Next Article in Journal
Aqueous-Organic Phase Transfer of Gold and Silver Nanoparticles Using Thiol-Modified Oleic Acid
Previous Article in Journal
In Situ Measurement of Alkali Metals in an MSW Incinerator Using a Spontaneous Emission Spectrum
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Theory of Regions for Control Synthesis without Computing Reachability Graph

1
Laboratoire de Génie Industriel, de Production et de Maintenance (LGIPM), Université de Lorraine, UFR MIM, île du Saulcy–BP 50128, 57045 Metz, France
2
ICN Business School, 54003 Metz-Nancy, France
*
Author to whom correspondence should be addressed.
Appl. Sci. 2017, 7(3), 270; https://doi.org/10.3390/app7030270
Submission received: 11 January 2017 / Accepted: 3 March 2017 / Published: 9 March 2017

Abstract

:
This paper addresses the design of Petri net (PN) supervisor using the theory of regions for forbidden state problem with a set of general mutual exclusion constraints. In fact, as any method of supervisory control based on reachability graph, the theory of regions suffers from a technical obstacle in control synthesis, which is the necessity of computing the graph at each iteration step. Moreover, based on the reachability graph, which may contain a large number of states, with respect to the structural size of the system, the computation of PN controllers becomes harder and even impossible. The main contribution of this paper, compared to previous works, is the development of a control synthesis method in order to decrease significantly the computation cost of the PN supervisor. Thus, based on PN properties and mathematical concepts, the proposed methodology provides an optimal PN supervisor for bounded Petri nets following the interpretation of the theory of regions. Finally, case studies are solved by CPLEX software to compare our new control policy with previous works which use the theory of regions for control synthesis.

1. Introduction

Petri nets (PNs) present an effective tool to model and analyze Discrete Event Systems [1]. They have compact structures and can be represented in the form of matrices. Indeed, PNs can be analyzed by linear algebras. They play an important role in addressing the deadlock problems and analyzing the behavior of flexible manufacturing system [2,3,4,5]; a flexible manufacturing system can be defined as a computer controlled production system capable of processing a variety of part types. The flexibility of the system gives manufacturing firms an advantage in a quickly changing manufacturing environment [6].
In the framework of PNs, several approaches, such as the theory of regions, have been conducted for synthesizing PN controllers. The objective is to determine a convenient set of places and arcs connecting them to the transitions that, once added to a given PN plant model, will prevent the whole system from reaching forbidden states This PN controller is a designed subpart of the PN added to the controlled model. The theory of regions (TR) was initially proposed by Badouel and Darondeau [7] to design a bounded PN from a given reachability graph. Indeed, the set of all possible markings reachable from the initial marking with their all possible firing transitions is denoted a reachability graph (RG) [1] A PN is said bounded if it is k -bounded for k > 0 , i.e., the number of tokens in all places of the PN does not exceed k . Nevertheless, TR has been newly interpreted for control synthesis problem by Ghaffari et al. to calculate an optimal PN supervisor. This PN controller is capable of satisfying a given control specification [8,9]. Indeed, this theory can be presented by a linear system composed of three classes of conditions: the reachability conditions, the Marking/transition separation instances (MTSI) conditions and basic cycle equations. The resolution of this linear system leads to the design of a PN controller which is a set of control places.
However, the steps of generating and analyzing the reachability graph present difficult tasks that weigh down heavily on the process of calculating PN controllers. Moreover, the combinatorial explosion of states in the RG complicates the calculation of PN controllers. Since computing time costs money, the objective of this work is to apply the TR for supervisory control without computing the RG in order to ease the supervisor calculation and eventually reduce the production cost.
In an industrial context, different products can be performed at the same time which can increase the control constraints and incite the monitor to make the necessary adjustments in order to control the system and maximize the production with less time.
In fact, many studies have been conducted on reachability graph analysis which represents a significant technique for synthesizing optimal/near-optimal PN controllers [10,11,12,13]. In [13], a RG based method is developed to calculate an optimal PN supervisor with the fewest control places for FMS modeled by PN. The RG is divided into a live zone and deadlock zone. The states in live zone are legal ones for a Flexible manufacturing system (FMS), and those in deadlock zone are deadlock or will lead to deadlocks. In [10], a vector covering method is used to reduce the number of markings to consider in the synthesis of PN controllers. An optimal supervisor with the fewest control places can be designed by solving a Minimal number of control places problem (MCCP). The PN controller obtained is optimal and structurally minimal in terms of the number of control places. However, it has a limitation: the computational burden is extremely hard, mainly for large models.
In addition, in Zhao et al. [14], a new method for supervisory control is developed using a divide-and-conquer strategy. Compared with most of traditional global-conquer methods of Uzam and Zhou [15,16], the computational efficiency of PN supervisors is improved. Nevertheless, as the number of shared resources in uncontrolled systems has increased, too many subsystems should be disposed. Thereby, as the net system size becomes larger, the improvement of this divide-and-conquer method will be impeded.
Our new control policy is based on the researches addressed on the use of the theory of regions. Up until now, the TR is recognized as one of the powerful method for deadlock prevention and supervisory control policies for obtaining maximally permissive PN controllers [8,9] which bans the set of forbidden states MI; unlike a legal marking, any state that does not comply with a control constraint is a non-legal state in the graph and will be denoted a forbidden marking M MI . In fact, many research works sought to lower the computational burden of the theory of regions; in [17], the authors used the siphons-approach before using the TR to synthesize PN controllers. Besides, in [18], a new method is developed for deadlocks prevention to decrease the number of reachability conditions of TR in order to facilitate the supervisor calculation. Their experimental results seems to be the most effective approach in deadlock prevention policy compared with existing works of [15,19,20]. Unfortunately, the computation of RG and its analysis to determine the basic cycles and the legal/forbidden markings for this method are still heavy.
However, the methods able to apply the theory of regions for control synthesis without computing the reachability graph have not been investigated. This paper sheds new light on TR simplification by eliminating the RG calculation and avoiding the combinatorial explosion of states which is a meaningful step for RG-based method. In addition, this work is only focused on bounded PNs.
In our previous works [21,22,23,24,25], a new method of minimal cuts in RG is developed using the theory of regions. Through this approach, we have also minimized the computational cost of PN supervisor using the TR on specific areas of the graph and not on the whole RG. Nonetheless, the graph generation step and its analysis are inevitable.
Accordingly, to reduce the computational burden of the TR, the RG generation step should be abandoned. In fact, based on PN properties and mathematical theories, one can speed up the synthesis process of PN controller. Consequently, the criterion of computation time of PN controllers will be a key factor in the comparison of this work with the previous ones [8,23].
The rest of this paper is structured as follows. Section 2 depicts the background of the theory of regions and PN tools. Section 3 introduces the concept of our new methodology for control synthesis. Next, three case studies will be given in Section 4 in order to illustrate the contribution of the proposed approach. Section 5 presents the results of comparison with previous works. Finally, conclusions are drawn in the Section 6.

