ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR DEADLOCK PROBLEMS OF FLEXIBLE MANUFACTURING SYSTEMS USING PETRI NETS

Similar documents
A Deadlock Prevention Policy for Flexible Manufacturing Systems Using Siphons

Elementary Siphons of Petri Nets and Deadlock Control in FMS

A reachability graph partitioning technique for the analysis of deadlock prevention methods in bounded Petri nets

A Siphon-based Deadlock Prevention Policy for a Class of Petri Nets - S 3 PMR

NONBLOCKING CONTROL OF PETRI NETS USING UNFOLDING. Alessandro Giua Xiaolan Xie

IN AN industrial automated manufacturing system (AMS),

Structural Analysis of Resource Allocation Systems with Synchronization Constraints

Research Article Comparison and Evaluation of Deadlock Prevention Methods for Different Size Automated Manufacturing Systems

A Method Based on Depth-first Search to Compute All Minimal Siphons

Efficient Deadlock Prevention in Petri Nets through the Generation of Selected Siphons

Evaluation of deadlock control designs in automated manufacturing systems

CONTROL AND DEADLOCK RECOVERY OF TIMED PETRI NETS USING OBSERVERS

Computers and Mathematics with Applications. Module-based architecture for a periodic job-shop scheduling problem

Research Article Supervisor Reconfiguration for Deadlock Prevention by Resources Reallocation

Liveness enforcing supervisors for railway networks using ES 2 PR Petri nets

Analysis and Optimization of Discrete Event Systems using Petri Nets

A deadlock prevention method for railway networks using monitors for colored Petri nets

DESIGN OF LIVENESS-ENFORCING SUPERVISORS VIA TRANSFORMING PLANT PETRI NET MODELS OF FMS

NECESSARY AND SUFFICIENT CONDITIONS FOR DEADLOCKS IN FLEXIBLE MANUFACTURING SYSTEMS BASED ON A DIGRAPH MODEL

DES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models

OPTIMAL TOKEN ALLOCATION IN TIMED CYCLIC EVENT GRAPHS

c 2014 Vijayalakshmi Deverakonda

A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS

Linear programming techniques for analysis and control of batches Petri nets

A Review of Petri Net Modeling of Dynamical Systems

Designing Reversibility-Enforcing Supervisors of Polynomial Complexity for Bounded Petri Nets through the Theory of Regions

c 2011 Nisha Somnath

Generalized Algebraic Deadlock Avoidance Policies for Sequential Resource Allocation Systems

Time and Timed Petri Nets

Modelling of Railway Network Using Petri Nets

Cycle time optimization of deterministic timed weighted marked graphs by transformation

Property-preserving subnet reductions for designing manufacturing systems with shared resources

Deadlock analysis and control based on Petri nets: A siphon approach review

Linear Time Analysis of Properties of Conflict-Free and General Petri nets

Time(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA

Resource-Oriented Petri Nets in Deadlock Avoidance of AGV Systems

Liang Hong, 1 YiFan Hou, 2 JunFeng Jing, 1 AnRong Wang, 2 and Dmitry A. Litvin Introduction

Specification models and their analysis Petri Nets

NEW COLOURED REDUCTIONS FOR SOFTWARE VALIDATION. Sami Evangelista Serge Haddad Jean-François Pradat-Peyre

Applications of Petri Nets

Georg Frey ANALYSIS OF PETRI NET BASED CONTROL ALGORITHMS

Modeling and Stability Analysis of a Communication Network System

Simulation of Spiking Neural P Systems using Pnet Lab

Logical Control of Complex Resource Allocation Systems

Zhennan Fei, Knut Åkesson and Spyros Reveliotis

E. Salimi 1, N. Somnath 1 and R.S. Sreenivas 1

Petri nets analysis using incidence matrix method inside ATOM 3

Marking Estimation in Labelled Petri nets by the Representative Marking Graph

Petri Nets (for Planners)

On Qualitative Analysis of Fault Trees Using Structurally Persistent Nets

MODELING AND SIMULATION BY HYBRID PETRI NETS. systems, communication systems, etc). Continuous Petri nets (in which the markings are real

