You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

28 November 2025

D3MV: Detecting Deficient Data in Intelligent Software Systems via Model Verification

,
and
1
School of Computer Science and Engineering, Nanyang Technological University, Singapore 639798, Singapore
2
School of Computer Science and Technology, Zhejiang Sci-Tech University, Hangzhou 310018, China
*
Authors to whom correspondence should be addressed.
This article belongs to the Section Computer Science & Engineering

Abstract

The integration of data-driven, intelligent components, particularly those based on Artificial Neural Network (ANN), is pivotal for enabling software systems to adapt to dynamic environments. However, the performance of these hybrid systems is critically dependent on the quality of their training data. Deficiencies in this data can propagate through the ANN, leading to violations of key system properties that are difficult to trace back to their root cause. To address this challenge, this paper introduces D 3 M V , a novel verification-based methodology for tracing system-level property violations back to specific deficient training data. Our approach involves constructing a unified system model (Adaptive Petri Net) that integrates traditional components with ANNs, extracting interpretable fuzzy rules from the trained network to bridge the semantic gap, and employing model checking for formal verification. When a property is violated, a novel inverse mapping technique leverages the implicated fuzzy rules to pinpoint the responsible data samples in the training set. Experimental validation using a manufacturing case study demonstrates that the method D 3 M V successfully identified deficient data causing property violations. After replacing 200 problematic data samples and updating the model, the revised system met all specified performance metrics. This preliminary result suggests that by improving data quality, our approach helps ensure system reliability.

1. Introduction

The architecture of modern software systems is increasingly characterized by the integration of data-driven, intelligent components with traditional software modules. These intelligent components, often fundamentally modeled by Artificial Neural Networks (ANNs), are primarily responsible for complex decision-making tasks. This hybrid design endows systems with a significant advantage: the capacity to learn from new requirements and dynamically adapt to evolving environmental conditions. Consequently, such systems are now pivotal in a wide array of domains, including autonomous robotics, unmanned aerial vehicles, and intelligent manufacturing, where runtime decision-making is critical.
The performance and reliability of these composite systems are inherently dependent on the quality of their intelligent core. As the primary decision-making entity, the behavior of an ANN component directly influences the overall system behavior. However, the quality of an ANN is not determined by static, human-defined logic but is instead highly contingent upon the data used for its training. Therefore, deficiencies within the training data (i.e., deficient data), such as inaccuracies, noise, mislabeling or a lack of representativeness, can severely degrade the ANN’s performance. Crucially, it is these very training samples that, when used to train neural network components, can lead to system-level property violations even when the network meets traditional accuracy metrics. This phenomenon specifically refers to data that induces incorrect decision boundaries in critical regions of the input space. When a compromised ANN is embedded within a larger system, these performance deficits propagate, ultimately leading to erroneous or sub-optimal decisions at the system level.
The challenge of mitigating data-centric deficiencies is compounded by the inherent difficulties in their detection. This problem manifests in two primary phases of the ANN lifecycle. First, during the training phase, the selection of appropriate data is largely guided by human expertise, with no established standard to definitively ascertain the suitability of a given dataset. Second, the testing and validation paradigm for ANNs diverges fundamentally from that of traditional software. In conventional software testing, outputs are expected to match specified requirements exactly. In contrast, ANN testing involves adjusting model parameters until the discrepancy between actual and expected outputs falls within an acceptable, often statistically defined, range. This inherent acceptance of uncertainty during validation means that latent data flaws can remain undetected.
Ultimately, this uncertainty is not contained within the ANN but is passed on to the traditional software components that depend on its outputs. This propagation creates a critical challenge for system reliability and debugging, as it becomes exceptionally difficult to trace faulty system-level behavior back to its root cause in deficient training data.
To address this fundamental challenge, this paper proposes a verification-based method D 3 M V that systematically traces system-level property violations back to specific deficiencies in training data. Our methodology follows three key phases: (1) constructing a unified system model integrating both conventional components and neural networks; (2) extracting interpretable fuzzy rules from the neural network to bridge the semantic gap between data-driven computation and formal reasoning; and (3) applying model checking to verify system properties. When property violations are detected, they are mapped back through the corresponding fuzzy rules to precisely identify the responsible data samples via a novel inverse mapping technique. To the best of our knowledge, this represents the first work that enables formal tracing from system-level anomalies to data deficiencies through model verification. Given its foundation in general ANN architectures, the proposed method shows significant potential for extension to other AI paradigms.
The main contributions of this work are as follows:
  • A novel framework that formally links system property violations to specific training data deficiencies;
  • An integrated approach combining fuzzy rule extraction with model checking; and
  • The first application of model verification for data deficiency tracing.
The remainder of this paper is structured as follows. Section 2 reviews related work in the field. Section 3 presents our proposed methodology for deficient data detection based on model verification. Section 4 demonstrates the application of this methodology through a case study on deficient data tracing in manufacturing systems. Finally, Section 5 concludes the paper and discusses potential future research directions