2. Background

A Petri net is a directed graph consisting of places, transitions and valued arcs connecting them. Formally, a PN is a bipartite graph N = ( T , P , P r e , P o s t ) . P is a finite set of places. T is a finite set of transitions [1]. P r e : P × T is the pre-incidence function that specify weighted arcs from P to T . is the set of nonnegative integers. In addition, P o s t : P × T is the post-incidence function that specify weighted arcs from T to P . The transitions of a PN can be partitioned into two disjoint subsets: T u the set of uncontrollable transitions and T c the set of controllable transitions. Controllable transitions can be disabled by the PN controller, while uncontrollable transitions cannot. Let p ( t ) (respectively, p ( t ) ) be the set of output transitions (respectively, input transitions) of the place p . A PN can be represented by the so-called incidence matrix C defined as C ( p , t ) = P o s t ( p , t ) P r e ( p , t ) . Let t ( p ) (respectively, t ( p ) ) the set of output places (respectively, input places) of transition t . Besides, let G ( N , M 0 ) be the reachability graph constructed from the initial marking M 0 of a given PN. Ϻ represents the set of markings M G ( N , M 0 ) . A transition t T is enabled from a marking M (denoted by M [ t > ) if and only if M Pre ( . , t ) if an enabled transition t is fired, it leads to a new marking M such that: M = M + C ( . , t ) . This can be denoted by M [ t > M . A marking M is accessible from a given marking M if there exists a firing sequence σ = t 1 , t 2 t n transforming M into M . By firing a sequence σ any marking M reachable from M 0 satisfies the following state equation of Petri nets:
M = M 0 + C σ
σ : T is a vector of nonnegative integers is the occurrence of transition t i in σ .
Let C be the incidence matrix of marked PN. C ( p i , t j ) = w ( t j , p i ) if t j p ( t ) i , C ( p i , t j ) = w ( p i , t j ) if t j p i ( t ) , else 0. Where w : F is a valuation function of arcs. F ( T × P ) ( P × T ) : Finite set of arcs. A Petri net is k-bounded if the number of tokens in each place does not exceed k. If k = 1, then the PN is said safe. A PN is live if all transitions are live; a transition is said live if it can always be made enabled starting from any reachable marking. A PN is reversible if from any reachable state M there is an enabled sequence to return to the initial marking M 0 .
Let us consider a set of legal markings; such admissible states correspond to a set of general mutual exclusion constraints GMECs. A constraint ( w , K ) defines a set of legal markings [26]:
M ( w , k ) = { M M | w T M K }
A new type of control specification constraint based on sequence transitions is developed in our previous work. This method is called admissible paths constraints APC ( v , C ) which defines a set of legal sequences of transitions [27]:
T ( v , C ) = { σ σ *   | v T σ C }
The theory of regions in control synthesis was proposed by Ghaffari et al. [8,9] using the properties of PN for adding a controller P c to the initial PN model. The PN controller is characterized by its initial marking M 0 ( P c ) and incidence vector C ( P c , . ) . The TR is expressed by a linear system composed of three classes of conditions:
  • Reachability conditions:
    M ( P c ) = M 0 ( P c ) + C ( P c , . ) Γ M 0
    Γ M : Is the path between M 0 and M .
  • MTSI condition: ( M , t ) . is the set of prohibited state transitions. The transition t may lead to a forbidden marking M MI . MI is the set of markings which do not comply with a GMEC:
    M ( P c ) =   M 0 ( P c ) + C ( P c , . ) Γ M + C ( P c , t ) < 0
  • Basic cycle equations:
    t T C ( P c , t ) ·   σ [ t ] = 0 ,   σ R
    σ [ t ] is the algebraic sum of occurrences of t in σ , and R is the desired behavior of the controlled system.
The application of the classical approach of the theory of regions [9] is given in the following example (i.e., see Figure 1). For a given PN (Figure 1a) [23], we firstly generate the reachability graph (Figure 1b). Next, one can analyze the RG to determine existing basic cycles, the legal markings and the forbidden ones (marking M 7 MI ). The linear system of TR is given as follows:
M 0 ( P c ) 0
M 1 ( P c ) = M 0 ( P c ) + C ( P c , t 1 ) 0
M 2 ( P c ) = M 0 ( P c ) + C ( P c , t 1 ) + C ( P c , t 2 ) 0
M 3 ( P c ) = M 0 ( P c ) + C ( P c , t 1 ) + C ( P c , t 2 ) + C ( P c , t 3 ) 0
M 4 ( P c ) = M 0 ( P c ) + 2 C ( P c , t 1 ) + C ( P c , t 2 ) 0
M 5 ( P c ) = M 0 ( P c ) + 2 C ( P c , t 1 ) + 2 C ( P c , t 2 ) 0
M 6 ( P c ) = M 0 ( P c ) + 2 C ( P c , t 1 ) + 2 C ( P c , t 2 ) + C ( P c , t 3 ) 0
M 7 ( P c ) = M 0 ( P c ) + 2 C ( P c , t 1 ) + 2 C ( P c , t 2 ) + C ( P c , t 1 ) < 0
C ( P c , t 1 ) + C ( P c , t 2 ) + C ( P c , t 3 ) + C ( P c , t 4 ) = 0
The resolution of this linear system generates the following PN controller P c : M 0 ( P c ) = 2 ; C ( P c , . ) = ( 1 , 0 , 0 , 1 ) . The addition of this PN controller gives the controlled PN model shown in the Figure 1c.
In the following section, an effective method to avoid the combinatorial explosion of states in the presumed reachability graph will be introduced, where the generation step of RG is overlooked.