Markings in Perpetual Free-Choice Nets Are Fully Characterized by Their Enabled Transitions

Research Article A Multistep Look-Ahead Deadlock Avoidance Policy for Automated Manufacturing Systems

HYPENS Manual. Fausto Sessego, Alessandro Giua, Carla Seatzu. February 7, 2008

Classes of Petri Nets That a Necessary and Sufficient Condition for Reachability is Obtainable

Stochastic Petri Net. Ben, Yue (Cindy) 2013/05/08

748 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 54, NO. 4, APRIL 2009

7. Queueing Systems. 8. Petri nets vs. State Automata

Modeling Continuous Systems Using Modified Petri Nets Model

THE simulation of a continuous or discrete time system

Representation of Supervisory Controls using State Tree Structures, Binary Decision Diagrams, Automata, and Supervisor Reduction

Synthesis of Maximally Permissive Non-blocking Supervisors for Partially Observed Discrete Event Systems

Complexity Analysis of Continuous Petri Nets

A Structure Causality Relation for Liveness Characterisation in Petri Nets

Compact Regions for Place/Transition Nets

An Holistic State Equation for Timed Petri Nets

Process Completing Sequences for Resource Allocation Systems with Synchronization

Basis Marking Representation of Petri Net Reachability Spaces and Its Application to the Reachability Problem

Petri Net Modeling of Irrigation Canal Networks

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

ADVANCED ROBOTICS. PLAN REPRESENTATION Generalized Stochastic Petri nets and Markov Decision Processes

Synchronizing sequences. on a class of unbounded systems using synchronized Petri nets

Research Article Mixed Integer Programming-Based Liveness Test for FMS with Full Routing Flexibility

Learning k-edge Deterministic Finite Automata in the Framework of Active Learning

Time Petri Nets. Miriam Zia School of Computer Science McGill University

FUZZY AUTOMATION CONTROLLER FOR FLEXIBLE MANUFACTURING SYSTEMS

Embedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1

System Reliability Allocation Based on Bayesian Network

1. sort of tokens (e.g. indistinguishable (black), coloured, structured,...),

On Detecting Multiple Faults in Baseline Interconnection Networks

On the Optimality of Randomized Deadlock Avoidance Policies

of Kentucky, Lexington, KY USA,

DECOMPOSITION OF PETRI NETS

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Supervisory Control of Petri Nets with. Uncontrollable/Unobservable Transitions. John O. Moody and Panos J. Antsaklis

Optimal Non-blocking Decentralized Supervisory Control Using G-Control Consistency

Fault Tolerance, State Estimation and Fault Diagnosis in Petri Net Models

Direct mapping of low-latency asynchronous

IN THIS PAPER, we consider a class of continuous-time recurrent

Using Shared-Resource Capacity for Robust Control of Failure-Prone Manufacturing Systems

A Canonical Contraction for Safe Petri Nets

Cycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools

Methods for the specification and verification of business processes MPB (6 cfu, 295AA)

Decidability of Single Rate Hybrid Petri Nets

FOURIER-MOTZKIN METHODS FOR FAULT DIAGNOSIS IN DISCRETE EVENT SYSTEMS

Decentralized Modular Control of Concurrent Fuzzy Discrete Event Systems

Acceleration of Levenberg-Marquardt method training of chaotic systems fuzzy modeling

THROUGHPUT ANALYSIS OF MANUFACTURING CELLS USING TIMED PETRI NETS

A Bounded True Concurrent Process Algebra and Flexible Manufacturing Systems

arxiv: v1 [cs.sy] 2 Apr 2019

Transcription:

Proceedings of the IASTED International Conference Modelling, Identification and Control (AsiaMIC 2013) April 10-12, 2013 Phuket, Thailand ONE NOVEL COMPUTATIONALLY IMPROVED OPTIMAL CONTROL POLICY FOR DEADLOCK PROBLEMS OF FLEXIBLE MANUFACTURING SYSTEMS USING PETRI NETS Yen-Liang Pan, Wei-Shiang Liao, Chia-Hsing Wei, Tzu-Hsiang Huang Avionic Engineering, R.O.C. Air Force Academy No. Sisou 1, Jieshou W. Rd., Gangshan Dist., Kaohsiung City/Taiwan R.O.C. Corresponding author s e-mail: peterpan960326@gmail.com ABSTRACT Petri nets have been proven to be very useful in the modeling, analysis, simulation, and control of flexible manufacturing systems (FMS). The first reason is conflicts and buffer sizes can be modeled easily and efficiently. The other one is deadlock in this system can then be detected effortlessly. Therefore, how to solve the deadlock problem is an important issue in this domain. In existing literature, theory of regions is viewed one powerful method for obtaining maximally permissive controllers. All legal and live maximal behavior of Petri net models can be preserved by using marking/transitionseparation instances (MTSIs) technology. However, computing all sets of MTSIs is an extremely time consuming problem. Additionally, computing linear programming program (LPP) is another serious time consuming problem. In our previous works, crucial MTSI () concept is first proposed to improve the computational cost. In this paper, the selective siphon method and reduction technology are merged in our new deadlock prevention policy. The merit of the proposed policy is that the number s can then be simplified further. Experimental results indicate that it is the most efficient policy to obtain maximal permissive behavior of Petri net models. KEY WORDS Petri nets, flexible manufacturing system, deadlock prevention, theory of regions. 1. Introduction Petri nets have been recognized as one of the most powerful tools for modeling flexible manufacturing systems (FMSs) [1]. The main reason is conflicts and buffer sizes in FMSs can be modeled easily and efficiently. Additionally, deadlock in FMSs can also be detected effortlessly by using Petri nets theory. Therefore, how to solve the deadlock problem is an important issue in this domain. In existing literature [13-25], the theory of regions [2] is one very powerful method to obtain system s maximally permissive liveness. Uzam [3] further based on the theory of regions to define deadlock-zone (DZ), deadlock-free-zone (DFZ), event-state-separation-problem (ESSP). An optimal (i.e. maximally permissive) controller can be obtained once all ESSPs are processed (e.g. deadlock-free) in a deadlock system. However, its disadvantage is that same control places are obtained by numerous of ESSPs). On the other hand, Ghaffari et al. [4] define legal marking, dangerous markings, forbidden markings, and the set of Marking/Transition-Separation Instance (MTSI) based on the theory of regions. Under the MTSI method, one optimal deadlock prevention policy is also proposed. Unfortunately, the main disadvantage is still that same control places are obtained by numerous of MTSIs. In [7], Crucial MTSI () concept first developed. It improves the efficiency of conventional MTSI method. However, only one type is defined. In [9], two types s are proposed formally. Two type s can cover all MTSIs. The computational cost is hence reduced further. In [8], the reduction technology [1] is merged into the method so as to Linear Programming Program (LPP) is reduced since reachability graph is simplified. In this paper, the selective siphon method and reduction technology are merged in our new deadlock prevention policy. The advantage of the proposed method is that the number of two types can then be simplified. The LPP is also reduced. The detailed steps are as follows. First of all, reachability graph is still needed. Second, the reduction technology is used to simply the construct of system. Third, s are identified. Further, selective siphons method is adopted to check if all dead/quasi-dead markings of s are covered by these selective siphons. Furthermore, choose anyone that belongs to a same selective siphon to be processed. Finally, controllers are therefore obtained. Experimental results indicate that it is the most efficient policy to obtain maximal permissive behavior of Petri net models. The rest of this paper is organized as follows. Section II presents the basic definitions and properties of the theory of regions, MTSI and critical markings. Section III then describes the proposed deadlock prevention policy. Next, Section IV presents the experimental results. Section V gives the comparisons. Conclusions are made in Section VI. DOI: 10.2316/P.2013.799-038 33