3. Model Verification-Based Methodology for Deficient Data Detection

The overall framework of our proposed D 3 M V approach, depicted in Figure 1, follows a coherent analytical pipeline that begins with the construction of a unified system model from both software requirements and sample data. Components with explicit behavior scenarios are formally captured using Petri Nets (PNs), while those characterized solely by input–output relationships are modeled via Neural Networks (NNs). These elements are integrated into an Adaptive Petri Net (APN), which extends conventional Petri Nets through the introduction of neural network-based A-transitions to represent learning and adaptive behavior. To enable formal verification, the Adaptive Petri Net is subsequently transformed into a Hybrid Petri Net (HPN), making it amenable to analysis by the KeYmaera prover—a specialized tool for hybrid systems. Through model checking, system properties are rigorously verified, and any violations are systematically traced back to fuzzy rules extracted from the neural component. Finally, a novel inverse mapping mechanism links these rules to specific subsets of the training data, thereby identifying the deficient samples responsible for the observed anomalies.
Figure 1. The framework of D 3 M V .

3.1. Construction of the Adaptive Petri Net Model

To establish a unified formal foundation for modeling both conventional software components and neural network-based intelligent components, we introduce the Adaptive Petri Net as our primary modeling formalism.

3.1.1. Adaptive Petri Net

The Adaptive Petri Net extends the classical Hybrid Petri Net framework by incorporating specialized transitions that embed neural network functionalities, enabling the representation of learning and adaptive behaviors within a rigorous semantic structure.
According to the definition from the study [16], an Adaptive Petri Net is formally defined as a subclass of Petri net ( P , T , F ) that comprises three fundamental components:
  • A set of closed process nets { P N o , o = 1 , 2 , , g } ;
  • A set of closed learning process nets { P N C L i , i = 1 , 2 , , k } ; and
  • A set of Rendezvous communication mechanisms { C M Q j , j = 1 , 2 , , l } .
These components are constrained by the following conditions:
  • Each closed (learning) process net communicates through at least one communication mechanism; and
  • Each communication mechanism is used for exactly one pair of process nets.
Structurally, an Adaptive Petri Net integrates several key elements that enable its adaptive capabilities. The framework incorporates both discrete and continuous components, where discrete places (D-places) and transitions (D-transitions) model the system’s logical states, while continuous places (C-places) and transitions (C-transitions) capture the dynamics of the environment. Central to its adaptability are the adaptive transitions (A-transitions), which are special transitions that encapsulate neural network sub-models, thereby enabling data-driven decision-making within the net’s execution flow.

3.1.2. Model Construction Methodology

The construction of an Adaptive Petri Net from hybrid software requirements follows a systematic integration process:
The first step: Deterministic Component Modeling. For requirements with well-defined behavioral scenarios, we apply the automated approach by Ding et al. [17] to extract regular Petri net models from textual specifications. This generates the foundational D-places, D-transitions, and their connectivity patterns.
The second step: Neural Component Extraction. For data-driven requirements characterized by input–output relationships, we train three-layer backpropagation neural networks on available sample data. The trained networks are mapped to A-transitions, with input and output layers connected to corresponding C-places representing continuous variables.
The third step: Model Integration. The deterministic and neural components are integrated by establishing connections through interface places based on the captured boundary dependencies. The integration ensures the following:
  • Data flow between conventional and neural components maintains type consistency.
  • Temporal dependencies are preserved through appropriate place-transition connectivity.
  • The composite model maintains the liveness and boundedness properties of the constituent subnets.
This structured construction approach ensures that the resulting Adaptive Petri Net faithfully captures both the deterministic logic from requirements specifications and the adaptive capabilities from data-driven learning components, providing a comprehensive model for subsequent formal analysis and verification.

