Efficient Deadlock Prevention in Petri Nets through the Generation of Selected Siphons

Size: px
Start display at page:

Download "Efficient Deadlock Prevention in Petri Nets through the Generation of Selected Siphons"

Transcription

1 2009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 10-12, 2009 FrB12.3 Efficient Deadlock Prevention in Petri Nets through the Generation of Selected Siphons Luigi Piroddi, Member, IEEE, Roberto Cordone, and Ivano Fumagalli Abstract Siphon-based control methods are often employed for deadlock prevention in Petri net models of flexible manufacturing systems. Such methods generally require siphon enumeration, which is a computationally intensive task, whose complexity grows with the Petri net size. However, only a small fraction of minimal siphons needs to be controlled to prevent all deadlocks. his paper introduces an algorithm to compute the required siphons, based on a set covering approach that optimally matches emptiable siphons to critical markings. his greatly reduces the computational load of the deadlock prevention algorithm with respect to alternative methods with comparable performance in terms of permissivity. I I. INRODUCION N Petri net (PN) models, particular subsets of places called siphons are associated to deadlocks, since a deadlock occurs if a siphon gets empty of tokens [11]. For this reason, it is of interest to investigate control methods that forbid the complete emptying of siphons by appropriately constraining the net s evolution. Some notable examples of such methods are given, e.g., in [1, 3, 5, 7, 9, 10, 12, 13, 15]. Besides deadlock prevention, other objectives are also important for the evaluation and comparison of control methods, namely control permissivity, size of the control subnet and computational load. ypically, computationally simple and small size solutions sacrifice permissivity, using heuristic and conservative conditions (see, e.g., [3, 5, 9, 13]). Such conditions are generally aimed to avoid the generation of new siphons by way of the added control constraints [7, 12, 15]. High permissivity is achieved by the Iterative Siphon Control (ISC) scheme, that at each step enumerates siphons (on progressively bigger PNs), and adds the relative control places, until all siphons are controlled. his may lead to an explosion of the computational load and of the size of the control subnet. he latter problem can be tackled by reducing the controller s redundancy [9, 10, 12, 14]. Actually, only a fraction of the siphons can get empty and not even all such siphons need to be controlled, due to dominance relations. More precisely, suitable dominance concepts for siphons Manuscript received Sept. 15, L. Piroddi is with the Dip. di Elettronica e Informazione, Politecnico di Milano, 20133, Milano, Italy (phone: ; fax: ; piroddi@elet.polimi.it). R. Cordone is with the Dip. di ecnologie dell Informazione, Università degli Studi di Milano, Polo Didattico e di Ricerca di Crema, 26013, Crema, Italy ( cordone@dti.unimi.it). I. Fumagalli is with Automata S.p.A., 21042, Caronno Pertusella (VA), Italy ( fumagalli.ivano@gmail.com). and markings, based on the siphons emptiability properties, were introduced in [12] to characterize the relevant ones for control purposes. Based on these, a set covering problem was formulated, to provide a systematic method for finding a minimum cardinality set of siphons to control at each iteration of the ISC scheme. he set covering problem maps emptiable siphons to critical markings, so that each constraint implies that at least one siphon is controlled among those that get empty in the associated marking. In the present work, the approach proposed in [12] is modified in order to avoid full siphon enumeration, which accounts for most of the computational load. he dominance relations between siphons and markings are exploited to generate only a small fraction of the whole set of minimal siphons. In practice, the necessary siphons and markings for the set covering problem are generated in an integrated process. his modification can dramatically improve the overall computational cost of the ISC scheme. II. PERI NES: BASIC DEFINIIONS AND NOAION A marked PN is a 5-tuple N = (P,, F, W, M 0 ), where P and are the sets of places and transitions, F is the flow relation, W is the arc weight function and M 0 the initial marking [11]. A PN is P-ordinary iff the arcs from places to transitions are unitary [7]. he net topology can also be specified through the input (I) and output (O), or incidence (C = O I) matrices. A transition t j is said to be enabled in a marking M if M I(,j), where A(,j) indicates the jth column of a generic matrix A. Firing a sequence of enabled transitions produces a new marking M * = M + Cσ, where the jth element of the firing vector σ represents the number of times that transition t j fires in the sequence. he set of reachable markings by way of enabled transition sequences is denoted R(N). An extended marking space R * (N) = {M 0 σ N s.t. M = M 0 + Cσ} [1, 5], where N is the set of nonnegative integers and X denotes the cardinality of set X, will also be employed in the following. A marking M R(N), such that t j enabled in M, is called a dead marking and represents a (total) deadlock state. A PN such that no marking in R(N) is dead is called deadlock-free. Given S P, the characteristic P-vector of S is a column binary vector λ S such that λ S (i) = 1 iff p i S and 0 otherwise [3, 9]. A P-invariant is a column vector x such that x C = 0. A P-invariant satisfies the following marking relation: x M = x M 0, M R(N). A siphon is a set S of places such that S S, where /09/$ AACC 5006

2 X = {y P x X s.t. (y,x) F} denotes the pre-set of a set of nodes X P, and X = {y P x X s.t. (x,y) F} its post-set of X. When a siphon gets empty of tokens, all the transitions in S are permanently disabled and a partial or total deadlock results. A siphon is minimal if it does not strictly contain other siphons. Siphon control-based deadlock prevention methods employ generalized mutual exclusion constraints (GMEC) of the type λ Sj M ξj to avoid the emptying of siphons, where ξ j 1 (ξ j = 1 for least restrictive methods). he P-invariant based control approach (PIBC) [15] implements GMECs, by adding for each scalar constraint a control place (or monitor), suitably marked and connected to the existing net s transitions. Let Π be the set of minimal siphons of a PN. A siphon that is marked at any reachable marking is termed a controlled siphon [6]. Let E Sj = {M R(N) λ Sj M = 0} be the set of markings where a siphon gets empty, and E Π* = Sj Π* E Sj for a generic subset of siphons Π *. hen, Π u = {S j Π E Sj } is the set of uncontrolled siphons, and the set of critical markings E Πu groups the markings where at least one siphon is empty [12]. A covering set of uncontrolled siphons (CSUS) is a subset of siphons Π c Π u, such that E Πc = E Πu [12]. Forbidding all the markings where any of the siphons of a CSUS Π c gets unmarked controls all siphons in Π. A siphon S j Π u is essential iff M E Sj such that λ Sk M > 0, Sk Π u \{S j } [12], i.e., there exists at least one reachable marking where only S j gets empty. A siphon S j Π u is dominated by a subset of siphons Π * Π u \{S j } iff E Sj E Π* [12]. A critical marking M i is dominated by M j iff λ Sk Mi = 0, S k Π u such that λ Sk Mj = 0 [12]. Whatever siphon is controlled to forbid marking M j, it also forbids M i. hus, dominated markings can be neglected for control purposes. Notice that for an essential siphon S j all markings in E Sj such that λ Sk M = 0 for some Sk Π u \{S j } are dominated. III. HE SE COVERING-BASED SIPHON CONROL MEHOD Selecting a minimum cardinality CSUS to forbid the critical markings of a PN (at a given iteration of the ISC scheme) clearly provides the smallest possible control subnet (since Π c min may be significantly smaller than Π), while achieving maximal permissivity. Also, avoiding redundancy indirectly affects the overall computational effort in the iterative scheme, since fewer constraints imply fewer new siphons, so that siphon enumeration is faster and easier and possibly the overall number of iterations is also reduced. A minimum cardinality CSUS can be found as the optimal solution of the following set covering problem: Definition 1 Set covering problem (SCP) [12] Let N = (P,, F, W, M 0 ) be a P-ordinary PN, Π the set of n S minimal siphons of N, and E Πu the set of n M critical markings. Let A = (a ij ) be a binary n M n S matrix, such that a ij = 1 if λ Sj Mi = 0, and 0 otherwise. Denote by SCP the following set covering problem: n S min xj j=1 n S aij x j 1, i = 1,, n M j=1 x j {0, 1}, j = 1,, n S All feasible solutions of the SCP are CSUS, and the optimal ones have minimum cardinality. Notice that, although set covering is known to be an NP-hard problem, available integer linear programming (ILP) solvers are efficient enough to exactly solve set covering problems of thousands of rows and columns in very small time. he SCP of Def. 1 requires the complete knowledge of the minimal siphons and the critical markings of the PN. However, the same result can be achieved using a reduced SCP that generates only a few selected and (preferably) non dominated markings by means of an ILP method [12]. In detail, for every (not yet explored) siphon S * the method repeatedly generates markings in which the siphon is empty, by means of a suitable ILP problem denoted Marking Generation Problem (MGP, see below). Each generated marking implicitly provides a row of the SCP, since at least one of the siphons that get empty in that marking must be controlled, but redundant rows corresponding to markings dominated by previously generated ones are avoided by means of suitable constraints. Also, if a marking is found for which the current siphon S * is essential, then all the previously generated rows associated to S * can be safely removed and the search carried on to the next siphon. Definition 2 Marking generation problem (MGP) [12] Let N be a P-ordinary PN with incidence matrix C and initial marking M 0. Let Π be the set of minimal siphons, and assume that Π old Π is the set of previously analyzed siphons and S * Π is the current one. Let also M k, k = 1,..., k * 1, be the markings previously generated for siphon S *, and Π k = {S Π\{S * } λ S Mk = 0}. Let Σ k = Πk S be the siphon defined as the union of the siphons that get empty in M k (except S * ). Denote by MGP the following ILP problem: min f = M(p) p P M = M 0 + Cσ, M 0, σ N λ S M 1, S Πold λ S * M = 0 λ Σk M 1, k = 1,..., k * 1 (1.a) (1.b) (1.c) (1.d) (1.e) In Def. 2, constraints (1.b) account for the (extended) reachability problem, constraints (1.c) rule out markings where any of the previously analyzed siphons get empty, constraint (1.d) imposes that the current siphon is empty, and constraints (1.e) exclude dominated markings. Notice, in fact, that λ Σk M 1 is a synthetic form to express the condition that λ S M 1 for at least one siphon in Πk. he objective function (1.a) maximizes the probability of finding 5007

