and Petri Nets","author":"Daszczuk W.B.","year":"2017","unstructured":"DaszczukW.B., ZuberekW.M., Deadlock Detection in Distributed Systems Using the IMDS Formalism and Petri Nets, Advances in Dependability Engineering of Complex Systems, Depcos-relcomex (2017), 118\u2013130.","journal-title":"Advances in Dependability Engineering of Complex Systems, Depcos-relcomex"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2537335"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.11.011"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.21042\/AMNS.2018.1.00008"},{"issue":"02","key":"e_1_3_2_22_2","first-page":"428","article-title":"Deadlock avoiding based on future lockset","volume":"54","author":"Yu Z.","year":"2017","unstructured":"YuZ., SuX., QiP., MaP., Deadlock avoiding based on future lockset, Journal of Computer Research and Development54(02) (2017), 428\u2013445.","journal-title":"Journal of Computer Research and Development"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179824","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-179824","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-179824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:40Z","timestamp":1777455700000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-179824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,18]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,6,25]]}},"alternative-id":["10.3233\/JIFS-179824"],"URL":"https:\/\/doi.org\/10.3233\/jifs-179824","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,18]]}}}