3.2. Transformation from Adaptive Petri Net to Hybrid Petri Net

Now we have an Adaptive Petri Net to model an intelligent software system, but it cannot be directly analyzed by model checkers since the structure of an ANN is a computing model, not a state model. Therefore, we need to transform this Adaptive Petri Net model into an equivalent model that can be analyzed by a model checker. In this paper, we transform an Adaptive Petri Net into a Hybrid Petri Net model. This process is divided into two steps.
The Adaptive Petri Net provides a unified model for intelligent software systems, integrating both traditional components and neural network-based A-transitions. However, the subsymbolic nature of neural networks prevents direct application of formal verification techniques. To enable model checking, the Adaptive Petri Net must be transformed into a Hybrid Petri Net, a formalism amenable to analysis by tools such as KeYmaera. This transformation is accomplished through a two-stage process: extracting interpretable fuzzy rules from the embedded neural networks, and converting these rules into a Fuzzy Petri Net structure compatible with the HPN.

3.2.1. Extraction of Fuzzy Rules from the Neural Network

To bridge the gap between neural computation and symbolic verification, we employ the method by Enbutsu et al. [18] to extract fuzzy rules from the A-transitions. This approach quantifies the influence between neurons using a Causal Index (CI), defined as the normalized sum of products of synaptic weights along all paths between two neurons. Formally, the CI from an input neuron x i to an output neuron y k in a multi-layer perceptron is computed as:
C I ( x i , y k ) = p paths ( x i , y k ) w p w j = 1 n p paths ( x j , y k ) w p w
Subsequently, the Relative Index (RI) is derived to compare the influence of neurons within the same layer. The rule extraction procedure is as follows:
  • Identify the output neuron y k with the highest relative activation degree.
  • Determine the output proposition y O with the strongest causal link to y k ; this forms the rule’s conclusion.
  • Locate the input neuron x I with the highest RI value influencing y O ; this constitutes the rule’s condition.
This process yields fuzzy rules of the form “IF x I THEN y O ”, approximating the neural network’s decision logic.

3.2.2. Transformation of Fuzzy Rules into a Fuzzy Petri Net

The extracted fuzzy rules are integrated into the Hybrid Petri Net by using a Fuzzy Petri Net representation based on Chen et al. [19,20]. Each fuzzy rule of the form:
R i : IF d j , THEN d k ( C F = μ i )
where d j and d k are fuzzy propositions and μ i is the certainty factor, is mapped to an FPN structure as follows:
  • A place p j represents the antecedent proposition d j , holding a token with a truth value in [ 0 ,   1 ] .
  • A place p k represents the consequent proposition d k , similarly associated with a truth value.
  • A transition t i connects p j to p k , annotated with the certainty factor μ i .
The firing semantics of t i compute the truth value of d k as the product of the truth value of d j and μ i . This structure, illustrated in Figure 2, enables the Hybrid Petri Net to model both precise and approximate reasoning within a unified verification framework.
Figure 2. The FPN representation of a fuzzy rule R i .

3.3. Identification of Defective Components via Model Checking

3.3.1. Model Checking of Hybrid Petri Nets

To verify the properties of the Hybrid Petri Net, we first transform it into a corresponding hybrid automaton (HA) following the methodology established by David and Alla [21]. We then employ the KeYmaera theorem prover [22] to formally analyze the resulting HA. The underlying methodology proceeds as follows.
An HPN can be characterized by an evolution vector, which comprises the set of enabled discrete transitions and the markings of the continuous places. Each reachable state corresponds to a specific evolution vector, and the hybrid automaton can be systematically derived from the evolution graph of the HPN. When using the KeYmaera prover, a system property is specified as an implication of the form precondition postcondition , where the precondition characterizes the initial state of the system, and the postcondition declares a condition that must hold for all reachable states. Both conditions are expressed as constraints over a set of declared variables. Consequently, such a property asserts that if the precondition holds initially, then after any execution of the system, all reachable states must satisfy the postcondition.