3 a marking for which S * is essential, if it exists. Although the extended reachability space R * (N) is used instead of R(N) [1, 5], experimental practice has shown negligible effects due to spurious markings. he integrality constraint on σ can be initially relaxed, and reconsidered only if an admissible solution exists (and is non integer). IV. COMBINING SIPHON AND MARKING GENERAION O AVOID FULL SIPHON ENUMERAION he siphon and dominance relations can be further exploited to relax the computationally critical requirement that all minimal siphons are enumerated in advance. o this aim, siphon enumeration is combined with the marking generation, exploiting the constraints derived from the latter to avoid the computation of already controlled or dominated siphons. he basic siphon enumeration scheme [2] employs a combinatorial formulation and a node branching approach, where each node represents a specific siphon enumeration subproblem P = {N, P in, P out }, N being the current PN, and P in and P out the sets of places constrained to be in and out of the sought solutions, respectively. Initially, P in = P out =. Several structural properties are used to extend the place constraints at each node, thereby reducing the search space, and suitable conditions are applied to find a minimal siphon abiding by the place constraints, if any exists. When a minimal siphon S = {p S1,, p Sn } is found, the current node is branched into n subnodes, associated to other potential solutions not containing the found siphon. Precisely, the kth subnode inherits the P in and P out sets of the father node, and augments them with {p S1,, p S,k-1 } and {p Sk }, respectively. Child nodes with inconsistent constraints are discarded. wo slightly different siphon generation problems must be solved for combined usage with the MGP. Either we are looking for a new emptiable siphon without reference to a specific marking or we need to enumerate all the siphons that get empty in a specific marking M *. Both problems require a modification of the basic siphon enumeration scheme of [2]. A. Generation of a new emptiable minimal siphon he first problem is trivial if there are already generated but not yet examined emptiable siphons. However, this is not the case, e.g., at the beginning of the siphon enumeration process, when no siphons or markings have been processed yet, so that an ad hoc procedure must be set up to find an emptiable siphon. For this purpose, the siphon generation and the reachability analysis can be combined in a single problem that selects a pair (S *, M * ) such that λ S * M * = 0. A variant of the algorithm proposed in [1] for the selection of one emptiable siphon can be used for this purpose, adding constraints to reduce the siphon-marking space as new siphons or markings are explored. Also a different objective function is here used, designed to maximize the probability of finding an essential siphon. Definition 3 Emptiable siphon generation problem (ESGP) Let N = (P,, F, W, M 0 ) be a generalized PN with incidence matrix C. Assume that each place p P is k p - bounded. Let Π be the set of already found siphons. Let also s(p) = 1 iff p S * and w(t) = 1 iff t S *. Denote ESGP the following ILP problem: min f = s(p) M(p) (2.a) p P p P s(p) w(t), (t, p) F (2.b) w(t) s(p), t (2.c) p t M = M 0 + Cσ, M 0, σ N (2.d) M(p) k p (1 s(p)), p P (2.e) s(p) 1 (2.f) p P s(p) S 1, S Π (2.g) p S λ S M 1, S Π (2.h) Constraints (2.b-c) translate the siphon definition property, S S. Constraints (2.d) characterize the extended set of markings R * (N), as usual. Constraints (2.e) impose that the obtained siphon/marking couple (S *, M * ) actually satisfies the emptiability condition λ S * M * = 0. With respect to [1] the following new constraints have been added. Constraint (2.f) excludes the null siphon solution. Constraint (2.g) excludes all the already found siphons (collected in set Π) from the search, as well as any (non minimal) siphon containing them, in analogy with the efficient siphon enumeration algorithm of [2]. Constraint (2.h) excludes all the markings where any of the already found siphons is empty. he objective function (2.a) includes both siphon (with reversed sign with respect to the objective function used in [1]) and marking variables, with the intent of finding siphons with few places, that are more likely to be minimal, and big markings, since this maximizes the chances to recognize an essential or, at least, non dominated siphon (the more places are marked in the selected marking, the less likely that another siphon will get empty in the same marking). Since the ESGP is used occasionally alongside the basic siphon enumeration scheme, mutual consistency must be enforced, i.e. the siphon found by the ESGP must be removed from the solution space of the current siphon enumeration branching tree. Constraints (2.g) guarantee that the siphon S * obtained with the ESGP has not yet been found in the enumeration and that, therefore, it is necessarily a solution of one (and only one) open node of the siphon enumeration branching tree. o continue the enumeration process, this node must then be found and partitioned with respect to S *. B. Enumeration of all minimal siphons that are empty in a specific marking he second siphon generation problem can be solved as 5008