3. Design of PN Controller

3.1. Problem Setting

This work is focused on the minimization of the computational cost of the theory of regions by reducing the computation time for the synthesis of PN controllers. For this purpose, a new method based on PN tools and mathematical concepts, is proposed to design a PN supervisor without calculating the reachability graph.
Definition 1.
(Combinations without repetition) A k-combination without repetition of a set A with n elements is an arbitrary subset of A having k elements. If we take k objects among n without repetition and regardless of the appearance order, one can represent the k objects by a part of k-elements from a set with n elements. To determine the number of these provisions, one can determine the number of arrangements of k objects, and divide them by the number of provisions obtained from each other by a permutation: ( n k ) = A k n k ! = C n k .
Definition 2.
(Combination with repetition) A k-combination with repetition of the set A is an arbitrary k-element multi-set of elements from A. If we take k objects among n without repetition and regardless of the appearance order, these objects can appear several times and we cannot represent them either with a part of k elements or with a k-tuple as their placement order is not involved. However, it is possible to represent such provisions with applications called combinations with repetition. The number of k-combinations with repetition of a set with n elements is denoted by Г n k and formally: Г n k = ( n + k 1 k ) .
Definition 3.
(Usable sequence) A sequence is said to be a usable sequence if it leads to a reachable state that may exist in the presumed reachability graph. Let σ U be the set of usable sequences:
σ U = { σ σ * |   M 0 [ σ > M , M G ( N , M 0 ) }
Definition 4.
(Unusable sequence) A sequence is said to be an unusable sequence if it leads to a state that does not exist in the presumed reachability graph. Let σ U N be the set of unusable sequences:
σ UN = { σ σ * |   M 0 [ σ > M , M G ( N , M 0 ) }
Definition 5.
(Prefix of a sequence) Let M I be the set of forbidden markings that does not fulfill a given GMEC and let E be the set of events. A firing sequence of a given forbidden marking σ M I i is a prefix of a sequence v E , if there is another sequence w such that v = σ M I i w . That is, v is the concatenation of σ M I i and w (see Figure 2). If v is a physically possible sequence in the system, then naturally any prefix of v is also a possible sequence in this system.
The key idea of the proposed method is to focus on the determination of the linear system of the theory of regions. Once the three classes of conditions of the TR, i.e., Equations (4)–(6), are defined, one can obtain the PN supervisor by adopting the interpretation of the theory of regions.

3.2. Basic Cycle Equations

Let N = ( P , T , Pre , Post ) be a PN with its incidence matrix C , and let X t be a nonnegative vector of n integers, solution of the equation C . X t = 0 . Let σ be the firing sequence for a legal marking M with σ = X t . The sequence σ is called transition invariant [28]:
C . [ X t 1 X t 2 . . X tn ] = 0
The resolution of this system generates the transition invariants that identify the basic cycle equations:
t T C ( P c , t i ) .   σ [ t ] = 0
Definition 6.
Let τ c y c l e be the set of existing transitions in the basic cycle equations such that:
τ cycle = { t T |   t T C ( P c , t ) .   σ [ t ] = 0 }
As shown in the example of PN given in Figure 3, the application of the transition invariant method generates the cycle equation of the theory of regions: C ( P c , t 1 ) + C ( P c , t 2 ) = 0 .
C . X t = 0 ; [ 1 1 1 1 ] [ x t ( t 1 ) x t ( t 2 ) ] = [ 0 0 ]
{ x t ( t 1 ) x t ( t 2 ) = 0 x t ( t 1 ) + x t ( t 2 ) = 0 X t T = [ 1 1 ] T
Remark 1.
The determination of the reachability conditions/MTSI conditions is equivalent to the identification of paths connecting the initial marking M 0 and the legal/forbidden markings M . Thereby, to deduct this path, it is necessary to identify the corresponding sequence of transitions σ .

3.3. Reachability Conditions

Let P c be the control place to determine. Each marking M that satisfies a given GMEC must be reachable by the controlled PN model. As matter of fact, the reachability condition translates the state equation of Petri nets (1). The difference is that the equation is positively assigned and the reachable marking is legal:
M ( P c ) = M 0 ( P c ) + C . σ M 0
In order to determine all the firing sequences, the combinatorial analysis methods were introduced in our work (i.e., see Definitions 1 and 2).
Proposition 1.
For a safe PN, the set of firing sequences of transitions denoted by S corresponds mathematically to combinations without repetition where i transitions are chosen among τ c y c l e :
| S | = i = 0 card ( τ cycle ) C card ( τ cycle ) i
Proposition 2.
For a k-bounded PN with k > 1 , the set of firing sequences of transitions denoted by S corresponds mathematically to combinations with repetition where i transitions are chosen among τ c y c l e :
| S | = i = 0 card ( τ cycle ) Г card ( τ cycle ) i
A safe PN is a 1-bounded PN (k = 1). Each transition t i τ cycle is fired no more than once in a given sequence σ . Similarly, C card ( τ cycle ) i is a collection of i transitions among card ( τ cycle ) and the transition can be collected at most once. Therefore, the sum of transition combinations i = 0 card ( τ cycle ) C card ( τ cycle ) i = card ( τ cycle ) ! i ! ( card ( τ cycle ) i ) ! corresponds to all firing sequences of transitions ( i = 0 card ( τ cycle ) σ i = S ).

3.4. MTSI Conditions

Up to here, the reachability conditions and the basic cycle equations are known. Furthermore, the initial marking of PN model is given. Through these data and our previous work, one can calculate the MTSI conditions.
Corollary 1.
If the control specification is expressed as GMEC ( w ,   K ) , then the identification of the set of forbidden states MI is possible without generating reachability graph G ( N , M 0 ) using the canonic markings method [25].
Remark 2.
The firing sequences of transitions are generated from the set τ c y c l e and not from T since the cycle equations exist in the desired behavior of the controlled system and not in the whole graph G ( N , M 0 ) .
Since the set MI of forbidden markings is known, one can determine the set of forbidden sequences σ MI . Moreover, the calculation of σ MI can be done in two ways:
  • Algebraic method: By using the state equation: MI = M 0 + C . σ MI
    If det   ( C ) 0 , one can calculate the forbidden sequence σ MI :
    σ MI = ( MI M 0 ) . C 1
  • Canonic markings method [24]: From the GMEC, one can synthesize the forbidden state that does not satisfy the control specification. However, by performing back chaining CH b , one can find the initial marking M 0 :
    CH b = i p ( t i )   |   p t i ( p ) ,   M ( p ) β i
    β i : Is the weight for each fired transition during the back chaining.
Consequently, one can determine the MTSI condition:
M 0 ( P c ) + C . σ MI i < 0
By summarizing, a new interpretation of the theory of regions is developed in this work to determine the linear system formed of Equations (10)–(12).