3.3.2. Localization of Defective Components from Violated Properties

The identification of defective components within a model is guided by the analysis of violated properties. As established in the previous subsection, each property is formulated as a constraint over a set of variables; consequently, property violation indicates that the actual values of these variables diverge from the constraints prescribed by the property. Such deviations in variable values result from erroneous modifications or behaviors in specific components of the model.
To localize the model components responsible for property violations, we systematically trace how the values of property-related variables are altered during system execution. By correlating the unsatisfied properties reported by KeYmaera with the corresponding variable dependencies in the system model, we effectively isolate the defective parts of the model that lead to the observed violations.

3.4. Tracing Deficient Data Through Inverse Mapping

To effectively trace deficient data, we propose a two-stage inverse mapping approach that reconstructs potential sample data from fuzzy rules. The method proceeds as follows:
(1) Mapping Fuzzy Sets to Intervals
Building upon the rule generation process in [23], which partitions fuzzy variables into sub-intervals and assigns membership via the maximum membership principle, we establish an inverse mapping from fuzzy rules back to data intervals. Given a fuzzy rule of the form:
R : IF x 1 is M AND x 2 is L , THEN y is S 2 ,
we infer that variable x 1 must lie in the interval [ M ( ) , M ( + ) ] corresponding to fuzzy set M, as dictated by the maximum membership principle. Similarly, intervals for x 2 and y are derived from fuzzy sets L and S 2 , respectively.
(2) Locating Data via Dictionary-Guided Search
While the first step identifies candidate intervals, the number of possible data points within each interval remains infinite. To efficiently locate relevant data from the original sample set, we introduce a dictionary-based prioritization strategy. For rule R, suppose the sample data contain the following:
  • 500 records where x 1 belongs to M.
  • 100 records where x 2 belongs to L.
  • 430 records where y belongs to S 2 .
We construct a search dictionary as follows:
Dictionary = { x 1 : 500 , x 2 : 100 , y : 430 } .
Records are then searched in ascending order of frequency: x 2 , y, and x 1 . This “dictionary-increase” method ensures that dimensions with fewer matching records are prioritized, reducing the search space efficiently and systematically.

4. Case Study: Deficient Data Tracing in Manufacturing Systems

This case study demonstrates how deficient sample data can adversely affect trained neural network models and consequently compromise system properties through a simplified manufacturing system example [24]. The system coordinates customers, factories, and suppliers, with two suppliers ( S 1 and S 2 ) selected based on material quality (MQ) and material cost (MC). S 1 provides high-quality materials at premium costs, while S 2 offers lower quality at reduced costs, with an intelligent subsystem enabling dynamic supplier selection in response to market fluctuations.
The neural network was initially trained using the dataset in Table 1, employing a three-layer artificial neural network for supplier selection. The network architecture consists of 4 input neurons (corresponding to four environmental factors), 5 hidden neurons, and 1 output neuron, with the hidden layer using a hyperbolic tangent sigmoid activation function (coefficient = 4). Training utilized the backpropagation algorithm with Nguyen–Widrow weight initialization, with key hyperparameters set as learning rate η = 0.01 , accuracy threshold ε = 0.001 , and maximum iteration count N = 1000 , terminating when either maximum iterations were reached or error E fell below ε .
Table 1. The Initial Sample data.
The complete Adaptive Petri Net model is shown in Figure 3, while fuzzy rules extracted from the neural network appear in Table 2, where x 1 represents material quality, x 2 material cost, and y the selected supplier. The corresponding HPN model (Figure 4) transformed from an APN highlights the sub-net implementing the A-transition t 11 from Figure 3. Then we apply the model checking technique to check a property:
Figure 3. The Adaptive Petri Net model for the manufacturing system, which is an assembly of diverse participants across processes like ordering, design, and manufacturing. In this APN, t 11 is a A-transition and p 15 p 16 are C-places.
Table 2. The rules extracted from initial sample data.
Figure 4. The Hybrid Petri Net model transformed from the APN for the manufacturing system.
(P): “If the customer requests for high quality material and is willing to sacrifice to material cost, then S 1 should be selected”.
We formulate this property as ϕ [ α ] ψ , where the variable ϕ represents the precondition that requires high-quality material, the variable α specifies the hybrid system dynamics given as a hybrid program, and the variable ψ represents the selection of S 1 .
Then, we run KeYmaera to verify this property, and it gives the result “2 = 1” in the Inner Node part of this tool, which is shown in Figure 5. This means that supplier S 2 is selected which indicates that the model violates the property.
Figure 5. The model checking result is given by KeYmaera, and it means supplier S2 is selected which indicates that the model violates the property P.
Proof analysis traced the error to place p 28 (highlighted red in Figure 4) in the neural network sub-net responsible for intelligent supplier selection, where miscalculation propagated through the network to affect system-level behavior. Using our two-stage inverse mapping approach, we identified deficient data corresponding to the problematic fuzzy rule “If x 1 is high and x 2 is low, then y is S 2 ,” with located data positions shown in Table 3 (red highlighting potential deficiencies).
Table 3. The deficient data being located in the sample data.
After modifying 200 data pairs in the original dataset (Table 4, red indicates changes) and updating fuzzy rules (Table 5). The model now satisfies property (P), confirming that corrected sample data enables proper system behavior. While systematic deficient data improvement methods fall outside this paper’s scope, this case demonstrates the critical relationship between data quality and model correctness.
Table 4. The deficient data and the its improved version in the sample data.
Table 5. The rule extracted from improved data.