2. Preliminaries 2.1 Petri Nets [1] A PN is a 5-tuple, PN = (P, T, F, W, M 0 ) where P is a finite set of places; T is a finite set of transitions, with P T and P T = ; F (P T) (T P) is the set of all directed arcs, W: (P T) (T P) N is the weight function where N = { 0, 1, 2, }, and M 0 : P N is the initial marking. N is said to be ordinary, denoted as (P, T, F), if f F, W(f) = 1. N + (p, t) = W(p, t) is the input function that means the multiplicity of a directed arc from p to t if (p, t) F. N - (p, t) = W(t, p) is the output function that means the multiplicity of a directed arc from t to p if (t, p) F. The set of input (resp., output) transitions of a place p is denoted by p (resp., p ). Similarly, the set of input (resp., output) places of a transition t is denoted by t (resp., t ). A PN structure (P, T, F, W) is denoted by N. A PN with a given initial marking is denoted by (N, M 0 ). A PN is said to be pure if no places is both input and output places of the same transition. The so-called incidence matrix [N] of a pure PN is defined as [N] = [N] - [N] +. A transition t is said to be enabled at marking M, if p t, M(p) W(p, t), or p is marked with at least W(p, t) tokens, as denoted by M [t >. A transition may fire if it is enabled. In an ordinary net, it is enabled iff p t, M(p) 1. Firing t at M gives a new marking M such that p P, M (p) = M(p) W(p, t) + W(t, p). It is denoted as M [t >M. M indicates the number of tokens in each place, which means the current state of the modeled system. When marking M n can be reached from M 0 by firing a sequence of transitions σ, this process is denoted by M [σ > M n and satisfies the state equation M n = M + [N] σ. Here, σ is a vector of non-negative integers, called counting vector, and σ (t) indicates the algebraic sum of all occurrences of t in σ. The set of all reachable markings for a PN given M 0 is denoted by R(N, M 0 ). A transition t is said to be live if for any M R(N, M 0 ), there exists a sequence of transitions whose firing leads to M that enables t. A PN is said to be live if all the transitions are live. Liveness of a PN means that for each marking M R(N, M 0 ) reachable from M 0, it is finally possible to fire t, t T through some firing sequence. (N, M 0 ) is said to be reversible, if for each marking M R(N, M 0 ), M 0 is reachable from M. Thus, in a reversible net it is always possible to go back to initial marking (state) M 0. A marking M is said to be a home state, if for each marking M R(N, M 0 ), M is reachable from M. Reversibility is a special case of the home state property, i.e. if the home state M = M 0, then the net is reversible. A PN contains a deadlock if there is a marking M R(N, M 0 ) at which no transition is enabled. Such a marking is called a dead marking. Deadlock situations are as a result of inappropriate resource allocation policies or exhaustive use of some or all resources. 2.2 The Reduction Approach of Petri Nets [1] Petri nets reduction approach is a well-known technology to derive the properties of a complex PN model, while preserving the concerned properties, such as boundedness, liveness and reversibility. By simplifying the PN structure, it is an efficient analysis way to derive the properties of a complex PN model. In this section, six simple reduction rules which are taken form [1] are considered. They are depicted in Figure 1(a)-(f): (a) Fusion of series places; (b) Fusion of series transitions (c) Fusion of parallel places (d) Fusion of parallel transitions. (e) Elimination of self-loop places (f) Elimination of self-loop transitions. In short, we assume that (N, M 0 ) is an original PN and (N, M 0 ) is the simplified PN. One can infer that (N, M 0 ) is live, safe, and bounded iff (N, M 0 ) is live, safe, and bounded, respectively [1]. (a) (b) (c) (d) (e) (f) Figure 1. The Six kinds of reduction rules in Petri net. 2.3 The Theory of Regions [4] Due to limitation of paper space, the detailed theory of Petri net please refers to [4]. In this subsection, three kinds of equation are shown as follows. Equation (1) is reachability condition equation, equation (2) is cycle equation, and equation (3) is event separation condition equation. Please note that Eq. (3) is formed from MTSI. And, equations (1)-(3) represents all control places (p c ) must satisfy reachability condition of the legal behavior, cycle equations, and the event separation condition of (M, t). The three conditions are listed below. M ( pc ) = M 0( pc ) + [ N]( pc, ) ΓM 0, M M (1) L [ N]( pc, t) γ ( t) = 0, γ C (2) t T M ( p ) + [ N]( p, ) Γ + [ N]( p, t) 1 (3) 0 c c M 2.4 Crucial MTSI () In our previous work [7], we first proposed the concept of. One only identifies s to replace with all MTSIs. And also it can make the dead-prone PN model alive. In [9], two types of s are introduced. The detailed information please refers to [9], this work just 34