4 follows. In the siphon enumeration branching tree, add the temporary constraint λ S M * = 0, by extending the P out of every node as follows: P out = P out {p P M * (p) > 0}. Now, perform an ordinary siphon enumeration, by exploring all open nodes of the branching tree. For each node, a solution is sought with respect to place constraints P in and P out. If a siphon is found, the node is partitioned with respect to it augmenting the original place constraints P in and P out. Otherwise, the node is retained with the original place constraints P in and P out (the corresponding problem could still admit other emptiable siphons). In this way, only siphons that are empty in M * are found, but the siphon enumeration branching tree is still valid, in the sense that it provides the complete set of emptiable siphons. V. ELIMINAION OF REDUNDAN CONROL PLACES he adopted set covering approach guarantees the minimality of the set of siphons to control only with respect to the current PN. However, some residual redundancy may occur among constraints introduced at different iterations of the ISC scheme. A heuristic strategy has been adopted to address this problem, which, along the lines of [14], consists in checking for every control place that there does not exist a reachable marking that is prevented only by it. Definition 4 Redundancy check problem (RCP) Let N = (P,, F, W, M 0 ) be a generalized PN with incidence matrix C, and let p c P. Denote by RCP(N, p c ) the following ILP problem: min f = M(p c ) M = M 0 + Cσ M(p) 0, p p c σ N Property 1 Let N = (P,, F, W, M 0 ) be a generalized PN with incidence matrix C, and let p c be an additional control place, designed with the PIBC method, so as to realize the GMECs LM b. Let N = (P,, F, W, M 0 ) be the resulting controlled PN. hen, if the optimum of RCP(N, p c ) is nonnegative, the control place p c is redundant. Proof Omitted for brevity. A control place that is redundant according to Prop. 1 can be safely removed without enlarging the reachability space. Algorithm RC Input: N = (P,, F, W, M 0 ), a (sub)set of control places P c = {p c1,, p cn } P. Output: Reduced PN 0) Set i := 0. 1) Set i := i+1. Solve RCP(N, p ci ). If the optimal solution f of the RCP is such that f 0 then remove p ci (as well as any arc connected to p ci ) from N. If i = n then exit, else go to (1). By Prop. 1, the RC algorithm ensures that the reduced PN has exactly the same reachable states as the initial one. Notice that the obtained solution depends on the order of examination of the control place. In this regard, the forward order (i.e., the order in which the control places have been added by the ISC method) seems more appropriate, since we are interested in assessing if a previously obtained constraint is dominated by the set of constraints computed at the current iteration. Notice that the integrality constraint can be initially dropped, and must be reinforced only if f < 0 for the relaxed problem. VI. HE PROPOSED IERAIVE SIPHON CONROL SCHEME he combination of the general ISC approach with the SCP, the ESGP and RCP results in the scheme described next. Algorithm SC-ISC (Set Covering-based ISC) Input: N = (P,, F, W, M 0 ), N P-ordinary. Output: Controlled PN 0) Set i := 0 and Π (0) :=. Denote N (0) := N. 1.0) Set i := i+1. Set Π (i) =. Let A be an empty matrix. Set Π old =. Initialize the MGP as (1.a-b). 1.1) If Π (i) then extract one minimal emptiable siphon of N (i 1) from Π (i) else find a new one by solving the. ESGP for a siphon/marking couple (S *, M * ). If none exists then go to (1.5), else add constraint (1.d) to problem MGP and a constraint of type (2.g) and one of type (2.h) to the ESGP. 1.2) Solve problem MGP to find a reachable and (possibly) non dominated marking M where the current siphon gets empty, and none of the previously examined ones does (use the M * obtained from the ESGP if available). If no solution exists, set Π old = Π old {S * }, i.e. turn the current constraint (1.d) to one of type (1.c), and go to (1.1). 1.3) Find all other siphons of N (i 1) that get empty in M (check also the siphons already included in Π (i) and not yet extracted). Add the new ones to Π (i). 1.4) Add a binary row of length n S to A, with 1 in the positions associated to the siphons empty in M (extend the rows with 0s as the number of siphons grows). If S * is essential with respect to M, remove from A all previously added rows with a 1 in the column associated to S *, set Π old = Π old {S * }, i.e. turn the current constraint (1.d) to one of type (1.c), and go to (1.1), else add a constraint of type (1.e) to the MGP to exclude markings dominated by M from further search and go to (1.2). 1.5) If A = then exit, else formulate the SCP associated to matrix A and let Π c (i) = Πx, where x is an optimal solution of the SCP. 2) Use the PIBC method to implement on N (i 1) the set of GMECs {λ S M 1, S Πc (i) }. Apply RC to the place constraints derived at previous iterations. Denote the resulting net N (i). Go to (1). Property 2 Let N be a generalized PN. he SCP formulated at step (1) of algorithm SC-ISC on N admits the 5009

5 same set of optimal solutions of the full SCP of Def. 1. Proof he SC-ISC algorithm constructs a reduced SCP which employs fewer variables and constraints than the full one of Def. 1. However, the eliminated constraints are associated to dominated markings, and are therefore redundant. On the other hand, the eliminated variables correspond either to non-emptiable siphons or to siphons that get empty only in removed critical markings. Any solution containing a siphon of this type can be simplified by removing it, since the markings covered by that siphon are forbidden for free by controlling the other siphons of the solution, which by construction eliminate all the dominating markings. As a result, the reduced SCP has fewer solutions than the original problem, but excludes only non optimal ones. Property 3 Let N be a P-ordinary PN and N the controlled PN resulting from the application of the SC-ISC algorithm. If N is P-ordinary, then it is deadlock-free. Proof he algorithm is terminated if no more siphons are found (step 1). Since this implies that N does not have emptiable siphons, the thesis trivially follows. Notice that, except for pathological cases in which a siphon is non dominated only with respect to spurious markings in R * (N)\R(N), the control subnet is also nonredundant. If at the end of the SC-ISC the controlled PN is not P-ordinary, a simple test can be set up to ascertain its deadlock-freeness by searching the extended marking set R * (N) for dead markings. Definition 5 Deadlock generation problem (DGP) Let N = (P,, F, W, M 0 ) be a generalized PN with input matrix I and incidence matrix C. Let also δ ij = 1 iff p i enables t j and 0 otherwise. Denote by DGP(N) the following ILP problem: M = M 0 + Cσ, M(p) 0, σ N (3.a) pi t j δ ij t j 1, j = 1,..., (3.b) M(p i ) k ij δ ij + I(i,j) 1, i = 1,..., P, j = 1,..., (3.c) M(p i ) I(i,j)δ ij, i = 1,..., P, j = 1,..., (3.d) δ ij {0, 1}, i = 1,..., P, j = 1,..., (3.e) where k ij = max (M(p i) I(i,j)+1). M Constraints (3.c-e) formalize the transition enabling conditions. On the other hand, constraints (3.b) require that for each transition there exists at least one place that does not enable it. Finally, constraints (3.a) account for the (extended) reachability problem. Property 4 Let N be a generalized PN. hen if DGP(N) has no feasible solution, N is deadlock-free. Proof By hypothesis, there is no marking in R * (N) that does not enable at least one transition. Since R * (N) R(N), the thesis follows. he DGP can be first solved relaxing the integrality and binarity constraints: if no admissible solution exists in that case, none will exist in the non-relaxed setting either. In case the DGP admits feasible solutions, a net transformation approach can be applied to complete the control design, as explained in [8, 12]. Briefly, the generalized PN is transformed to a P-ordinary one, whose emptiable siphons are controlled with the PIBC method, and finally the resulting PN is back-transformed. VII. SIMULAION EXAMPLE AND PERFORMANCE ANALYSIS Consider the PN of Fig. 1 [3], which is a widely used benchmark for deadlock avoidance methods (see [12] and references listed there). he PN has reachable states, of which are safe, while 4226 lead to deadlock and should be forbidden. he set covering approach introduced in [12] computes a maximally permissive control that achieves a live PN with states, using 13 control places. Compared to the other solutions proposed in the literature, this one provides the best compromise in terms of permissivity and control size, as argued in [12]. p 2 t 11 t 14 t 2 t 12 t 3 t 8 t 18 p 21 p1 p p 3 p 8 p 12 p 17 7 p 5 t 13 t 4 t 9 t 17 p 4 p 23 p 24 p 7 p 9 t 5 t 1 t 6 t 7 t 20 p 6 p 15 p 10 Fig. 1. Benchmark PN example drawn from [3]. p 11 p 20 p 25 p 13 p 26 t 19 t 10 t 16 able I compares the set covering approach of [12] and the upgraded version introduced in this work. Each row reports the iteration number, the characteristics of the current net (P-ordinarity, number of places, nodes and arcs of the reachability graph, minimal siphons, emptiable siphons), the set covering features (SCP dimension, number of computed control places and redundant ones), and computational times (emptiable siphon enumeration, control algorithm, stopping criterion, and total control design time). Such times refer to a 3.2 GHz Pentium 4 with 1 GB RAM, where ILOG CPLEX software has been used to solve ILPs. he rows marked as Final report the main characteristics of the final solution, i.e., the net s type, dimension and number of reachable states, the total number of control places computed and discarded (the difference is the net number of control places added), and the overall control computational time at the end of the iterative method. Although the same solutions are found at every iteration by the two approaches, the proposed algorithm is very p 22 t 15 p 16 p 18 p