3.5. Filtering of Sequences S

The filtering step of sequences S is necessary in our work in order to specify the correct linear system of the theory of regions. Indeed, the generation of the set of sequences S with/without repetition gives unusable sequences σ UN and usable sequences σ U (i.e., see Definitions 3 and 4). Therefore, the usable sequences and the basic cycle equations allow us to accurately determine the linear system of the theory of regions.
The filtering of sequences S is performed using the state equation of Petri nets:
M x = M 0 + C . σ i
where M x is the new marking to determine by testing all sequences of the set S.
Thus, the unusable sequences to reject are:
  • Sequences having prefixes σ MI (i.e., see Definition 5);
  • Sequences leading to null markings; and
  • Sequences leading to negative markings (A negative marking is a vector containing at least one negative component).
The synthesis method of PN controllers using the new interpretation of the theory of regions is described in the following Algorithm 1.
Algorithm 1. Algorithm of the synthesis method
Given a PN with its initial marking M 0 and the set of forbidden markings MI, let S be the set of firing transitions sequences.
(1)Determine the basic cycle equations using the transitions invariants method and let τ cycle   be the set of transitions in cycle equations.
(2)If the PN is safe, then determine S with | S | = i = 0 card ( τ cycle ) C card ( τ cycle ) i
If the PN is k-bounded with k > 1, then determine S with | S | = i = 0 card ( τ cycle ) Г card ( τ cycle ) i
(3)Identify from S the set of forbidden firing sequences of transitions σ MI | M 0 [ σ MI >   M ' ,   M ' MI .
(4)Filter the firing sequences of transitions S to get the set σ U of usable sequences
(5)While σ MI do:
(5.1)For each forbidden sequences of transitions σ i σ MI , write the linear system of the theory of regions composed of:
The MTSI condition of the eventual forbidden sequence σ i σ MI
The reachabiliy conditions of the remaining sequences σ U / σ MI
The basic cycle equations
(5.2)Solve the linear system of TR and let ( M 0 ( P ci ) ; C ( P ci , . ) ) be the solution sought.
(6)Remove redundant control places to obtain the controlled Petri net.
In the first three steps, the cycle equations and the sequences S are generated. Thus, one can filter the firing sequences to form the linear system of the theory of regions by using only the usable sequences and the cycle equations. In the following steps, the theory of regions is applied and the PN supervisor is synthesized.
In the next section, three case studies are provided to show that the Algorithm 1 can find an optimal PN supervisor using the theory of regions without computing reachability graph.

4. Case Studies

In this section, three case studies of bounded PNs are solved using CPLEX software with a C program to evaluate our control policy. Notably, the three cases include two subclasses of PN (i.e., safe PNs and k-bounded PNs with k > 0) in order to apply and test the propositions of Section 3.3. Owing to the limitation of paper space, the reachability conditions are not listed in these case studies.
Indeed, in Example 1, the resources are shared and the PN is safe which allow us to calculate the firing sequences using combinations without repetition (i.e., Proposition 1). Then, we can better assess the effectiveness of our method since safe PNs are special cases of PNs.
Next, Examples 2 and 3 model three stations of the FMS installed in our laboratory with k-bounded PNs. Consequently, the sequences of firing transitions will be determined employing combinations with repetition. In fact, Example 2 deals with two assembly stations with a production constraint, while Example 3 models a control quality station with another general mutual exclusion constraint. These two examples represent two real cases of production constraints, which allow us to tackle two real situations of industry.

4.1. Case Study 1

This first case study addresses a PN model with two machines sharing two resources R 1 and R 2 shown in Figure 4. The places P 1 and P 3 materialize two operations. To deal with the organizational and synchronization problem between two processes in parallel which is a current problem, we have to satisfy the following control specification: M ( P 1 ) +   M ( P 3 ) 1 .
  • Basic cycle equations:
The resolution of the equation: C . [ x 1   x 2 x n ] T = 0 gives the basic cycle Equation (10).
C . X t = [ 1 1 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 1 1 1 1 0 1 1 0 0 1 1 ] [ x t ( t 1 ) x t ( t 2 ) x t ( t 3 ) x t ( t 4 ) x t ( t 5 ) x t ( t 6 ) ] = [ 0 0 0 0 0 0 ]
{ x t ( t 1 ) x t ( t 2 ) = 0 x t ( t 2 ) x t ( t 3 ) = 0 x t ( t 4 ) x t ( t 5 ) = 0 x t ( t 5 ) x t ( t 6 ) = 0 x t ( t 2 ) + x t ( t 3 ) x t ( t 4 ) + x t ( t 5 ) = 0 x t ( t 1 ) + x t ( t 2 ) x t ( t 5 ) + x t ( t 6 ) = 0 ( X t 1 ) T = [ 000111 ] ( X t 2 ) T = [ 111000 ]
The corresponding sequences of the basic cycle equations are: σ 1 = ( t 4 t 5 t 6 ) and σ 2 = ( t 1 t 2 t 3 ) . Thus, the basic cycle Equation (10) can be listed as follows:
C ( P ci , t 4 ) + C ( P ci , t 5 ) + C ( P ci , t 6 ) = 0
C ( P ci , t 1 ) + C ( P ci , t 2 ) + C ( P ci , t 3 ) = 0
  • Reachability conditions:
According to the Definition 6, the set τ cycle contains six transitions, i.e., card ( τ cycle ) = 6:
τ cycle = { t 1 ,   t 2 , t 3 , t 4 , t 5 , t 6 }
The PN is safe (k = 1). Then, conforming to the Proposition 1 the set S of firing sequences of transitions is generated through combinations without repetition.
| S | = i = 0 card ( τ cycle ) C card ( τ cycle ) i = i = 0 6 C 6 i = C 6 0 + C 6 1 + C 6 2 + C 6 3 + C 6 4 + C 6 5 + C 6 6 = 64
Afterwards, the sequences S will be filtered conforming to the criteria mentioned in Section 3.4 in order to obtain the usable sequences listed in Table 1.
Finally, by identifying the usable sequences card ( σ U ) = 8, one can obtain the reachability conditions (11).
  • MTSI conditions:
The set of forbidden markings that do not fulfill the control specification are listed in Table 2. In agreement with Corollary 1, the forbidden sequences σMI can be obtained using the canonic markings method and are listed in the Table 3. Then, the MTSI condition can be obtained as follows:
M 0 ( P c ) + C ( P c , t 1 ) + C ( P c , t 4 ) < 0
Furthermore, by applying our algorithm, there is one control place P c obtained when Equations (10)–(12) are solved. The PN controller information is listed in Table 4. Therefore, the controlled PN model is given in Figure 5.