shows the main definitions. Definition 1: Type I : Ω = {(M, t) M M L, t T, and M M D, such that M [t > M }. Denote the set of all the dead markings related to Ω as M' D, i.e. M D = {M M D (M, t) Ω such that M [t > M }. Definition 2: Type II : Ω = {(M, t) M M L, t T, M M Q, M M D, and a firing sequence σ = σ * (M ) from M to M such that M [t > M and M [σ > M }. The set of dead markings associated with type II is denoted as M" D, called type II deadlocks. M D = {M M D (M, t) Ω, M M Q and a firing sequence σ from M to M such that M [t >M and σ = σ * (M )}. Remark 1: Type I should be processed first. 2.5 The Relation between Critical Markings and Selective Siphons [5-6] Piroddi et al. [5-6] proposed the selective siphon control approach. The key of the policy is that the relations between uncontrolled siphons and critical markings need to be identified and then a set of siphons are selected by solving a set covering problem at each iteration. Once the selected siphons are controlled, all the paths from legal markings to critical markings are accordingly forbidden. In other words, one selective siphon can control two (or above two) critical markings if those critical markings are in the same minimal siphon. Besides, its most attractive advantage is that it also can hold the maximally permissive markings. In this paper, the selective siphon control approach is merged into our previous policy to further reduce the number of s. In the following, uncontrolled siphons, critical markings, and selected siphons are defined. Definition 3: Uncontrolled siphons and critical markings: Let Π = {S 1,, S n } the set of minimal siphons of PN. i) The set Π u = {S j Π E Sj }, where E Sj = {M R(N,M 0 ) λ T SjM = 0}, is the set of uncontrolled siphons. ii) The set Π M = {S j Π u λ T SjM = 0} denotes the set of empty siphons in the marking M. iii) For any Π Π u, E Π = Sj Π E Sj is the set of markings where at least one siphon in Π is empty. iv) The set E Πu denotes the set of critical markings. v) A covering set of uncontrolled siphons (CSUS) is a subset of siphons Π c Π u, such that E Πc = E Πu. Please note that, the relation between Critical Markings and Selective Siphons will be used in the proposed deadlock prevention policy to check if the belong to the same siphon. Section 3 will show how the method is used in the algorithm of the proposed novel computational improved control policy. 3. One Novel Computationally Improved Control Policy critical (C) once they can be included in same selective siphons. Table 1: The relations between Selective siphons and s MTSI Siphon A B S 1 C D S 2 S 3 C X C Y E For example, based on Table 1, there should be five needed to process. Further, it is obvious that A and B are included in the empty siphon S 1. Similarly, C and D are included in the empty siphon S 2. According to Definition 4, therefore, A and B can be viewed the same set of the C X and C and D can be viewed the same set of the C Y. As a result, there are just three s needed to process after the C tracking algorithm is used. Remark 2: One single which does not be included in any empty Siphon must still be processed. 3.1. New Deadlock Prevention Algorithms Given a deadlock-prone PN model, design steps are listed as shown below. 1. Generate R(N, M 0 ). 2. Reduction technology is used to simplify construct of system. 3. Determine the total number of dead markings. 4. Identify all dead, quasi-dead, and legal markings. 5. Find Ω'. If all dead markings belong to Ω' go to 6. 6. Find Ω. 7. Determine and identify uncontrolled siphons. 8. Locate selective siphons. 9. IF all dead/quasi-dead markings of s (Ω Ω ) are covered by one same empty siphons. THEN One can choose anyone that belongs to a same selective siphon to be processed. ELSE Others s that are not covered by the selective siphons must to be considered. 10. Generate the event separation condition equations of all s. 11. List the sets of the oriented cycles of the reachability graph. 12. Generate all legal reachability condition equations of the reachability graph except quasidead markings and dead markings. Definition 4: Two s (or above two) belong to 35