6 Method iter. P- # reach. graph ord. places # nodes # arcs efficient in cutting down the size of the SCP, and avoids the siphon enumeration task which grows rapidly with size and amounts to more than 90% of the computational time required by the approach of [12]. For this reason that approach turns out to be inapplicable to large nets, while the proposed approach scales more smoothly with net size. Notice that, at the 4 th iteration, since no more emptiable siphons are found (out of 1113 minimal ones), the stopping criterion based on the DGP is tested. Since no deadlock is possible in the controlled net, the algorithm stops. For reference purposes, the following list reports the connectivity and initial marking of the 13 control places found by the SC-ISC method (non unitary arc weights are indicated by the number preceding the associated transition): p c1 = {t 10, t 16 }, p c1 = {t 9, t 15 }, M(p c1 ) = 2, p c2 = {t 4, t 13 }, p c2 = {t 3, t 11 }, M(p c2 ) = 2, p c3 = {t 8, t 18 }, p c3 = {t 7, t 17 }, M(p c3 ) = 2, p c4 = {t 9, t 17 }, p c4 = {t 8, t 16 }, M(p c4 ) = 2, p c5 = {t 10, t 17 }, p c5 = {t 8, t 15 }, M(p c5 ) = 3. p c6 = {t 5, t 10, t 13, t 17 }, p c6 = {t 3, t 8, t 11, t 15 }, M(p c6 ) = 5, p c7 = {t 3, t 8, t 19 }, p c7 = {t 1, t 17 }, M(p c7 ) = 5, p c8 = {t 8, t 17 }, p c8 = {t 7, t 16 }, M(p c8 ) = 3, p c9 = {t 3, t 5, t 8, 2t 10, t 17, 2t 19 }, p c9 = {2t 1, t 9, 2t 15, t 18 }, M(p c9 ) = 17. p c10 = {t 5, t 8, t 13, t 17 }, p c10 = {t 3, t 7, t 11, t 15 }, M(p c10 ) = 6, p c11 = {t 3, 2t 5, t 9, 2t 10, t 13, t 17, 3t 19 }, p c11 = {3t 1, t 11, 3t 15, t 18 }, M(p c11 ) = 27, p c12 = {2t 5, 3t 10, t 13, t 17, t 18, t 19 }, p c12 = {2t 1, t 9, t 11, 3t 15 }, M(p c12 ) = 22, p c13 = {t 8, t 10, 2t 17 }, p c13 = {2t 7, 2t 15 }, M(p c13 ) = 8. VIII. CONCLUSIONS Exploiting the results of a previous research work, where a non-redundant highly permissive siphon control method was developed, a new version of the method is here suggested, that avoids the main computational bottleneck of the original approach, i.e., the full siphon enumeration. Instead, the new method employs a combined siphon and marking generation strategy, that thanks to structural properties related to siphon emptiability picks out only the siphons and markings strictly relevant for the control design. As in the previous method, a set covering problem is set up for the optimal selection of ABLE I SIMULAION EXAMPLE: MEHOD COMPARISON # siphons (emptiable) Set cov.: rows cols # c. places (redundant) Computational times [s] empt. s. control stopping control enum. alg. criterion total Set covering 1 Y (18) (0) approach [12] 2 Y (32) (0) N (89) (1) N (0) (0) Final N (1) Proposed 1 Y (18) (0) approach 2 Y (32) (0) N (89) (1) N (0) (0) Final N (1) the set of siphons to control. he proposed method has been tested on a benchmark PN, proving the practical applicability of the approach. REFERENCES [1] F. Chu and X.-L. Xie, Deadlock analysis of Petri nets using siphons and mathematical programming, IEEE rans. on Robotics and Automation, vol. 13, n. 6, pp , [2] R. Cordone, L. Ferrarini, and L. Piroddi, Enumeration algorithms for minimal siphons in Petri nets based on place constraints, IEEE rans. on Systems, Man and Cybernetics, Part A, vol. 35, n. 6, pp , [3] J. Ezpeleta, J.-M. Colom, and J. Martinez, A Petri net based deadlock prevention policy for flexible manufacturing systems, IEEE rans. on Rob. and Automation, vol. 11, n. 2, p , [4] M. P. Fanti and M. C. Zhou, Deadlock control methods in automated manufacturing systems, IEEE rans. on Systems, Man, and Cybernetics Part A, vol. 34, n. 1, pp. 5-22, [5] Y. S. Huang, M. D. Jeng, X. L. Xie, and S. Chung, Deadlock prevention policy based on Petri nets and siphons, Int. Journal of Prod. Res., vol. 39, n. 2, pp , [6] M. V. Iordache, Methods for the supervisory control of concurrent systems based on Petri net abstractions, Ph.D. Dissertation, University of Notre Dame, [7] M. V. Iordache, J. O. Moody, and P. J. Antsaklis, Synthesis of deadlock prevention supervisors using Petri nets, IEEE rans. on Robotics and Automation, vol. 18, n. 1, pp , [8] K. Lautenbach and H. Ridder, Liveness in bounded Petri nets which are covered by -invariants, in Proc. of the 13 th Int. Conf. Application and heory of Petri Nets, LNCS, vol. 815, R. Valette ed., Springer-Verlag, 1994, pp [9] Z. W. Li and M. C. Zhou, Elementary siphons of Petri nets and their application to deadlock prevention in flexible manufacturing systems, IEEE rans. on Systems, Man and Cybernetics, Part A, vol. 34, n. 1, pp , [10] Z. W. Li and M. C. Zhou, wo-stage method for synthesizing liveness-enforcing supervisors for flexible manufacturing systems using Petri nets, IEEE ransactions on Industrial Informatics, vol.2, no.4, pp , November, [11]. Murata, Petri nets: properties, analysis and application, Proceedings of the IEEE, vol. 77, n. 4, pp , [12] L. Piroddi, R. Cordone, and I. Fumagalli, Selective Siphon Control for Deadlock Prevention in Petri Nets, IEEE rans. on Systems, Man and Cybernetics, Part A, vol. 38, n. 6, pp , [13] L. Piroddi, M. Cossalter, and L. Ferrarini, A Resource Decoupling Approach for Deadlock Prevention in FMS, Int. J. of Adv. Manufacturing echnology, vol. 40, n. 1, pp , [14] M. Uzam, Z. Li, and M. C. Zhou, Identification and Elimination of Redundant Control Places in Petri Net Based Liveness Enforcing Supervisors of FMS, Int. J. of Adv. Manufacturing echnology, vol. 35, n. 1-2, pp , [15] K. Yamalidou, J. O. Moody, M. D. Lemmon, and P. J. Antsaklis, Feedback control of Petri nets based on place invariants, Automatica, vol. 32, n. 1, pp , 1996.

A reachability graph partitioning technique for the analysis of deadlock prevention methods in bounded Petri nets

A reachability graph partitioning technique for the analysis of deadlock prevention methods in bounded Petri nets 2010 American Control Conference Marriott Waterfront, Baltimore, M, USA June 30-July 02, 2010 ThB07.3 A reachability graph partitioning technique for the analysis of deadlock prevention methods in bounded

More information

ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR DEADLOCK PROBLEMS OF FLEXIBLE MANUFACTURING SYSTEMS USING PETRI NETS

ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR DEADLOCK PROBLEMS OF FLEXIBLE MANUFACTURING SYSTEMS USING PETRI NETS Proceedings of the IASTED International Conference Modelling, Identification and Control (AsiaMIC 2013) April 10-12, 2013 Phuket, Thailand ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR

More information

Elementary Siphons of Petri Nets and Deadlock Control in FMS

Elementary Siphons of Petri Nets and Deadlock Control in FMS Journal of Computer and Communications, 2015, 3, 1-12 Published Online July 2015 in SciRes. http://www.scirp.org/journal/jcc http://dx.doi.org/10.4236/jcc.2015.37001 Elementary Siphons of Petri Nets and

More information

CONTROL AND DEADLOCK RECOVERY OF TIMED PETRI NETS USING OBSERVERS

CONTROL AND DEADLOCK RECOVERY OF TIMED PETRI NETS USING OBSERVERS 5 e Conférence Francophone de MOdélisation et SIMulation Modélisation et simulation pour l analyse et l optimisation des systèmes industriels et logistiques MOSIM 04 du 1 er au 3 septembre 2004 - Nantes

More information

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING Alessandro Giua Xiaolan Xie Dip. Ing. Elettrica ed Elettronica, U. di Cagliari, Italy. Email: giua@diee.unica.it INRIA/MACSI Team, ISGMP, U. de Metz, France.