4.2. Case Study 2

A flexible manufacturing system in the Lorraine University contains two assembly stations in which engraved glass pieces are assembled with stands. The physical system and the PN model are presented in Figure 6a,b. The place P 2 models our production machine, while the place P 3 represents a subcontractor production. The capacities of three pieces of the machine and the subcontractor are modeled by C M and C S , respectively. In addition, the place P 1 represents our stock production. Moreover, the entry and exit events of the pallets in annex conveyors are modeled by transitions ( t 1 , t 2 ) and ( t 4 , t 5 ) , respectively. Alternatively, the pallet continues its way in the main conveyor by t 3 . Note that t 3 ,   t 4 and t 5 are uncontrollable.
The following scenario is employed: If P 3 and P 2 represent the subcontractor and the machine, the subcontractor production should be minimized to increase our profits. This control specification can be expressed by the following GMEC: M ( P 2 ) + 2 M ( P 3 ) 3 .
  • Basic cycle equations: C . [ x 1   x 2 x n ] T = 0
C . X t = [ 1 1 0 1 1 1 0 0 1 0 0 1 0 0 1 1 0 0 1 0 0 1 0 0 1 ] [ x t ( t 1 ) x t ( t 2 ) x t ( t 3 ) x t ( t 4 ) x t ( t 5 ) ] = [ 0 0 0 0 0 ]
{ x t ( t 1 ) x t ( t 2 ) + x t ( t 4 ) + x t ( t 5 ) = 0 x t ( t 1 ) x t ( t 4 ) = 0 x t ( t 2 ) x t ( t 5 ) = 0 x t ( t 1 ) + x t ( t 4 ) = 0 x t ( t 2 ) + x t ( t 5 ) = 0 ( X t 1 ) T = [ 0 0 1 0 0 ] ( X t 2 ) T = [ 1 0 0 1 0 ] ( X t 3 ) T = [ 0 1 0 0 1 ]
Consequently, the basic cycle equations can be calculated as follows:
C ( P ci , t 3 ) = 0
C ( P ci , t 1 ) + C ( P ci , t 4 ) = 0
C ( P ci , t 2 ) + C ( P ci , t 5 ) = 0
  • Reachability conditions: The set τ c y c l e contains four transitions, i.e., τ cycle = { t 1 ,   t 2 , t 4 , t 5 }
The PN is k-bounded with k > 1. Thus, one can calculate the firing sequences of transitions using combinations with repetition (i.e., see Proposition 2):
| S | = i = 0 card ( τ cycle ) Г card ( τ cycle ) i = i = 0 4 Г 4 i = Г 4 0 + Г 4 1 + Г 4 2 + Г 4 3 + Г 4 4 = 70
Next, the set S is filtered in order to calculate the usable sequences listed in Table 5, and then one can determine the reachability conditions.
  • MTSI conditions:
The MTSI conditions are calculated using the forbidden sequences σ MI . The sets of forbidden markings and sequences are listed in Table 6 and Table 7. MTSI conditions are:
M 0 ( P c i ) + 2 C ( P c i , t 2 ) < 0
M 0 ( P c i ) + C ( P c i , t 1 ) + 2 C ( P c i , t 2 ) < 0
M 0 ( P c i ) + C ( P c i , t 2 ) + 2 C ( P c i , t 1 ) < 0
According to our new method, two control places P c 1 and P c 2 can be obtained. The detailed information of the PN controllers is shown in Table 8. Consequently, the controlled PN model is given in Figure 7.

4.3. Case Study 3

A bounded PN modeling a quality control station of the FMS is shown in Figure 8a,b. It is the final step in the production process of Lorraine University FMS. The places P 1 , P 2 and P 5 represent the central conveyor, while the annex conveyor is modeled by P 3 . Its capacity is modeled by P 4 . If the piece to manufacture is not in compliance with recommended standard, it will be placed in the waste conveyor represented by the place P 6 . Moreover, P 7 models the priority of a treated piece compared to another untested piece. Note that the transitions t 1 and t 5 are uncontrollable.
In order to maximize manufacturing output, we propose to satisfy the following GMEC; the marking of P 5 plus twice the marking of P 6 must be less than three tokens. This control specification is expressed as follows: M ( P 5 ) + 2 M ( P 6 ) 3 .
  • Basic cycle equations: C . [ x 1   x 2 x n ] T = 0
C . X t = [ 1 1 0 0 0 1 1 1 0 1 0 0 0 0 0 1 0 1 1 0 0 0 1 0 1 0 0 0 0 0 1 1 0 1 0 0 0 0 0 1 0 1 0 1 0 1 0 0 0 ] [ x 1 t x 2 t x 3 t x 4 t x 5 t x 6 t x 7 t ] = [ 0 0 0 0 0 0 0 ]
{ x 1 t x 2 t + x 6 t   + x 7 t = 0 x 1 t x 3 t = 0 x 2 t x 4 t x 5 t = 0 x 2 t + x 4 t = 0 x 3 t + x 4 t x 6 t = 0 x 5 t x 7 t = 0 x 2 t + x 4 t = 0 ( X t 1 ) T = [ 1010010 ] ( X t 2 ) T = [ 0101010 ]
σ 1 = ( t 1 t 3 t 6 ) and σ 2 = ( t 2 t 4 t 6 ) . Then, the basic cycle equations can be listed as follows:
C ( P ci , t 1 ) + C ( P ci , t 3 ) + C ( P ci , t 6 ) = 0
C ( P ci , t 2 ) + C ( P ci , t 4 ) + C ( P ci , t 6 ) = 0
  • Reachability conditions:
The set of existing transitions in the basic cycles is τ cycle = { t 1 ,   t 2 , t 3 , t 4 , t 6 } . The PN is k-bounded with k > 1, therefore:
| S | = i = 0 card ( τ ) Г card ( τ ) i = i = 0 5 Г 5 i = Г 5 0 + Г 5 1 + Г 5 2 + Г 5 3 + Г 5 4 + Г 5 5 = 252
After filtering the sequences S, the usable sequences are given in Table 9 ( Card ( σ U ) = 27).
  • MTSI conditions:
The GMEC is M ( P 5 ) + 2 M ( P 6 ) 3 , then the forbidden markings that do not respect the control specification can be calculated (i.e., see Table 10). Using the canonic markings method, the set of forbidden sequences σ MI can be listed in Table 11. Therefore, the MTSI condition is determined as follows:
M 0 ( P ci ) + 2 C ( P ci , t 1 ) + C ( P ci , t 2 ) + 2 C ( P ci , t 3 ) + C ( P ci , t 5 ) < 0
Nevertheless, the transition t 5 is uncontrollable. Then, a back chaining must be performed to determine the dangerous marking: σ MI 1 t 5 = ( 2 t 1 t 2 t 3 ) . Consequently, the MTSI condition to be considered is:
M 0 ( P ci ) + 2 C ( P ci , t 1 ) + C ( P ci , t 2 ) + 2 C ( P ci , t 3 ) < 0
Finally, the synthesized PN controller P c 1 (i.e., see Table 12) is added to the initial PN to obtain the controlled model shown below (Figure 9).