13. Obtain solutions and choose optimal control places by using Steps 10-13. 14. Identify and remove those redundant control places to obtain the live controlled net. 4. Example One typical model shown in Figure 2 [10] is employed as an example. In this example, 16 dead markings, 61 quasidead markings, and 205 legal markings are in its reachability graph. In other words, the number of maximally permissive markings is 205. Please not that, therefore, there should be 205 LPP needed to consider since 205 legal markings will be formed 205 reachability condition equations. To do so, first of all, the reduction approach is used. After the reduction rules, p 7 and p 13 are deleted, and t 7 and t 13 are connected with t 8 and t 14, respectively based on fusion of series transitions. Therefore, one can then obtain a reduced S 3 PR [13] model shown in Figure 3. t 14 t 1 M 137, M 152, M 153, M 154, M 156, M 163, M 170, M 171, M 172, M 174, and M 176 ) can then be located by using software INA [11]. Additionally, quasi-dead markings M 26, M 35, M 42, M 52, M 59, M 68, M 72, M 75, M 79, M 85, M 89, M 96, M 99, M 100, M 106, M 107, M 111, M 116, M 118, M 119, M 120, M 124, M 126, M 127, M 136, M 138, M 141, M 142, M 143, M 146, M 150, M 151, M 155, M 159, M 162, M 164, M 166, M 168, M 169, M 173, and M 175 are found. Hence, the number of legal markings (i.e. 176 (16 + 41) = 119) can then be determined. In other words, the number of optimal (maximally permissive) legal markings is 119. Besides, 7 sets of type I s (i.e. {M 67, t 1 }, {M 105, t 9 }, {M 115, t 1 }, {M 139, t 9 }, {M 140, t 9 }, {M 165, t 1 }, and {M 165, t 4 }) are identified. Further, 11 sets of type II s (i.e. {M 34, t 11 }, {M 77, t 11 }, {M 123, t 9 }, {M 115, t 11 }, {M 123, t 11 }, {M 165, t 11 }, {M 64, t 11 }, {M 123, t 1 }, {M 84, t 9 }, {M 84, t 11 }, and {M 148, t 11 }) are also identified. Table 2: The relation between and empty siphons No. Type I or II Siphon No. {M 67, t 1 } Type I S 2 {M 105, t 9 } Type I S 3 p 13 p 2 {M 115, t 1 } Type I S 2 p 8 t 13 p 15 p 12 t 12 6 6 p 11 p 18 t 11 p 10 p 17 t 2 t 3 p 3 p 4 t 5 t 4 p 5 t 6 p 6 p 16 p 14 p 1 {M 139, t 9 } Type I S 3 {M 140, t 9 } Type I S 3 {M 165, t 1 } Type I S 2 {M 165, t 4 } Type I S 3 {M 34, t 11 } Type II S 1 {M 77, t 11 } Type II S 1 {M 123, t 9 } Type II None t 10 t 7 {M 115, t 11 } Type II S 1 p 9 p 19 p 7 {M 123, t 11 } Type II S 1 p 8 t 9 Figure 2. One typical PN model. t 13 p 15 p 12 t 12 p 11 p 18 6 t 11 p 1 6 t 5 t 4 t 8 t 1 p 2 t 2 t 3 p 3 p 4 p 10 p 17 p 5 t 10 t 6 p 9 p 19 p 6 p 16 p 14 {M 165, t 11 } Type II S 1 {M 64, t 11 } Type II S 1 {M 123, t 1 } Type II S 2 {M 84, t 9 } Type II None {M 84, t 11 } Type II S 1 {M 148, t 11 } Type II S 1 Table 3: Six control places in this example. Control Place (C Pi ) M 0 (C pi ) (C pi ) (C pi ) Cp 1 1 t 5, t 13 t 2, t 11 Cp 2 2 t 6, t 13 t 1, t 11 Cp 3 3 t 6, t 11 t 2, t 4, t 9 Cp 4 3 t 5, t 7, t 11 t 2, t 6, t 9 t 9 Figure 3. The reduced model of this example. In the following, 176 reachable markings (M 1 to M 176 ) can be identified in its reachability graph for this example. The 16 dead markings (i.e. M 80, M 93, M 125, M 130, M 134, t 7 Cp 5 3 t 7, t 11 t 4, t 5, t 9 Cp 6 4 t 7, t 11 t 1, t 9 36