More information

A Deadlock Prevention Policy for Flexible Manufacturing Systems Using Siphons

A Deadlock Prevention Policy for Flexible Manufacturing Systems Using Siphons Proceedings of the 2001 IEEE International Conference on Robotics & Automation Seoul, Korea May 21-26, 2001 A Deadlock Prevention Policy for Flexible Manufacturing Systems Using Siphons YiSheng Huang 1

More information

Modelling of Railway Network Using Petri Nets

Modelling of Railway Network Using Petri Nets Modelling of Railway Network Using Petri Nets MANDIRA BANIK 1, RANJAN DASGUPTA 2 1 Dept. of Computer Sc. & Engg., National Institute of Technical Teachers' Training & Research, Kolkata, West Bengal, India

More information

Liveness enforcing supervisors for railway networks using ES 2 PR Petri nets

Liveness enforcing supervisors for railway networks using ES 2 PR Petri nets Liveness enforcing supervisors for railway networks using ES 2 PR Petri nets Alessandro Giua, Carla Seatzu Department of Electrical and Electronic Engineering, University of Cagliari, Piazza d Armi 923

More information

A Siphon-based Deadlock Prevention Policy for a Class of Petri Nets - S 3 PMR

A Siphon-based Deadlock Prevention Policy for a Class of Petri Nets - S 3 PMR Proceedings of the 17th World Congress The International Federation of Automatic Control A Siphon-based eadlock Prevention Policy for a Class of Petri Nets - S 3 PMR Mingming Yan, Rongming Zhu, Zhiwu Li

More information

Structural Analysis of Resource Allocation Systems with Synchronization Constraints

Structural Analysis of Resource Allocation Systems with Synchronization Constraints Structural Analysis of Resource Allocation Systems with Synchronization Constraints Spyros Reveliotis School of Industrial & Systems Engineering Georgia Institute of Technology Atlanta, GA 30332 USA Abstract

More information

A deadlock prevention method for railway networks using monitors for colored Petri nets

A deadlock prevention method for railway networks using monitors for colored Petri nets A deadlock prevention method for railway networks using monitors for colored Petri nets Maria Pia Fanti Dip di Elettrotecnica ed Elettronica Politecnico di Bari, Italy fanti@deemailpolibait Abstract The

More information

Evaluation of deadlock control designs in automated manufacturing systems

Evaluation of deadlock control designs in automated manufacturing systems Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management Dubai, UAE, March 3 5, 2015 Evaluation of deadlock control designs in automated manufacturing systems

More information

Supervisory Control of Petri Nets with. Uncontrollable/Unobservable Transitions. John O. Moody and Panos J. Antsaklis

Supervisory Control of Petri Nets with. Uncontrollable/Unobservable Transitions. John O. Moody and Panos J. Antsaklis Supervisory Control of Petri Nets with Uncontrollable/Unobservable Transitions John O. Moody and Panos J. Antsaklis Department of Electrical Engineering University of Notre Dame, Notre Dame, IN 46556 USA

More information

Research Article Comparison and Evaluation of Deadlock Prevention Methods for Different Size Automated Manufacturing Systems

Research Article Comparison and Evaluation of Deadlock Prevention Methods for Different Size Automated Manufacturing Systems Mathematical Problems in Engineering Volume 2015, Article ID 537893, 19 pages http://dx.doi.org/10.1155/2015/537893 Research Article Comparison and Evaluation of Deadlock Prevention Methods for Different

More information

c 2014 Vijayalakshmi Deverakonda

c 2014 Vijayalakshmi Deverakonda c 214 Vijayalakshmi Deverakonda DISJUNCTIVE NORMAL FORMULA BASED SUPERVISORY CONTROL POLICY FOR GENERAL PETRI NETS BY VIJAYALAKSHMI DEVERAKONDA THESIS Submitted in partial fulfillment of the requirements

More information

IN AN industrial automated manufacturing system (AMS),

IN AN industrial automated manufacturing system (AMS), IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, VOL. 45, NO. 11, NOVEMBER 2015 1459 Lexicographic Multiobjective Integer Programming for Optimal and Structurally Minimal Petri Net Supervisors

More information

A Method Based on Depth-first Search to Compute All Minimal Siphons

A Method Based on Depth-first Search to Compute All Minimal Siphons 2148 JOURNAL OF SOFTWARE, VOL. 9, NO. 8, AUGUST 2014 A Method Based on Depth-first Search to Compute All Minimal Siphons Fan Ning Hangzhou Vocational & Technical College, Hangzhou 310018, China ningfanse@126.com

More information

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS Francesco Basile, Ciro Carbone, Pasquale Chiacchio Dipartimento di Ingegneria Elettrica e dell Informazione, Università

More information

Analysis and Optimization of Discrete Event Systems using Petri Nets

Analysis and Optimization of Discrete Event Systems using Petri Nets Volume 113 No. 11 2017, 1 10 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Analysis and Optimization of Discrete Event Systems using Petri Nets

More information

Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets through the Theory of Regions

Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets through the Theory of Regions Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets through the Theory of Regions Spyros A. Reveliotis 1 and Jin Young Choi 2 1 School of Industrial & Systems

More information

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models 4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe

More information

c 2011 Nisha Somnath

c 2011 Nisha Somnath c 2011 Nisha Somnath HIERARCHICAL SUPERVISORY CONTROL OF COMPLEX PETRI NETS BY NISHA SOMNATH THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Science in Aerospace

More information

Marking Estimation in Labelled Petri nets by the Representative Marking Graph

Marking Estimation in Labelled Petri nets by the Representative Marking Graph DOI: 10.1109/XXXXXXXXXXXXXXXX. Marking Estimation in Labelled Petri nets by the Representative Marking Graph Ziyue Ma, Yin Tong, Zhiwu Li, and Alessandro Giua July 2017 Abstract In this paper a method

More information

Time Petri Nets. Miriam Zia School of Computer Science McGill University

Time Petri Nets. Miriam Zia School of Computer Science McGill University Time Petri Nets Miriam Zia School of Computer Science McGill University Timing Specifications Why is time introduced in Petri nets? To model interaction between activities taking into account their start

More information

Computers and Mathematics with Applications. Module-based architecture for a periodic job-shop scheduling problem

Computers and Mathematics with Applications. Module-based architecture for a periodic job-shop scheduling problem Computers and Mathematics with Applications 64 (2012) 1 10 Contents lists available at SciVerse ScienceDirect Computers and Mathematics with Applications journal homepage: www.elsevier.com/locate/camwa

More information

Petri nets analysis using incidence matrix method inside ATOM 3

Petri nets analysis using incidence matrix method inside ATOM 3 Petri nets analysis using incidence matrix method inside ATOM 3 Alejandro Bellogín Kouki Universidad Autónoma de Madrid alejandro. bellogin @ uam. es June 13, 2008 Outline 1 Incidence matrix Tools 2 State

More information

Petri Net Modeling of Irrigation Canal Networks

Petri Net Modeling of Irrigation Canal Networks Petri Net Modeling of Irrigation Canal Networks Giorgio Corriga, Alessandro Giua, Giampaolo Usai DIEE: Dip. di Ingegneria Elettrica ed Elettronica Università di Cagliari P.zza d Armi 09123 CAGLIARI, Italy