5. Discussion

This paper presents a model verification-based framework for tracing deficient data that leads to property violations in intelligent software systems. Our primary contribution lies in pioneering the application of formal modeling and verification traceability to address data quality diagnosis challenges. By systematically integrating established techniques—including Adaptive Petri Nets, Hybrid Petri Nets, and fuzzy rule extraction—the framework establishes a traceable link from system-level property violations to specific training data subsets, providing a structured approach for verifying “black-box” intelligent components.
A key consideration in our methodology is the approximation error inherent in fuzzy rule extraction. While this process effectively captures the dominant decision patterns of the original neural network, it inevitably introduces precision loss when converting continuous neural activations into discrete fuzzy rules. This approximation mainly impacts the fine-grained boundaries between decision regions, consequently affecting the accuracy of deficiency data localization. Notably, when handling high-noise input data or facing the curse of dimensionality, the rule extraction process may yield misleading outcomes—such as generating contradictory rules—that could compromise result reliability. Through our case study, we confirmed that while this approximation error does not fundamentally undermine deficient data detection, it does represent a crucial trade-off between interpretability and precision that requires careful consideration in implementation. For more precise assessment of this trade-off, future work should incorporate specialized evaluation metrics—such as rule consistency indices and boundary fidelity measures—along with enhanced validation methods, including adversarial testing and uncertainty quantification techniques, to better evaluate and mitigate these approximation effects.
Several limitations of this work warrant acknowledgment and present promising research directions. First, our strategic choice to integrate existing technical frameworks rather than develop novel algorithms enabled us to validate the core concept of system-to-data traceability. This approach demonstrates that current formal methods can effectively construct such traceability pathways, establishing a foundation for future research before introducing more complex theoretical constructs.
In terms of experimental evaluation, the streamlined case study successfully illustrated the complete workflow from property definition through data localization—a demonstration that would be challenging in larger, complex systems. However, we recognize that establishing industrial-grade effectiveness requires future work incorporating more extensive case studies, rigorous quantitative metrics, and baseline comparisons. Standardized disclosure of neural network architectures and training parameters also remains crucial for reproducible research.
Finally, challenges regarding framework scalability and dependence on fuzzy rule extraction accuracy represent significant opportunities for community investigation. The methodology’s effectiveness is inherently tied to the quality of rule extraction, particularly in systems requiring high-precision decision boundaries. Future work should focus on developing more refined extraction techniques that balance interpretability with minimal approximation error.
In summary, this study demonstrates the feasibility of using formal methods for data deficiency diagnosis while highlighting important considerations for practical deployment. Subsequent research can build upon this foundation through more complex case studies, automated data correction algorithms, and optimized performance to advance this promising direction.