And then, three selective siphons (i.e. {p 2, p 5, p 15, p 18 }, {p 2, p 11, p 16, p 17, p 18, p 19 }, and {p 5, p 14, p 15, p 18 }) can be obtained according to definition 3. In this paper, the first siphon {p 2, p 5, p 15, p 18 } is named S 1, the second siphon {p 5, p 14, p 15, p 18 } is named S 2, and the final siphon {p 2, p 11, p 16, p 17, p 18, p 19 } is named S 3. It is obvious, therefore, that {M 34, t 11 }, {M 77, t 11 }, {M 115, t 11 }, {M 165, t 11 }, {M 64, t 11 }, {M 84, t 11 }, and {M 148, t 11 } are included in S 1, {M 115, t 1 }, {M 165, t 1 }, and {M 123, t 1 } are included in S 2, and {M 105, t 9 }, {M 139, t 9 }, {M 140, t 9 }, and {M 165, t 4 } are included in S 3 based on Table 2. Similarly, based on Table 2, one can also find that {M 123, t 9 } and {M 84, t 9 } are not included in any empty siphon. Therefore, {M 123, t 9 } and {M 84, t 9 } are still necessary considered. In other words, there are three sets of Cs and two sets of s needed to be calculated. Finally, one can obtain six control places (shown in Table 3 ) and the system is live after the six control places are added in the reduced system. The original system is live too since the reduced system is live based on the reduction technology [1]. 5. Comparison with Previous Policies There are total six deadlock prevention policies present in table 4. All of them are optimal based on theory of regions. Obviously, based on the table 4, this work presents a computationally improved optimal control algorithm among existing literatures since just 5 sets of MTSI and 119 LPP are needed to solve. Table 4: Comparison of the controlled Example IV Control Criteria No. of Monitors Reachable Markings Maximally Permissive? No. of MTSI No. of LPP [3] 8 205 Yes 59 205 [4] 8 205 Yes 59 205 [9] 6 205 Yes 18 205 [8] 6 205 Yes 18 119 [12] 6 205 Yes 5 205 [This Work] 6 205 Yes 5 119 6. Conclusion The proposed policy can be implemented for FMSs based on Petri nets, the theory of regions and selective siphon methods, where the dead markings are identified in its reachability graph. For reducing computation cost, a new definition of the MTSIs proposed here, called crucial marking/transition-separation instances () which is the foundation of MTSIs. The proposed policy can reduce the amount of inequality and the computation cost due to the involvement of a few MTSIs. Consequently, several deadlock systems can be controlled successfully. Moreover, a maximally permissive controller with efficient computation can still be implemented based on the experimental data. Acknowledgements This work was partially supported by the National Science Council of Taiwan, R.O.C. under Grant NSC NSC 101-2221-E-013-001. Besides, the authors also thank Chun-Hao Wang, Ben-Yu Liao, Fang-Yi Lin, and Yuan-Hsiu Chang for their help in identifying all Cs. References [1] Murata, T., Petri Nets: Properties, Analysis, and Applications, Proc. IEEE, 77(4), 1989, 541-580. [2] Badouel E. and Darondeau P, Theory of Regions (Third Advance Course on Petri Nets. Springer-Verlag, Heidelberg, 1998). [3] Uzam, M., An Optimal Deadlock Prevention Policy for Flexible Manufacturing Systems Using Petri Net Models with Resources and the Theory of Regions, Int. J. Adv. Manuf. Tech., 19, 2002, 192-208. [4] Ghaffari A., Rezg N., and Xie X. L., Design of a live and maximally permissive Petri net controller using the theory of regions, IEEE Trans. Robot. Autom., 19(1), 2003, 137-142. [5] Piroddi, L., Cordone, R., and Fumagalli, I., Selective Siphon Control for Deadlock Prevention in Petri Nets, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, 38(6), 2008, 1337-1348. [6] Piroddi, L., Cordone, R., and Fumagalli, I., Combined Siphon and Marking Generation for Deadlock Prevention in Petri Nets, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, 39, (3), 2009, 650-661. 37