5. Comparison with Previous Methods

This section presents three tables for comparing our new method with previous works. For convenience, the policy of this work is called R 1 , our prior work [23] is called R 3 and the related research of Ghaffari et al. [8] is called G 2 .
Table 13 lists the comparison results of the first case study with three approaches of supervisory control. Since the RG is generated and contains eight states, one can know that G 2 uses eight markings to design the PN monitor. Then, R 3 improves G 2 by introducing minimal cuts in RG and uses three markings to synthesize the PN controller. However, both of these efficient methods must pay for time consuming. Here, our proposed approach (i.e., R 1 ) that does not generate RG reduced the technology and the theory of regions to obtain the same number of PN monitors. It enhances the computation efficiency of R 3 . Based on the experimental results in Table 13, 3018 ms are needed if one uses R 1 in this example against 6015 ms and 3226 ms for G 2 and R 3 , respectively. As a result, we can infer that R 1 is the most efficient among G 2 and R 3 .
Example 2 is a k-bounded PN model. Based on Table 14, 13 states and five forbidden state transitions are needed to be processed if G 2 or R 3 is used, respectively. Besides, R 3 still needs 7190 ms to design two PN monitors even though the computation time is reduced compared with G 2 which needs 10,593 ms to calculate the same number of control places. Nonetheless, 0 markings and three forbidden state transitions are needed in our policy. Furthermore, R 1 only takes 6216 ms to control the system, which shows that R 1 is faster than G 2 and R 3 . This time difference can be significantly increased if bigger models are analyzed.
Based on the comparison results (i.e., Table 15), 27 markings and 12,120 ms are needed to obtain one PN monitor in G 2 . However, under the minimal cuts policy (i.e., R 3 ), only six markings are handled to calculate the supervisor. It does not seem to be efficient enough since it requires 6110 ms to supervise the quality control station of the FMS. Nevertheless, for the same number of forbidden state transitions and monitors, only 5930 ms are required in our new method that is able to control the FMS without computing any marking. To summarize, R 1 is the best computationally improved optimal control algorithm among existing literatures that use the theory of regions.

6. Conclusions and Future Works

The proposed control synthesis method can be implemented for FMSs and generally for bounded PNs. The underlying notion of the previous work is that the TR must be solved by handling a number of markings which may increase according to the structural size of the system. For this purpose, one must generate the RG and all MTSI in the graph such that they have to pay for the high computation cost. However, PN properties and mathematical concepts are merged in our proposed method to reduce efficiently the computational burden of the TR.
As mentioned above, three case studies are solved using the CPLEX software with a C program in order to compare our new method with the existing optimal policies; as input, one can give the PN model and the GMEC, then one can obtain all information concerning the controlled system in the program output (computing time, control places, incidence vector, etc.). In fact, our control method determines all equations of the linear system of the TR without generating the RG, thus one can avoid the combinatorial explosion of states if bigger models are analyzed. Additionally, PN controllers can be determined with a drastically reduced time. Consequently, this achievement will positively impact the performance of the production systems since the production constraints require immediate actions through rapid adjustments in order to maximize the production. Furthermore, any efficient supervision of any system has a high cost; if a constraint is not satisfied in a timely manner, the production or the security can be directly affected. There are numerous examples, such as the change over time with different constraints, the generation of a new flight plan to face with disruptions in air traffic networks, etc.
Finally, this work provides scientific novelty to control bounded PNs (such as FMS, telecommunication systems, safety systems, air traffic management, rail traffic, etc.) since most previous studies on computing optimal supervisor depend on a complete state enumeration and mixed programming problem. In addition, since the RG-generation step is skipped, our program can handle any bounded PN model, even the biggest.
Hence, in the near future, how to deal with deadlock prevention policy without generating RG is to become an important issue.

Acknowledgments

The authors would like to thank the Applied Sciences and the reviewers for possible evaluation of our manuscript entitled: Theory of Regions for Control Synthesis without Computing Reachability Graph. The authors would also like to thank the ICN Staff and the Lorraine University Senior Technicians for the use of the Flexible Manufacturing System on which the experiments and methods were implemented.

Author Contributions

The authors would like to thank everyone who helped complete this work with their continued efforts and support. Sadok Rezig and Zied Achour conceived and designed the methods and the experiments; Sadok Rezig developed the approaches and the algorithms; Nidhal Rezg and Zied Achour analyzed and evaluated the data; Nidhal Rezg supervised the results; and Sadok Rezig wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations/Acronyms

APCAdmissible paths constraints
DESDiscrete event systems
FMSFlexible manufacturing system
GMECGeneral mutual exclusion constraint
MCCPMinimal number of control places problem
MIForbidden states
MTSIMarking/transition separation instances
PNPetri net
RGReachability graph
TRTheory of regions