6. Conclusions

This paper presents a model-based framework for detecting deficient data in intelligent software systems through formal verification, which integrates neural networks with system models using Adaptive Petri Nets and employs model checking to trace system-level property violations back to specific deficiency data. The key advantage of our method over traditional approaches lies in its system-level perspective and explainable nature—instead of treating neural networks as black boxes and relying on experience-driven parameter tuning, our framework provides a principled way to identify data deficiencies through their actual impact on system properties, as demonstrated in the manufacturing system case study where property violations were successfully traced to problematic data instances and model correctness was restored after data revision. This approach offers crucial insights for developing reliable intelligent systems, particularly in safety-critical domains where understanding the root cause of failures is essential.
In the future, we plan to undertake the following work:
(1)
Extending the framework to larger, more complex systems and conducting quantitative evaluations with established metrics;
(2)
Investigating the accuracy of fuzzy rule extraction in representing ANN behavior and developing automated data correction mechanisms; and
(3)
Adapting the framework to verify systems with diverse AI components beyond standard neural networks.

Author Contributions

Conceptualization, W.L.; Methodology, W.L.; Software, X.D.; Validation, D.X.; Writing—original draft, X.D.; Writing—review & editing, D.X.; Supervision, W.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by the Fundamental Research Funds of Zhejiang Sci-Tech University under Grant 24232090-Y.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, F.; Tan, C.; Dong, F. Electrical Resistance Tomography Image Reconstruction with Densely Connected Convolutional Neural Network. IEEE Trans. Instrum. Meas. 2021, 70, 4500811. [Google Scholar] [CrossRef]
  2. Hu, J.; Zhang, X.; Maybank, S.J. Abnormal Driving Detection with Normalized Driving Behavior Data: A Deep Learning Approach. IEEE Trans. Veh. Technol. 2020, 69, 6943–6951. [Google Scholar] [CrossRef]
  3. de Sá, C.R.; Shekar, A.K.; Ferreira, H.M.; Soares, C. Building Robust Prediction Models for Defective Sensor Data Using Artificial Neural Networks. In Proceedings of the 14th International Conference on Soft Computing Models in Industrial and Environmental Applications (SOCO), Seville, Spain, 13–15 May 2019; pp. 142–153. [Google Scholar]
  4. Zhou, H.; Yu, K.M. Imbalanced data classification for defective product prediction based on industrial wireless sensor network. In Proceedings of the 2017 Sixth International Conference on Future Generation Communication Technologies (FGCT), Dublin, Ireland, 21–23 August 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–6. [Google Scholar]
  5. Yu, Z.; Zeng, W.; Shi, Z.; Zhang, S.; Yi, G.; Zhang, Y. A continuous learning framework for reliable defect segmentation with pixel-level uncertainty quantification. Struct. Multidiscip. Optim. 2025, 68, 231. [Google Scholar] [CrossRef]
  6. Wang, T.; Chen, X.; Li, Z.; Xu, Y.; Zhai, Y.; Zhou, Z.; Yang, Y.; Tian, J. F2MCANet: Joint frequency fusion and multi-channels attention neural network for surface defect recognition. Soft Comput. 2025, 1–14. [Google Scholar] [CrossRef]
  7. Cheng, C.L.; Singh, G.; Nachman, B. Incorporating physical priors into weakly supervised anomaly detection. Phys. Rev. Lett. 2025, 135, 021801. [Google Scholar] [CrossRef] [PubMed]
  8. Ahson, S.I. Petri net models of fuzzy neural networks. IEEE Trans. Syst. Man Cybern. 2002, 25, 926–932. [Google Scholar] [CrossRef]