[7] Huang Y. S., and Pan Y. L., Enhancement of an efficient liveness-enforcing supervisor for flexible manufacture systems, Int. J. Adv. Manuf. Tech., 48, 2010, 725-737. [8] Huang Y. S., and Pan Y. L., An Improved Maximally Permissive Deadlock Prevention Policy Based on the Theory of Regions and Reduction Approach, IET Control Theory and Applications, 5(9), 2011, 1069-1078. [9] Huang Y. S., Pan Y. L., and Zhou M.C. Computationally Improved Optimal Deadlock Control Policy for Flexible Manufacturing Systems, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, 42(2), 2012, 404-415. [10] Abdallah IB and ElMaraghy HA, Deadlock prevention and avoidance in FMS: a petri net based approach, Int. J. Adv. Manuf. Tech., 14, 1998, 704-715. [11] INA. (Integrated Net Analyzer), A Software Tool for Analysis of Petri Nets. Version 2.2, 31.07. 2003. [Online]. Available: http://www. informatik.huberlin.de/~starke/ina.html. [12] Pan Y. L., Huang Y. S., Jeng M. D., and Chung S. L., Enhancement of an Efficient Control Policy for FMSs Using the Theory of Regions and Selective Siphons Method, Int. J. Adv. Manuf. Technol., 2013, In press. (DOI: 10.1007/s00170-012-4460-1) [13] Ezpeleta, J., Colom, J. M., and Martinez, J., A Petri net based deadlock prevention policy for flexible manufacturing systems, IEEE Trans. Robot. Autom., 1, 1995, 173-184. [14]Huang, Y., S, Jeng, M., D., Xie, X., L., and Chung, S., L., A deadlock prevention policy based on Petri nets and siphons, Int. J. Prod. Res., 39, 2001, 283-305. [15] Huang, Y., S., Jeng, M., D., Xie, X., L., and Chung, T., H., Siphon-based deadlock prevention policy for flexible manufacturing systems, IEEE Trans. Syst. Man Cybern. Part A Syst. Humams, 36(6), 2006, 2152-2160. [16] Huang, Y., S., Deadlock prevention for flexible manufacturing systems in sequence allocation systems, J. Inf. Sci. Eng., 23(1), 2007, 215-231. [17] Huang, Y., S., Design of deadlock prevention supervisors for FMS using Petri nets, Int. J. Adv. Manuf. Technol., 35(3-4), 207, 349-362. [18] Li, Z., W., Hu, H., S., and Wang, A., R., Design of liveness-enforcing supervisors for flexible manufacturing systems using Petri nets, IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., 37(4), 2007, 517-526. [19] Li, Z., W., and Zhou, M., C., and Uzam, M., Deadlock control policy for a class of Petri nets without complete siphon enumeration, IET Control Theory and Applications, 1(6), 2007, 1594-1605. [20] Li, Z., W., and Shpitalni, M., Smart deadlock prevention policy for flexible manufacturing systems using Petri nets, IET Control Theory and Applications, 3(3), 2009, 362-374. [21] Chao, Y., and Li, Z., W., Structural conditions of systems of simple sequential processes with resources nets without weakly dependent siphons, IET Control Theory and Applications, 3(4), 2009, 391-403. [22] Liu, G., Y., Li, Z., W., and Zhong, C., F., New controllability condition for siphons in a class of generalized Petri nets, IET Control Theory and Applications, 4(5), 2010, 854-864. [23] Hu, H., Zhou, M., and Li, Z., Supervisor design to enforce production ratio and absence of deadlock in automated manufacturing systems, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, 41(2), 2011, 201-212. [24] Hu, H., Zhou, M., and Li, Z., Liveness and ratioenforcing supervision of automated manufacturing systems using Petri nets, IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, 42(2), 2012, 392-403. [25] Hu, H., Zhou, M., and Li, Z., Supervisor optimization for deadlock resolution in automated manufacturing systems with Petri nets, IEEE Trans. Autom. Sci. Eng., 8(4), 2011, 794-804. 38