References

  1. Murata, T. Petri nets: Properties, analysis and applications. Proc. IEEE 1989, 77, 541–580. [Google Scholar] [CrossRef]
  2. Huang, B.; Shi, X.-X.; Xu, N. Scheduling FMS with alternative routings using Petri nets and near admissible heuristic search. Int. J. Adv. Manuf. Technol. 2012, 63, 1131–1136. [Google Scholar] [CrossRef]
  3. Ezpeleta, J.; Colom, J.M.; Martinez, J. A Petri net based deadlock prevention policy for flexible manufacturing systems. IEEE Trans. Robot. Autom. 1995, 11, 173–184. [Google Scholar] [CrossRef]
  4. Li, Z.W.; Hu, H.S.; Wang, A.R. Design of Liveness-Enforcing Supervisors for Flexible Manufacturing Systems Using Petri Nets. IEEE Trans. Syst. Man Cybern. C 2007, 37, 517–526. [Google Scholar] [CrossRef]
  5. Hu, H.; Zhou, M.; Li, Z.; Tang, Y. Deadlock-Free Control of Automated Manufacturing Systems With Flexible Routes and Assembly Operations Using Petri Nets. IEEE Trans. Ind. Inform. 2013, 9, 109–121. [Google Scholar] [CrossRef]
  6. Tetzlaff, U.A.W. Flexible manufacturing systems. In Optimal Design of Flexible Manufacturing Systems; Physica-Verlag: Heidelberg, Germany, 1990; pp. 5–11. [Google Scholar]
  7. Badouel, E.; Darondeau, P. Theory of regions. In Lectures on Petri Nets I: Basic Models; Reisig, W., Rozenberg, G., Eds.; Springer: Berlin/Heidelberg, Germany, 1998; pp. 529–586. [Google Scholar]
  8. Ghaffari, A.; Rezg, N.; Xie, X. Live and Maximally Permissive Controller Synthesis Using Theory of Regions. In Synthesis and Control of Discrete Event Systems; Caillaud, B., Darondeau, P., Lavagno, L., Xie, X., Eds.; Springer: New York, NY, USA, 2002; pp. 155–166. [Google Scholar]
  9. Ghaffari, A.; Rezg, N.; Xie, X. Net transformation and theory of regions for optimal control of Petri nets. In Proceedings of the IFAC World Congress on Automatic Control, Barcelone, Spain, 21–26 July 2002; p. 6.
  10. Chen, Y.; Li, Z.; Khalgui, M.; Mosbahi, O. Design of a Maximally Permissive Liveness- Enforcing Petri Net Supervisor for Flexible Manufacturing Systems. IEEE Trans. Autom. Sci. Eng. 2011, 8, 374–393. [Google Scholar] [CrossRef]
  11. Chen, Y.; Li, Z. On structural minimality of optimal supervisors for flexible manufacturing systems. Automatica 2012, 48, 2647–2656. [Google Scholar] [CrossRef]
  12. Chen, Y.; Li, Z.; Al-Ahmari, A. Nonpure Petri Net Supervisors for Optimal Deadlock Control of Flexible Manufacturing Systems. IEEE Trans. Syst. Man Cybern. Syst. 2013, 43, 252–265. [Google Scholar] [CrossRef]
  13. Chen, Y.; Li, Z.; Zhou, M. Optimal Supervisory Control of Flexible Manufacturing Systems by Petri Nets: A Set Classification Approach. IEEE Trans. Autom. Sci. Eng. 2014, 11, 549–563. [Google Scholar] [CrossRef]
  14. Zhao, M.; Uzam, M.; Hou, Y. A divide-and-conquer method for the synthesis of non-blocking supervisors for flexible manufacturing systems. In Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering (CASE), New Taipei, Taiwan, 18–22 August 2014; pp. 455–460.
  15. Uzam, M.; Zhou, M.C. An improved iterative synthesis method for liveness enforcing supervisors of flexible manufacturing systems. Int. J. Product. Res. 2006, 44, 1987–2030. [Google Scholar] [CrossRef]
  16. Uzam, M.; Zhou, M. An Iterative Synthesis Approach to Petri Net-Based Deadlock Prevention Policy for Flexible Manufacturing Systems. IEEE Trans. Syst. Man Cybernet. A Syst. Hum. 2007, 37, 362–371. [Google Scholar] [CrossRef]
  17. Li, Z.; Zhao, M. On Controllability of Dependent Siphons for Deadlock Prevention in Generalized Petri Nets. IEEE Trans. Syst. Man Cybernet. A Syst. Hum. 2008, 38, 369–384. [Google Scholar]
  18. Huang, Y.S.; Pan, Y.L. An improved maximally permissive deadlock prevention policy based on the theory of regions and reduction approach. IET Control Theory Appl. 2011, 5, 1069–1078. [Google Scholar] [CrossRef]
  19. Uzam, M.; Gelen, G. The real-time supervisory control of an experimental manufacturing system based on a hybrid method. Control Eng. Pract. 2009, 17, 1174–1189. [Google Scholar] [CrossRef]
  20. Park, J.; Reveliotis, S.P. Algebraic synthesis of efficient deadlock avoidance policies for sequential resource allocation systems. IEEE Trans. Robot. Autom. 2000, 16, 190–195. [Google Scholar] [CrossRef]
  21. Rezig, S.; Achour, Z.; Rezg, N.; Kammoun, M.-A. Optimal control synthesis for a flexible manufacturing system based on minimal cuts. In Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Johor Bahru, Malaysia, 9–12 December 2014; pp. 254–258.
  22. Rezig, S.; Achour, Z.; Rezg, N. Control synthesis based on reachability graph with minimal cuts: Application to a flexible manufacturing system. In Proceedings of the Emerging Technology and Factory Automation (ETFA), Barcelona, Spain, 16–19 September 2014; pp. 1–6.
  23. Rezig, S.; Achour, Z.; Rezg, N.; Kammoun, M.-A. Supervisory control based on minimal cuts and Petri net sub-controllers coordination. Int. J. Syst. Sci. 2015, 0, 1–11. [Google Scholar] [CrossRef]
  24. Rezig, S.; Achour, Z.; Rezg, N. Control Synthesis Based on Theory of Regions with Minimal Reachability Graph Knowledge. IFAC-Pap. Online 2016, 49, 1383–1388. [Google Scholar] [CrossRef]
  25. Rezig, S.; Achour, Z.; Rezg, N. Optimal Control Synthesis for Flexible Manufacturing System Based on Canonic Markings. In Proceedings of the 2015 IEEE International Conference on Automation Science and Engineering (CASE), Gothenburg, Sweden, 24–28 August 2015.
  26. Giua, A.; DiCesare, F.; Silva, M. Generalized mutual exclusion contraints on nets with uncontrollable transitions. In Proceedings of the 1992 IEEE International Conference on Systems, Man, and Cybernetics, Chicago, IL, USA, 18–21 October 1992; pp. 974–979.
  27. Rezg, N.; Rezig, S.; Kammoun, M.A.; Achour, Z. Control synthesis for admissible paths based on theory of regions: Application to a flexible manufacturing system. In Proceedings of the 2014 IEEE Conference on Control Applications (CCA), Nice, France, 8–10 October 2014; pp. 1807–1811.