More information

3.4 Relaxations and bounds

3.4 Relaxations and bounds 3.4 Relaxations and bounds Consider a generic Discrete Optimization problem z = min{c(x) : x X} with an optimal solution x X. In general, the algorithms generate not only a decreasing sequence of upper

More information

NECESSARY AND SUFFICIENT CONDITIONS FOR DEADLOCKS IN FLEXIBLE MANUFACTURING SYSTEMS BASED ON A DIGRAPH MODEL

NECESSARY AND SUFFICIENT CONDITIONS FOR DEADLOCKS IN FLEXIBLE MANUFACTURING SYSTEMS BASED ON A DIGRAPH MODEL Asian Journal of Control, Vol. 6, No. 2, pp. 217-228, June 2004 217 NECESSARY AND SUFFICIENT CONDITIONS FOR DEADLOCKS IN FLEXIBLE MANUFACTURING SYSTEMS BASED ON A DIGRAPH MODEL Wenle Zhang, Robert P. Judd,

More information

Linear programming techniques for analysis and control of batches Petri nets

Linear programming techniques for analysis and control of batches Petri nets Linear programming techniques for analysis and control of batches Petri nets Isabel Demongodin, LSIS, Univ. of Aix-Marseille, France (isabel.demongodin@lsis.org) Alessandro Giua DIEE, Univ. of Cagliari,

More information

Gestion de la production. Book: Linear Programming, Vasek Chvatal, McGill University, W.H. Freeman and Company, New York, USA

Gestion de la production. Book: Linear Programming, Vasek Chvatal, McGill University, W.H. Freeman and Company, New York, USA Gestion de la production Book: Linear Programming, Vasek Chvatal, McGill University, W.H. Freeman and Company, New York, USA 1 Contents 1 Integer Linear Programming 3 1.1 Definitions and notations......................................

More information

Basis Marking Representation of Petri Net Reachability Spaces and Its Application to the Reachability Problem

Basis Marking Representation of Petri Net Reachability Spaces and Its Application to the Reachability Problem Basis Marking Representation of Petri Net Reachability Spaces and Its Application to the Reachability Problem Ziyue Ma, Yin Tong, Zhiwu Li, and Alessandro Giua June, 017 Abstract In this paper a compact

More information

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012

Search and Lookahead. Bernhard Nebel, Julien Hué, and Stefan Wölfl. June 4/6, 2012 Search and Lookahead Bernhard Nebel, Julien Hué, and Stefan Wölfl Albert-Ludwigs-Universität Freiburg June 4/6, 2012 Search and Lookahead Enforcing consistency is one way of solving constraint networks:

More information

Research Article Supervisor Reconfiguration for Deadlock Prevention by Resources Reallocation

Research Article Supervisor Reconfiguration for Deadlock Prevention by Resources Reallocation Applied Mathematics Volume 2013, Article ID 315894, 11 pages http://dx.doi.org/10.1155/2013/315894 Research Article Supervisor Reconfiguration for Deadlock Prevention by Resources Reallocation Miao Liu,

More information

OPTIMAL TOKEN ALLOCATION IN TIMED CYCLIC EVENT GRAPHS

OPTIMAL TOKEN ALLOCATION IN TIMED CYCLIC EVENT GRAPHS OPTIMAL TOKEN ALLOCATION IN TIMED CYCLIC EVENT GRAPHS Alessandro Giua, Aldo Piccaluga, Carla Seatzu Department of Electrical and Electronic Engineering, University of Cagliari, Italy giua@diee.unica.it

More information

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009 Branch-and-Bound Algorithm November 3, 2009 Outline Lecture 23 Modeling aspect: Either-Or requirement Special ILPs: Totally unimodular matrices Branch-and-Bound Algorithm Underlying idea Terminology Formal

More information

E. Salimi 1, N. Somnath 1 and R.S. Sreenivas 1

E. Salimi 1, N. Somnath 1 and R.S. Sreenivas 1 A Tutorial on the Synthesis of the Maximally Permissive Liveness Enforcing Supervisory Policy in Discrete-Event/Discrete-State Systems modeled by a Class of General Petri Nets E. Salimi 1, N. Somnath 1

More information

Control of Hybrid Petri Nets using Max-Plus Algebra

Control of Hybrid Petri Nets using Max-Plus Algebra Control of Hybrid Petri Nets using Max-Plus Algebra FABIO BALDUZZI*, ANGELA DI FEBBRARO*, ALESSANDRO GIUA, SIMONA SACONE^ *Dipartimento di Automatica e Informatica Politecnico di Torino Corso Duca degli

More information

Resource-Oriented Petri Nets in Deadlock Avoidance of AGV Systems

Resource-Oriented Petri Nets in Deadlock Avoidance of AGV Systems Proceedings of the 2001 IEEE International Conference on Robotics & Automation Seoul, Korea May 21-26, 2001 Resource-Oriented Petri Nets in Deadlock Avoidance of AGV Systems Naiqi Wu Department of Mechatronics

More information

of Kentucky, Lexington, KY USA,

of Kentucky, Lexington, KY USA, Controlled Petri Nets: A Tutorial Survey L. E. Holloway 1 and B. H. Krogh 2 1 Center for Manufacturing Systems and Dept. of Electrical Engineering, University of Kentucky, Lexington, KY 40506-0108 USA,

More information

An Exact Algorithm for the Steiner Tree Problem with Delays

An Exact Algorithm for the Steiner Tree Problem with Delays Electronic Notes in Discrete Mathematics 36 (2010) 223 230 www.elsevier.com/locate/endm An Exact Algorithm for the Steiner Tree Problem with Delays Valeria Leggieri 1 Dipartimento di Matematica, Università

More information

Linear Time Analysis of Properties of Conflict-Free and General Petri nets

Linear Time Analysis of Properties of Conflict-Free and General Petri nets Linear Time Analysis of Properties of Conflict-Free and General Petri nets Paola Alimonti Esteban Feuerstein Luigi Laura Umberto Nanni Technical Report n. 9, 2010 Linear Time Analysis of Properties of

More information

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions Wil M.P. van der Aalst Process and Data Science (PADS), RWTH Aachen University, Germany. wvdaalst@pads.rwth-aachen.de

More information

DECOMPOSITION OF PETRI NETS

DECOMPOSITION OF PETRI NETS Cybernetics and Systems Analysis, Vol. 40, No. 5, 2004 DECOMPOSITION OF PETRI NETS D. A. Zaitsev UDC 519.74 The problem of splitting any given Petri net into functional subnets is considered. The properties

More information

Zhennan Fei, Knut Åkesson and Spyros Reveliotis

Zhennan Fei, Knut Åkesson and Spyros Reveliotis Symbolic Computation and Representation of Deadlock Avoidance Policies for Complex Resource Allocation Systems with Application to Multithreaded Software Zhennan Fei, Knut Åkesson and Spyros Reveliotis

More information

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse

An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse An Adaptive Partition-based Approach for Solving Two-stage Stochastic Programs with Fixed Recourse Yongjia Song, James Luedtke Virginia Commonwealth University, Richmond, VA, ysong3@vcu.edu University

More information

Cycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools

Cycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools International Journal of Automation and Computing 8(4), November 2011, 437-444 DOI: 10.1007/s11633-011-0601-5 Cycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools

More information

A Structure Causality Relation for Liveness Characterisation in Petri Nets

A Structure Causality Relation for Liveness Characterisation in Petri Nets Journal of Universal Computer Science, vol. 12, no. 2 (2006), 214-232 submitted: 4/10/04, accepted: 9/5/05, appeared: 28/2/06 J.UCS A Structure Causality Relation for Liveness Characterisation in Petri

More information

Time and Timed Petri Nets

Time and Timed Petri Nets Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time

More information

Synthesis of Maximally Permissive Non-blocking Supervisors for Partially Observed Discrete Event Systems

Synthesis of Maximally Permissive Non-blocking Supervisors for Partially Observed Discrete Event Systems 53rd IEEE Conference on Decision and Control December 5-7, 24. Los Angeles, California, USA Synthesis of Maximally Permissive Non-blocking Supervisors for Partially Observed Discrete Event Systems Xiang

More information

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

Petri nets. s 1 s 2. s 3 s 4. directed arcs. Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1

More information

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic

More information

Travelling Salesman Problem

Travelling Salesman Problem Travelling Salesman Problem Fabio Furini November 10th, 2014 Travelling Salesman Problem 1 Outline 1 Traveling Salesman Problem Separation Travelling Salesman Problem 2 (Asymmetric) Traveling Salesman

More information

A Review of Petri Net Modeling of Dynamical Systems

A Review of Petri Net Modeling of Dynamical Systems A Review of Petri Net Modeling of Dynamical Systems Arundhati Lenka S.O.A University,Bhubaneswar l_arundhati@yahoo.co.in Contact-+91-9861058591 Dr.Chakradhar Das S.I.E.T College,Dhenkanal dashchakradhar@gmail.com

More information

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus

On Controllability and Normality of Discrete Event. Dynamical Systems. Ratnesh Kumar Vijay Garg Steven I. Marcus On Controllability and Normality of Discrete Event Dynamical Systems Ratnesh Kumar Vijay Garg Steven I. Marcus Department of Electrical and Computer Engineering, The University of Texas at Austin, Austin,

More information

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS Proceedings SDPS, Fifth World Conference on Integrated Design and Process Technologies, IEEE International Conference on Systems Integration, Dallas,

More information

Branch-and-Bound. Leo Liberti. LIX, École Polytechnique, France. INF , Lecture p. 1

Branch-and-Bound. Leo Liberti. LIX, École Polytechnique, France. INF , Lecture p. 1 Branch-and-Bound Leo Liberti LIX, École Polytechnique, France INF431 2011, Lecture p. 1 Reminders INF431 2011, Lecture p. 2 Problems Decision problem: a question admitting a YES/NO answer Example HAMILTONIAN

More information

Chapter 7 Network Flow Problems, I

Chapter 7 Network Flow Problems, I Chapter 7 Network Flow Problems, I Network flow problems are the most frequently solved linear programming problems. They include as special cases, the assignment, transportation, maximum flow, and shortest

More information

is called an integer programming (IP) problem. model is called a mixed integer programming (MIP)

is called an integer programming (IP) problem. model is called a mixed integer programming (MIP) INTEGER PROGRAMMING Integer Programming g In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is

More information

Decidability of Single Rate Hybrid Petri Nets

Decidability of Single Rate Hybrid Petri Nets Decidability of Single Rate Hybrid Petri Nets Carla Seatzu, Angela Di Febbraro, Fabio Balduzzi, Alessandro Giua Dip. di Ing. Elettrica ed Elettronica, Università di Cagliari, Italy email: {giua,seatzu}@diee.unica.it.

More information

Solution of Large-scale LP Problems Using MIP Solvers: Repeated Assignment Problem

Solution of Large-scale LP Problems Using MIP Solvers: Repeated Assignment Problem The Eighth International Symposium on Operations Research and Its Applications (ISORA 09) Zhangjiajie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 190 197 Solution of Large-scale LP Problems

More information

Combinatorial optimization problems

Combinatorial optimization problems Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:

More information

Property-preserving subnet reductions for designing manufacturing systems with shared resources

Property-preserving subnet reductions for designing manufacturing systems with shared resources Theoretical Computer Science 332 (2005) 461 485 www.elsevier.com/locate/tcs Property-preserving subnet reductions for designing manufacturing systems with shared resources H.J. Huang a,, L. Jiao b, T.Y.

More information

Liang Hong, 1 YiFan Hou, 2 JunFeng Jing, 1 AnRong Wang, 2 and Dmitry A. Litvin Introduction

Liang Hong, 1 YiFan Hou, 2 JunFeng Jing, 1 AnRong Wang, 2 and Dmitry A. Litvin Introduction Discrete Dynamics in Nature and Society Volume 015, Article ID 57963, 15 pages http://dx.doi.org/10.1155/015/57963 Research Article Deadlock Prevention Policy with Behavioral Optimality or Suboptimality

More information

Specification models and their analysis Petri Nets

Specification models and their analysis Petri Nets Specification models and their analysis Petri Nets Kai Lampka December 10, 2010 1 30 Part I Petri Nets Basics Petri Nets Introduction A Petri Net (PN) is a weighted(?), bipartite(?) digraph(?) invented

More information

where X is the feasible region, i.e., the set of the feasible solutions.

where X is the feasible region, i.e., the set of the feasible solutions. 3.5 Branch and Bound Consider a generic Discrete Optimization problem (P) z = max{c(x) : x X }, where X is the feasible region, i.e., the set of the feasible solutions. Branch and Bound is a general semi-enumerative

More information

Preprocessing. Complements of Operations Research. Giovanni Righini. Università degli Studi di Milano

Preprocessing. Complements of Operations Research. Giovanni Righini. Università degli Studi di Milano Preprocessing Complements of Operations Research Giovanni Righini Università degli Studi di Milano Preprocessing Computational complexity theory classifies problems. However, when we run algorithms, this

More information

Petri Nets (for Planners)

Petri Nets (for Planners) Petri (for Planners) B. Bonet, P. Haslum... from various places... ICAPS 2011 & Motivation Petri (PNs) is formalism for modelling discrete event systems Developed by (and named after) C.A. Petri in 1960s

More information

Logical Control of Complex Resource Allocation Systems

Logical Control of Complex Resource Allocation Systems Logical Control of Complex esource Allocation Systems Spyros eveliotis School of Industrial & Systems Engineering Georgia Institute of Technology WODES 08 Sorrento, Italy Some major underlying themes eal-time

More information

Intuitionistic Fuzzy Estimation of the Ant Methodology

Intuitionistic Fuzzy Estimation of the Ant Methodology BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 2 Sofia 2009 Intuitionistic Fuzzy Estimation of the Ant Methodology S Fidanova, P Marinov Institute of Parallel Processing,

More information

Computer Sciences Department

Computer Sciences Department Computer Sciences Department Solving Large Steiner Triple Covering Problems Jim Ostrowski Jeff Linderoth Fabrizio Rossi Stefano Smriglio Technical Report #1663 September 2009 Solving Large Steiner Triple

More information

Cycle time optimization of deterministic timed weighted marked graphs by transformation

Cycle time optimization of deterministic timed weighted marked graphs by transformation Cycle time optimization of deterministic timed weighted marked graphs by transformation Zhou He, Zhiwu Li, Alessandro Giua, Abstract Timed marked graphs, a special class of Petri nets, are extensively

More information

Performance Control of Markovian Petri Nets via Fluid Models: A Stock-Level Control Example

Performance Control of Markovian Petri Nets via Fluid Models: A Stock-Level Control Example Performance Control of Markovian Petri Nets via Fluid Models: A Stock-Level Control Example C. Renato Vázquez Manuel Silva Abstract Petri nets is a well-know formalism for studying discrete event systems.

More information

Approximation Metrics for Discrete and Continuous Systems

Approximation Metrics for Discrete and Continuous Systems University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science May 2007 Approximation Metrics for Discrete Continuous Systems Antoine Girard University

More information

7. Queueing Systems. 8. Petri nets vs. State Automata

7. Queueing Systems. 8. Petri nets vs. State Automata Petri Nets 1. Finite State Automata 2. Petri net notation and definition (no dynamics) 3. Introducing State: Petri net marking 4. Petri net dynamics 5. Capacity Constrained Petri nets 6. Petri net models

More information

arxiv: v1 [cs.sy] 2 Apr 2019

arxiv: v1 [cs.sy] 2 Apr 2019 On the Existence of a Fixed Spectrum for a Multi-channel Linear System: A Matroid Theory Approach F Liu 1 and A S Morse 1 arxiv:190401499v1 [cssy] 2 Apr 2019 Abstract Conditions for the existence of a

More information

Modeling and Stability Analysis of a Communication Network System

Modeling and Stability Analysis of a Communication Network System Modeling and Stability Analysis of a Communication Network System Zvi Retchkiman Königsberg Instituto Politecnico Nacional e-mail: mzvi@cic.ipn.mx Abstract In this work, the modeling and stability problem

More information

Simulation of Spiking Neural P Systems using Pnet Lab

Simulation of Spiking Neural P Systems using Pnet Lab Simulation of Spiking Neural P Systems using Pnet Lab Venkata Padmavati Metta Bhilai Institute of Technology, Durg vmetta@gmail.com Kamala Krithivasan Indian Institute of Technology, Madras kamala@iitm.ac.in

More information

Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems. Joachim Wehler

Free-Choice Petri Nets without Frozen Tokens, and Bipolar Synchronization Systems. Joachim Wehler Free-Choice Petri Nets without Frozen okens, and Bipolar Synchronization Systems Joachim Wehler Ludwig-Maximilians-Universität München, Germany joachim.wehler@gmx.net Abstract: Bipolar synchronization

More information

Chapter 3 Deterministic planning

Chapter 3 Deterministic planning Chapter 3 Deterministic planning In this chapter we describe a number of algorithms for solving the historically most important and most basic type of planning problem. Two rather strong simplifying assumptions

More information

Decision Procedures An Algorithmic Point of View

Decision Procedures An Algorithmic Point of View An Algorithmic Point of View ILP References: Integer Programming / Laurence Wolsey Deciding ILPs with Branch & Bound Intro. To mathematical programming / Hillier, Lieberman Daniel Kroening and Ofer Strichman

More information

Heuristics for The Whitehead Minimization Problem

Heuristics for The Whitehead Minimization Problem Heuristics for The Whitehead Minimization Problem R.M. Haralick, A.D. Miasnikov and A.G. Myasnikov November 11, 2004 Abstract In this paper we discuss several heuristic strategies which allow one to solve

More information

Visual Cryptography Schemes with Optimal Pixel Expansion

Visual Cryptography Schemes with Optimal Pixel Expansion Visual Cryptography Schemes with Optimal Pixel Expansion Carlo Blundo, Stelvio Cimato and Alfredo De Santis Dipartimento di Informatica ed Applicazioni Università degli Studi di Salerno, 808, Baronissi

More information

Hill climbing: Simulated annealing and Tabu search

Hill climbing: Simulated annealing and Tabu search Hill climbing: Simulated annealing and Tabu search Heuristic algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Hill climbing Instead of repeating local search, it is

More information

Ma 322 Spring Ma 322. Jan 18, 20

Ma 322 Spring Ma 322. Jan 18, 20 Ma 322 Spring 2017 Ma 322 Jan 18, 20 Summary ˆ Review of the Standard Gauss Elimination Algorithm: REF+ Backsub ˆ The rank of a matrix. ˆ Vectors and Linear combinations. ˆ Span of a set of vectors. ˆ

More information

NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION. Sami Evangelista Serge Haddad Jean-François Pradat-Peyre

NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION. Sami Evangelista Serge Haddad Jean-François Pradat-Peyre NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION Sami Evangelista Serge Haddad Jean-François Pradat-Peyre CEDRIC-CNAM Paris 292, rue St Martin, 75003 Paris LAMSADE-CNRS UMR 7024 Université Paris 9 Place

More information

Modeling Continuous Systems Using Modified Petri Nets Model

Modeling Continuous Systems Using Modified Petri Nets Model Journal of Modeling & Simulation in Electrical & Electronics Engineering (MSEEE) 9 Modeling Continuous Systems Using Modified Petri Nets Model Abbas Dideban, Alireza Ahangarani Farahani, and Mohammad Razavi

More information

Complexity Analysis of Continuous Petri Nets

Complexity Analysis of Continuous Petri Nets Fundamenta Informaticae 137 (2015) 1 28 1 DOI 10.3233/FI-2015-1167 IOS Press Complexity Analysis of Continuous Petri Nets Estíbaliz Fraca Instituto de Investigación en Ingeniería de Aragón (I3A) Universidad

More information

Introduction 1.1 PROBLEM FORMULATION

Introduction 1.1 PROBLEM FORMULATION Introduction. PROBLEM FORMULATION This book deals with a single type of network optimization problem with linear cost, known as the transshipment or minimum cost flow problem. In this section, we formulate

More information

THE simulation of a continuous or discrete time system

THE simulation of a continuous or discrete time system 770 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 28, NO. 6, DECEMBER 1998 Discrete Event Representation of Qualitative Models Using Petri Nets Alessandra Fanni, Member,

More information

Research Article A Multistep Look-Ahead Deadlock Avoidance Policy for Automated Manufacturing Systems

Research Article A Multistep Look-Ahead Deadlock Avoidance Policy for Automated Manufacturing Systems Hindawi Discrete Dynamics in Nature and Society Volume 2017, Article ID 8687035, 16 pages https://doiorg/101155/2017/8687035 Research Article A Multistep Look-Ahead Deadlock Avoidance Policy for Automated

More information

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs

A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Fundamenta Informaticae XX (2004) 1 23 1 IOS Press A Polynomial-Time Algorithm for Checking Consistency of Free-Choice Signal Transition Graphs Javier Esparza Institute for Formal Methods in Computer Science

More information

THROUGHPUT ANALYSIS OF MANUFACTURING CELLS USING TIMED PETRI NETS

THROUGHPUT ANALYSIS OF MANUFACTURING CELLS USING TIMED PETRI NETS c 1994 IEEE. Published in the Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, San Antonio, TX, October 2 5, 1994. Personal use of this material is permitted. However,

More information

3.7 Cutting plane methods

3.7 Cutting plane methods 3.7 Cutting plane methods Generic ILP problem min{ c t x : x X = {x Z n + : Ax b} } with m n matrix A and n 1 vector b of rationals. According to Meyer s theorem: There exists an ideal formulation: conv(x

More information

Designing parsimonious scheduling policies for complex resource allocation systems through concurrency theory

Designing parsimonious scheduling policies for complex resource allocation systems through concurrency theory Designing parsimonious scheduling policies for complex resource allocation systems through concurrency theory Ran Li and Spyros Reveliotis School of Industrial & Systems Engineering Georgia Institute of

More information

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved.

Chapter 11. Approximation Algorithms. Slides by Kevin Wayne Pearson-Addison Wesley. All rights reserved. Chapter 11 Approximation Algorithms Slides by Kevin Wayne. Copyright @ 2005 Pearson-Addison Wesley. All rights reserved. 1 Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should

More information

Fault Tolerance, State Estimation and Fault Diagnosis in Petri Net Models

Fault Tolerance, State Estimation and Fault Diagnosis in Petri Net Models Fault Tolerance, State Estimation and Fault Diagnosis in Petri Net Models Christoforos Hadjicostis Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign March 27,

More information

Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems

Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems 2007 IEEE International Conference on Robotics and Automation Roma, Italy, 10-14 April 2007 Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems Spyros Reveliotis,

More information

Efficient diagnosability assessment via ILP optimization: a railway benchmark

Efficient diagnosability assessment via ILP optimization: a railway benchmark Efficient diagnosability assessment via LP optimization: a railway benchmark 23rd EEE nternational Conference on Emerging Technologies and Factory Automation (ETFA 2018) F. Basile1, A. Boussif2, Gianmaria

More information

Introduction to Integer Linear Programming

Introduction to Integer Linear Programming Lecture 7/12/2006 p. 1/30 Introduction to Integer Linear Programming Leo Liberti, Ruslan Sadykov LIX, École Polytechnique liberti@lix.polytechnique.fr sadykov@lix.polytechnique.fr Lecture 7/12/2006 p.

More information