  9. Petrosov, D.A.; Lomazov, V.A.; Petrosova, N.V. Model of an artificial neural network for solving the problem of controlling a genetic algorithm using the mathematical apparatus of the theory of Petri nets. Appl. Sci. 2021, 11, 3899. [Google Scholar] [CrossRef]
  10. Albuquerque, R.; Júnior, C.; Barroso, G.; Barreto, G. A novel fully adaptive neural network modeling and implementation using colored Petri nets. Discret. Event Dyn. Syst. 2023, 33, 129–160. [Google Scholar] [CrossRef]
  11. Kaid, H.; Al-Ahmari, A.; Nasr, E.A.; Al-Shayea, A.; Kamrani, A.K.; Noman, M.A.; Mahmoud, H.A. Petri net model based on neural network for deadlock control and fault detection and treatment in automated manufacturing systems. IEEE Access 2020, 8, 103219–103235. [Google Scholar] [CrossRef]
  12. Kaid, H.; Al-Ahmari, A.; Li, Z.; Ameen, W. Deadlock control and fault detection and treatment in reconfigurable manufacturing systems using colored resource-oriented Petri nets based on neural network. IEEE Access 2021, 9, 84932–84947. [Google Scholar] [CrossRef]
  13. de Oliveira, Y.R.M.; Sobrinho, Á.; Da Silva, L.D.; Santos, D.; Gorgônio, K.C.; Perkusich, A. Coloured petri nets modeling multilayer perceptron neural networks. In Proceedings of the 2024 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 6–8 January 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–4. [Google Scholar]
  14. Hanna, M.M.; Buck, A.; Smith, R. Fuzzy Petri nets with neural networks to model products quality from a CNC-milling machining centre. IEEE Trans. Syst. Man Cybern.-Part A Syst. Hum. 2002, 26, 638–645. [Google Scholar] [CrossRef]
  15. Jitmit, C.; Vatanawood, W. Simulating artificial neural network using hierarchical coloured petri nets. In Proceedings of the 2021 6th International Conference on Machine Learning Technologies, Jeju Island, Republic of Korea, 23–25 April 2021; pp. 127–131. [Google Scholar]
  16. Ding, Z.; Zhou, Y.; Zhou, M. Modeling Self-Adaptive Software Systems by Fuzzy Rules and Petri Nets. IEEE Trans. Fuzzy Syst. 2018, 26, 967–984. [Google Scholar] [CrossRef]
  17. Ding, Z.; Jiang, M.; Zhou, M. Generating Petri Net-Based Behavioral Models From Textual Use Cases and Application in Railway Networks. IEEE Trans. Intell. Transp. Syst. 2016, 17, 3330–3343. [Google Scholar] [CrossRef]
  18. Enbutsu, I.; Baba, K.; Hara, N. Fuzzy rule extraction from a multilayered neural network. In Proceedings of the International Joint Conference on Neural Networks, Seattle, WA, USA, 8–12 July 1991; pp. 461–465. [Google Scholar]
  19. Chen, S.; Ke, J.; Chuang, J. Knowledge Representation Using Fuzzy Petri Nets. IEEE Trans. Knowl. Data Eng. 1990, 2, 311–319. [Google Scholar] [CrossRef]
  20. Yu, Y.; Gong, H.; Liu, H.; Mou, X. Knowledge representation and reasoning using fuzzy Petri nets: A literature review and bibliometric analysis. Artif. Intell. Rev. 2023, 56, 6241–6265. [Google Scholar] [CrossRef]
  21. David, R.; Alla, H. On Hybrid Petri Nets. Discret. Event Dyn. Syst. Theory Appl. 2001, 11, 9–40. [Google Scholar] [CrossRef]
  22. Mitsch, S.; Platzer, A. A Retrospective on Developing Hybrid System Provers in the KeYmaera Family –A Tale of Three Provers. In Deductive Software Verification: Future Perspectives—Reflections on the Occasion of 20 Years of KeY; Springer: Cham, Switzerland, 2020; pp. 21–64. [Google Scholar]
  23. Wang, L.; Mendel, J.M. Generating fuzzy rules from numerical data. In Proceedings of the 1991 IEEE lnternational Symposium on Intelligent Control, Arlington, VA, USA, 13–15 August 1991; pp. 263–268. [Google Scholar]
  24. Wu, X.Q. An intelligent Petri nets model based on competitive neural network. In Computer Supported Cooperative Work in Design; Springer: Berlin/Heidelberg, Germany, 2005; pp. 388–397. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.