  28. Kroening, D.; Sharygina, N.; Tsitovich, A.; Wintersteiger, C.M. Termination Analysis with Compositional Transition Invariants. In Proceedings of the International Conference on Computer-Aided Verification (CAV), Edinburgh, UK, 15–19 July 2010; pp. 89–103.
Figure 1. Example of PN model: (a) PN model; (b) Reachability graph; and (c) Controlled PN model.
Figure 1. Example of PN model: (a) PN model; (b) Reachability graph; and (c) Controlled PN model.
Applsci 07 00270 g001
Figure 2. Prefix of a given sequence.
Figure 2. Prefix of a given sequence.
Applsci 07 00270 g002
Figure 3. Example of PN with reachability graph.
Figure 3. Example of PN with reachability graph.
Applsci 07 00270 g003
Figure 4. PN model with shared resources.
Figure 4. PN model with shared resources.
Applsci 07 00270 g004
Figure 5. The controlled PN 1.
Figure 5. The controlled PN 1.
Applsci 07 00270 g005
Figure 6. Flexible manufacturing system: (a) experimental environment; and (b) PN model.
Figure 6. Flexible manufacturing system: (a) experimental environment; and (b) PN model.
Applsci 07 00270 g006
Figure 7. The controlled PN 2.
Figure 7. The controlled PN 2.
Applsci 07 00270 g007
Figure 8. Quality control station: (a) experimental environment; and (b) PN model.
Figure 8. Quality control station: (a) experimental environment; and (b) PN model.
Applsci 07 00270 g008
Figure 9. The controlled PN 3.
Figure 9. The controlled PN 3.
Applsci 07 00270 g009
Table 1. Usable sequences of Example 1.
Table 1. Usable sequences of Example 1.
Sequence No.σ = (t1t2t3t4t5t6)
σ1(0 0 0 0 0 0)
σ2(1 0 0 0 0 0)
σ3(0 0 0 1 0 0)
σ4(1 1 0 0 0 0)
σ5(0 0 0 1 1 0)
σ6(0 0 0 2 1 0)
σ7(2 1 0 0 0 0)
σ8(1 0 0 1 0 0)
Table 2. Forbidden markings (P1P3) of Example 1.
Table 2. Forbidden markings (P1P3) of Example 1.
M(P1)M(P3)
11
Table 3. Forbidden sequences of Example 1.
Table 3. Forbidden sequences of Example 1.
Sequence No.σMIi = (t1t2t3t4t5t6)
σ MI 1 ( 100100 )
Table 4. PN controllers of Example 1.
Table 4. PN controllers of Example 1.
Additional Control PlacesM0i(Pci)C(Pci,.)
P c 3 ( 2 , 1 , 1 , 2 , 1 , 1 )
Table 5. Usable sequences of Example 2.
Table 5. Usable sequences of Example 2.
Sequence No.σi = (t1t2t3t4t5)Sequence No.σi = (t1t2t3t4t5)
σ 1 ( 00000 ) σ 10 ( 21000 )
σ 2 ( 10000 ) σ 11 ( 13000 )
σ 3 ( 01000 ) σ 12 ( 22000 )
σ 4 ( 20000 ) σ 13 ( 31000 )
σ 5 ( 02000 ) σ 14 ( 40000 )
σ 6 ( 11000 ) σ 15 ( 04000 )
σ 7 ( 30000 ) σ 16 ( 11100 )
σ 8 ( 03000 ) σ 17 ( 11110 )
σ 9 ( 12000 ) σ 18 ( 11111 )
Table 6. Forbidden markings (P2P3) of Example 2.
Table 6. Forbidden markings (P2P3) of Example 2.
M(P2)M(P3)
02
12
21
31
13
40
04
Table 7. Forbidden sequences of Example 2.
Table 7. Forbidden sequences of Example 2.
Sequence No.σMIi = (t1t2t3t4t5)
σ MI 1 ( 21000 )
σ MI 2 ( 12000 )
σ MI 3 ( 02000 )
σ MI 4 ( 22000 )
σ MI 5 ( 31000 )
σ MI 6 ( 13000 )
σ MI 7 ( 03000 )
Table 8. PN controllers of Example 2.
Table 8. PN controllers of Example 2.
Additional Control PlacesM0i(Pci)C(Pci,.)
P c 1 1 ( 0 , 1 , 0 , 0 , 1 )
P c 2 3 ( 1 , 2 , 0 , 1 , 2 )
Table 9. Usable sequences of Example 3.
Table 9. Usable sequences of Example 3.
Sequence No.σi = (t1t2t3t4t5t6t7)Sequence No.σi = (t1t2t3t4t5t6t7)
σ 1 ( 0   0   0   0   0   0   0 ) σ 15 ( 2   1   0   0   1   0   0 )
σ 2 ( 0   1   0   0   0   0   0 ) σ 16 ( 1   1   1   0   1   0   0 )
σ 3 ( 1   0   0   0   0   0   0 ) σ 17 ( 2   0   2   0   0   0   0 )
σ 4 ( 0   1   0   0   1   0   0 ) σ 18 ( 2   1   1   0   0   0   0 )
σ 5 ( 1   0   1   0   0   0   0 ) σ 19 ( 3   0   1   0   0   0   0 )
σ 6 ( 1   1   0   0   0   0   0 ) σ 20 ( 2   1   0   0   1   0   1 )
σ 7 ( 2   0   0   0   0   0   0 ) σ 21 ( 1   1   1   0   1   0   1 )
σ 8 ( 0   1   0   0   1   0   1 ) σ 22 ( 2   1   1   0   1   0   0 )
σ 9 ( 1   1   0   0   1   0   0 ) σ 23 ( 2   1   2   0   0   0   0 )
σ 10 ( 1   1   1   0   0   0   0 ) σ 24 ( 2   1   1   1   0   0   0 )
σ 11 ( 2   0   1   0   0   0   0 ) σ 25 ( 3   1   0   0   1   0   1 )
σ 12 ( 2   1   0   0   0   0   0 ) σ 26 ( 2   1   1   0   1   0   1 )
σ 13 ( 3   0   0   0   0   0   0 ) σ 27 ( 2   1   2   1   0   0   0 )
σ 14 ( 1   1   0   0   1   0   1 )
Table 10. Forbidden markings (P5P6) of Example 3.
Table 10. Forbidden markings (P5P6) of Example 3.
M(P5)M(P6)
21
Table 11. Forbidden sequences of Example 3.
Table 11. Forbidden sequences of Example 3.
Sequence No.σMIi = (t1t2t3t4t5t6t7)
σ MI 1 ( 2120100 )
Table 12. PN controllers of Example 3.
Table 12. PN controllers of Example 3.
Additional Control PlacesM0i(Pci)C(Pci,.)
P c 3 ( 0 , 1 , 1 , 1 , 0 , 1 , 0 )
Table 13. Comparison results of case study 1.
Table 13. Comparison results of case study 1.
ApproachNo. of MonitorsNo. of MarkingsNo. of Forbidden State Transitions ΩComputation Time (ms)Method
R 1 1013018Without reachability graph
G 2 1816015Reachability graph based
R 3 1313226Minimal cuts based
Table 14. Comparison results of case study 2.
Table 14. Comparison results of case study 2.
ApproachNo. of MonitorsNo. of MarkingsNo. of Forbidden State Transitions ΩComputation Time (ms)Method
R 1 2036216Without reachability graph
G 2 213510,593Reachability graph based
R 3 21357190Minimal cuts based
Table 15. Comparison results of case study 3.
Table 15. Comparison results of case study 3.
ApproachNo. of MonitorsNo. of MarkingsNo. of Forbidden State Transitions ΩComputation Time (ms)Method
R 1 1025930Without reachability graph
G 2 127212,120Reachability graph based
R 3 1626110Minimal cuts based

Share and Cite

MDPI and ACS Style

Rezig, S.; Achour, Z.; Rezg, N. Theory of Regions for Control Synthesis without Computing Reachability Graph. Appl. Sci. 2017, 7, 270. https://doi.org/10.3390/app7030270

AMA Style

Rezig S, Achour Z, Rezg N. Theory of Regions for Control Synthesis without Computing Reachability Graph. Applied Sciences. 2017; 7(3):270. https://doi.org/10.3390/app7030270

Chicago/Turabian Style

Rezig, Sadok, Zied Achour, and Nidhal Rezg. 2017. "Theory of Regions for Control Synthesis without Computing Reachability Graph" Applied Sciences 7, no. 3: 270. https://doi.org/10.3390/app7030270

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop