Next Article in Journal
Are We Right about the Right TPJ? A Review of Brain Stimulation and Social Cognition in the Right Temporal Parietal Junction
Next Article in Special Issue
All Graphs with a Failed Zero Forcing Number of Two
Previous Article in Journal
Stability Analysis of a Diffusive Three-Species Ecological System with Time Delays
Previous Article in Special Issue
On the Johnson–Tzitzeica Theorem, Graph Theory, and Yang–Baxter Equations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Online Activation and Deactivation of a Petri Net Supervisor

Laboratoire de Génie Informatique, de Production et de Maintenance, UFR MIM, Université de Lorraine, 57000 Metz, France
*
Author to whom correspondence should be addressed.
Submission received: 21 October 2021 / Revised: 8 November 2021 / Accepted: 11 November 2021 / Published: 20 November 2021
(This article belongs to the Special Issue Graph Algorithms and Graph Theory)

Abstract

:
This paper highlights algebraic and mathematical properties in symmetry with Petri nets in order to control automated systems such as flexible workshops, which represent one of the most important examples in industry and for discrete event systems in general. This project deals with the problem of forbidden state transition by using a new application of the theory of regions for supervisory control. In the literature, most control synthesis methods suffer greatly from a cumbersome calculation burden of the Petri net supervisor given the complex exploration of the state graph. Our new methodology lightens the computational load of the Petri net supervisor by choosing specific regions on the reachability graph, on which the control is calculated offline using CPLEX. The determined controller is activated online if the process enters the chosen region, and deactivated otherwise. All our experiments were applied in a flexible workshop implemented in our research laboratory, which was used to engrave selected models on glass blocks of different colors.

1. Introduction

Unlike continuous systems, discrete event systems (DESs) represent dynamic systems in which the reachability graph is discrete. The time use of these kinds of systems does not interest us, because only the occurrence of events matters in our case studies. The appearance of a single event causes the generation of a new state.
If there is no occurrence of an event, the system remains unchanged (i.e., there is no state change). An event can correspond to the transmission of a message in a communication network, to the occurrence of a disturbance in a transport network, or to the arrival of a part in a production cell.
Comparing them to automata, PNs [1,2,3] have the advantage of being much more general models, benefiting from much richer structures. Thus, PNs fit perfectly into the description of certain types of DESs. An automaton is nothing other than a marking graph generated from a Petri net.
The use of symmetry concepts between known mathematical properties and Petri nets constitutes a strong point to respond to key issues in the field of control synthesis.
Nowadays, the use of Petri nets is almost always necessary when it comes to complex systems requiring a high level of precision and safety, such as in the case of the petroleum industry or nuclear power plants. Thus, the use of our methodology in symmetry with the notions of mathematics applied to concrete examples will make it possible to ensure these kinds of systems perform a desired behavior that satisfies specific industrial constraints.
The methodology presented in this work is based on the theory of regions [4,5] in control synthesis presented by Ghaffari et al. [6,7,8,9]. This theory can be presented and summarized by a linear system to solve, and then one can calculate the Petri net supervisor offline.
The calculation of this PN controller is useful for preventing the production system from blocking, as well as preventing dangerous markings and forbidden states prohibited by the control specifications. Moreover, the combinatorial explosion of states on the generated reachability graph increases the computational task of the PN monitor. In this paper, the theory of regions is not applied on the whole state space, but in a specific region of the reachability graph. Therefore, the PN supervisor is activated/deactivated online if the process enters or exits in/from the chosen region (specific zone (SZ)). All our experiments were applied in a flexible manufacturing system already installed in our research laboratory.
Several research projects have been established in the field of control synthesis to reduce the computational load of the Petri net supervisor. Among these works, one can cite the work of Bashir et al. and Der Jeng [10,11]; this study proposed a new approach to calculating a supervisory structure using combined control places and control transitions to ensure flexible manufacturing systems’ smooth operation. A place-transition monitor was designed for each concurrent process of the systems. Thus, three algorithms were proposed. The first one computes the loop markings at each process of the PN model. Then, algorithm II is used to sort the deadlock markings based on the concurrent processes of the PN model. The transition-place controller and place-transition supervisor are designed using algorithm III.
In the literature, several other studies focused on reachability graph analysis to determine a near-optimal Petri net controller [12,13,14,15,16]. Their approaches are all based on the exploration of the whole graph, or on dividing the graph into a deadlock zone and a live zone. Additionally, Chen et al. [17] studied a vector covering method to reduce the number of markings/states to study. All these approaches can decrease the number of Petri net controllers. Nonetheless, they have a major drawback: the calculation burden is extremely difficult, especially for big models.
In our previous studies, we addressed the design of a PN controller for forbidden transitions/states presented as general mutual exclusion constraints (GMECs). Therefore, as with any supervisory control method based on the whole reachability graph, the use of the graph is a fundamental step in the theory of regions. In addition, like any method based on the reachability graph, which may contain many markings, with respect to the structural size of the system, the design of the Petri net controller becomes harder and even impossible. The main contribution of those studies is the development of a control synthesis without using the state space. Therefore, based on mathematical concepts and Petri net properties, the proposed approach provides a maximally permissive Petri net controller for bounded Petri nets following the theory of regions interpretation. However, these methods are not canonical for some models, and assumptions have been considered to maintain the efficiency of the methodology.
The remainder of this work is presented as follows: Tools used in this work, such as the theory of regions or Petri nets [18], are discussed in Section 2. Our methodology is explained in Section 3. The experiments in Section 4 were applied in a flexible manufacturing system to illustrate the effectiveness of our method. Finally, comparison results with examples taken from [9,19] are described in Section 5, with our conclusion and perspectives drawn in Section 6.

2. Tools and Methods

The Petri net supervisor in our methodology can be defined by a set of control places P c . The control place P c can be calculated by solving the linear system of the theory of regions [18,19,20,21,22]. This linear system is composed of three types of conditions. The reachability conditions can be expressed by the following equation:
M 0 P c + C P c , . Γ M 0
where Γ M is the path between M 0 and M .
The second type of conditions in the linear system of the theory of regions is represented by the cycle equation as follows:
t T C P c , t · σ t = 0 ,   σ Δ
where σ t represents the algebraic sum of occurrences of t in σ , and Δ represents the set of existing cycles on the graph.
Finally, the control place P c has to satisfy the marking/transition separation instance (MTSI) equation:
M 0 P c + C P c , . Γ M + C P c , t < 0
Each MTSI condition is relative to one forbidden event (M,t); the marking M is a reachable marking and t is a prohibited transition. Remarkably, the MTSI conditions can have the same solutions by solving Equations (1)–(3). Consequently, the control places are smaller than the set of MTSI equations.
By resolving this linear system, one can calculate the Petri net supervisor composed of a set of control places P c characterized by its initial marking M 0 P c and its incidence vectors C P c ,   . .
So, as stated at the beginning, Petri nets are the manufacturing systems on which the work is modeled. A PN is a mathematical modeling tool for discrete event systems and many other systems. From an informal point of view, this modeling is represented by two types of nodes: the transitions T and the places P. These places and transitions are related by oriented arcs. A place can never be connected to another place; a transition cannot be connected to another transition. Moreover, from a formal point of view, a PN is a bipartite graph: PN = <P, T, Pre, Post>, where T is a set of controllable and uncontrollable transitions [23]. P r e : P × T represents a pre-incidence function that specifies weighted arcs from P to T . P o s t : P × T is a post-incidence function that specifies weighted arcs from T to P (ℕ is a set of nonnegative integers). Let the sets p t and p t be the output transitions and the input transitions, respectively, of a place p . A Petri net can be expressed by an indexed matrix C such that C p i , t j = w t j , p i if t j p t i and C p i , t j = w p i , t j if t j p i t , else 0, where w : F is a valuation function of arcs (the finite set of arcs F P × T T × P . Moreover, let t p and t p be the sets of output places and input places, respectively, of a transition t . The graph constructed from the initial marking M 0 is denoted by G N , M 0 . The set of generated markings in RG is denoted by M . A transition is enabled from a marking M M (denoted by M [ t > ) if and only if M P r e . , t . If loops are not considered, an enabled transition may fire-yield a new marking M such that M = M + C . , t . This expression can be defined by M [ t > M . A new marking M is reachable from a marking M if a firing sequence σ = t 1 ,   t 2 , , , t n exists by firing σ , and any marking M attainable from the initial marking M 0 satisfies the following PN state equation: M = M 0 + C . σ , where σ : T is a vector of non-negative integers called the occurrence of t i in σ .
The tools are presented in Section 2 by giving an example of the application of the theory of regions with a Petri net (i.e., see Figure 1 and Figure 2). One can calculate the PN supervisor with the classical method of the theory of regions.
The application of the classic theory of regions in supervisory control can give us the following linear system (Equations (1)–(3)):
M 0 P c 0
M 1 P c = M 0 P c + C P c , T 1 0
M 2 P c = M 0 P c + C P c , T 1 + C P c , T 2 0
M 3 P c = M 0 P c + C P c , T 1 + C P c , T 2 + C P c , T 3 0
M 4 P c = M 0 P c + 2 C P c , T 1 + 2 C P c , T 2 + C P c , T 3 0
M 5 P c = M 0 P c + 2 C P c , T 1 + 2 C P c , T 2 0
M 6 P c = M 0 P c + 2 C P c , T 1 + C P c , T 2 0
State number 7 is a blocking state [21] and will lead to a deadlock. So, it is considered a forbidden state. The MTSI is M 5 T 1 M 7 :
C P c , T 1 + C P c , T 2 + C P c , T 3 + C P c , T 4 = 0
M 7 P c = M 0 P c + 2 C P c , T 1 + 2 C P c , T 2 + C P c , T 1 < 0
All these equations constitute the linear system of the theory of regions to solve in order to calculate the control place P c , characterized by its initial marking and incidence vector. Consequently, the linear system is composed of nine conditions, and its resolution allows one to determine this Petri net controller: M 0 P c = 2 ; C P c , . = 1 ,   0 ,   0 ,   1 .
Therefore, the Petri net controller is given in the following Figure 3.
In order to better understand our methodology and our control algorithm, some concepts are defined as follows:
Definition 1.
A forbidden state ( M M I ) is a state that does not respect a control specification modeled by the following: GMEC w , K : M I = M M |   w t . M K , where w is a weight vector of non-negative integers and K is a positive integer.
Definition 2.
Ω is the set of event separation instances that the PN supervisor must prohibit: Ω = M , t / M [ t > M ,   M G N , M 0 ^ M M I
Definition 3.
A blocking state ( M M B ) is a marking from which there is no transition validated by it, i.e., there is no path that can return us to the initial state M 0
Definition 4.
A state ( M M S ) is said to be a source state if the process can enter from this marking to the specific zone on which the theory of regions is applied:
M S = M G N , M 0 |   M [ t > M ,   M Ω ^ M M I M B
Definition 5.
A frontier state ( M M F ) is a marking from which one can activate and deactivate the Petri net supervisor.

3. Methodology and Algorithm

This section focuses on the reduction in the computational burden on the Petri net supervisor by using a different application of the theory of regions on the reachability graph. Equations (1)–(3) are employed on specific regions and not on the whole graph. Therefore, the computation time decreases significantly.
Definition 6.
A specific zone, S Z i , is a region on the reachability graph G N , M 0 with a certain number of states and correlated MTSIs. Each specific zone S Z i corresponds to a control place P c i
Definition 7.
Two MTSIs, Ω 1 and Ω 2 , are correlated if the corresponding forbidden transitions are the same.
Proposition 1.
The application of the theory of regions in our methodology begin from the initial source state M S 0 i S Z i . This initial source state is determined by firing the smallest transition sequence σ [24].
Proof. 
Let v and v be the respected transition vectors of M and M , respectively, such as M ,   M G N , M 0 ; and let C be the incidence matrix of a given Petri net. σ and σ are the associated transition firing vectors of M and M , respectively, such that M = M 0 + C . σ and M =   M 0 + C . σ . From [24], if σ , there exists a transition firing sequence: σ = σ σ |   M [ σ > M then v is smaller than v . □

3.1. Control Policy Algorithm

The supervisory control policy using the new interpretation of the theory of regions is summarized in the flowchart below (see Figure 4). The main idea of the proposed method is to calculate the set of control places (i.e., i P c i ) that connect the initial state M S 0 to the other markings (i.e., M I ,   M F , and M B ). Then, one can resolve the linear system of the theory of regions to synthesize the PN controllers offline using CPLEX.
After having determined the reachability graph, the monitor imposes a GMEC control constraint on the production system. In order to act as quickly as possible and to respond effectively to industrial constraints, the algorithm presented in Figure 4 first identifies the blocking and prohibited states that do not respect the GMEC. This identification allows us to determine the set of forbidden transitions Tf. If the uncontrollable transitions exist, other dangerous states MD are to be identified as well. Based on the set of all prohibited transitions, specific zones (SZs) will be grouped according to the correlation criterion of MTSI.
Once the area is detected, the theory of regions is applied over the entire zone SZi to synthesize the corresponding controller.
This PN controller is activated if the process enters SZi and is deactivated if the process is no longer there. Finally, all the control places constitute our PN supervisor.

3.2. Boolean Control Function Using the Activation/Deactivation Vector

After calculating the Petri net supervisors Pci for each SZi, one can calculate the Boolean control function FBc that can deactivate and activate the PN controllers. Consequently, the role of each monitor is to control its zone (SZi) on the graph.
The online function can allow the switch/alternation between the PN supervisors on the reachability graph by activating or deactivating each Petri net controller Pci.
So, after identifying the set of specific zones (SZs) of the reachability graph, one can proceed to the activation/deactivation step. Once a marking Mi enters or exits a SZi, each controller (Pci) must control its SZi. Initially, the controller is inactive until a marking enters a SZi using the deactivation/activation vector.
Definition 8.
For each state M in the graph, an activation vector is calculated. The activation/deactivation vector is a path between the initial state of the graph M0 and M.
The activation vector  σ A = σ T * / M 0 [ σ > M ,   M S Z i .
The deactivation vector  σ D = σ T * / M 0 [ σ > M ) ^ M [ t > ,   M S Z i ,   t S Z i .
The PN supervisors can control the system either alternately or simultaneously depending on the process state. Consequently, the necessary PN supervisor is activated or deactivated.
F B c = F ( P c 1 , P c 2 , P c n )
= F B c = P c 1 + P c 2 + + P c n
= > F B c = P c n
An OR function (logical function) characterizes the union of the PN supervisors and takes the following values:
F B c = 1 :     If   the   system   is   controlled   0 :   Otherwise

4. PN Example

A flexible manufacturing system implemented in our laboratory (LGIPM) in France is presented in Figure 5. This production cell produces engraved glass cubes in different colors with digital models that can be chosen. Each engraved piece is stored, assembled with a base, and then packaged as a finished product.
In our study, only two assembly stations (station no. 3 + station no. 4) of the FMS could be considered. The modeling of this physical system is given in the following Figure 6. The first assembly station is modeled by P2, while the second station is represented by P3.
In a particular context of changing the work rate, P2 models our self-production station, while P3 represents a subcontractor. The capacity of each station is three pieces (three tokens in P4 and P5 each). P1 is the first station of our FMS and models stock production.
The two transitions (t1 and t2) represent the events of pallet input to the assembly stations, while t4 and t5 model the output events through their annex conveyors. Otherwise, the product or the pallet can continue its way to the main conveyor by t3.
In an optimization context, our station 2 can at most work twice the rate compared to the subcontractor (station 3). This constraint can be expressed using the GMEC [23]:
M ( P 2 ) + 2 M ( P 3 ) 3
By using CPN Tools software, one can generate the state space. This reachability graph contains 13 markings (i.e., Figure 7).
The application of our algorithm can allow us to determine the specific zones (SZs) with a minimal number of markings. In each SZi, the theory of regions is applied to calculate the corresponding Pci offline.
However, the activation and deactivation of PN supervisors via the Boolean function FBc is performed online.
In our example, and according to Definition 2, the set of event separation instances contains five MTSIs correlated by t2 and t1:
Ω 1 = ( M 2 t 2 > M 4 ;   ( M 6 t 2 > M 9 ; ( M 5 t 2 > M 8 ;   ( M 10 t 2 > M 13
Ω 2 = ( M 5 t 1 > M 9
Then, by applying the first six steps of our algorithm, one can identify the following specific zones:
S Z 1 = ( M 2 t 2 > ;   ( M 2 t 1 > ;   ( M 3 t 1 > ; ( M 5 t 5 > ; ( M 6 t 2 > ; ( M 5 t 2 > ;   ( M 10 t 2 >
S Z 2 ( M 5 t 1 >
Therefore, the detailed information of SZ markings is listed in Table 1.
Owing to space limitations, not all equations can be listed. Only equations of the algorithm application are considered:
M 01 = M 2   and   M 02 = M 5   The   initial   states   of   S Z 1   and   S Z 2
By applying the algorithm of our methodology, one can obtain two Petri net supervisors: Pc1 and Pc2 when Equations (1)–(3) for each SZi are solved.
P c 1 :   M 2 P c 1 = M 01 = 1 ;   C ( P c 1 , . ) = 1 , 2 , 0 , 1 , 2
P c 2 :   M 5 P c 2 = M 02 = 1 ;   C ( P c 2 , . ) = 2 , 0 , 0 , 0 , 0
The   frontier   states :   M F 1 = ( M 2 ,   M 3 ) ;   M F 2 = ( M 5 )
One can deduce that it is only in the marking M5 that the PN controllers are involved simultaneously. Otherwise, the PN supervisors act alternatively:
  F B c = P c 1 + P c 2
To switch between Pc1 and Pc2, detailed information about deactivation and activation is presented in Table 2.

5. PN Comparisons

In this part, a comparison of our new control synthesis method with the work of Ghaffari et al. [7] and the work of Huang et al. [19] is given using three examples taken from the literature.
For convenience, abbreviations are used to name the three approaches. Our new approach is called RS1. The method of Ghaffari et al. is called Gh2, and the method of Huang et al. is noted as Hu3.
All Petri net supervisors presented in these examples were calculated using CPLEX.

5.1. Comparison with FMS Example

Table 3 presents the experimental results of calculating the Petri net supervisors in comparison with the work of Gh2. By observing the results obtained in Table 3, one can infer that for the same number of legal markings and MTSIs, one can determine the same number of PN controllers with the reduced number of equations (N) of the theory of regions. In Gh2, 40 equations were solved to calculate two control places in 693 ms. The reduction technology was involved in RS1 by decreasing the calculation time and the number of equations (N) to solve. The computation time was divided by at least two (319 ms). The obtained controlled system is presented by Table 4.

5.2. Comparison with Hu3 Example

The second example is taken from the work of Huang et al. [19]. It deals with the deadlock prevention policy. Table 5 presents the experimental results of calculating the Petri net supervisors in comparison with the work of Hu3. By obtaining the results presented in Table 5, one can deduce that four event separation instances and 46 equations are needed if Hu3 is used. Our method RS1 requires 10 event separation instances and 22 equations to solve. The Hu3 method needs three control places and three PN controllers if the RS1 approach is used.
The main advantage of the RS1 method is the gain of calculation time, which was reduced from 589 to 334 ms. Then, for the same number of control places and legal markings, 22 equations (N) needed to be solved with our method, as opposed to 46 equations for the Hu3 approach. The controlled system of this example is given in Table 6.

6. Discussion

Table 1, Table 2 and Table 3 show the comparisons of our methodology with previous work according to criteria related to the calculation burden of Petri net controllers.
In the first example, one can compare our new supervisory control approach with the classical method of the theory of regions developed by Ghaffari et al. [7] using example 1 of flexible manufacturing systems. The RS1 method is confronted with a deadlock prevention approach determined by Huang et al. in example 2 taken from [19], which has many advantages and resolves problems of forbidden state transitions. The experiment results of the Hu3 approach imply that its control policy is more powerful than existing deadlock prevention policies such as those presented in the works of Li et al. [24], Park et al. [25], and Uzam et al. [18].
Based on comparisons, one in all cited examples, the computational load of the PN supervisors was almost divided by two. The computation time using CPLEX for all the methods was reduced by applying our control approach.
Moreover, the number of equations to solve was reduced using our methodology. As a result, our new approach translated by RS1 can drastically decrease the challenges encountered in supervisory control by using a new interpretation of the theory of regions.

7. Conclusions and Perspectives

Finally, the specific use of symmetry concepts, between mathematics and Petri nets in supervisory control, was a major asset to us in mapping the mathematical core of such a practical problem. This finally allowed us to solve our problem and control our FMS, as stated from the start of the project.
The proposed control method based on the SZ method using the theory of regions was tested in a flexible manufacturing system implemented in our laboratory. Due to our previous research, the calculated Petri net controllers can be implemented on programmable logic controllers such as Siemens and Schneider. The results obtained either by programming or by experiments comparisons with the methods (Hu3 and Gh2) clearly show that our method is very efficient.
For the same number of Petri net controllers, one can calculate the PN monitors using few equations and short calculation times. The application of the theory of regions is restricted to specific zones of the graph and not on all states.
For this reason, our supervisors were first calculated offline, then activated and deactivated according to the situation or the state in which the system was located via the defined Boolean function. This step was then performed online.
Based on experiment results, it is obvious to remark on the considerable reduction in the computational cost of the supervisory control using our new approach to synthesize a maximally permissive Petri net controller.
In the near future, we are interested in developing other methods to solve problems that involve a combinatorial explosion of states by generating a reachability graph of a Petri net, which is an important issue in the supervisory control domain.

Author Contributions

In this work, the authors are specialists in the industrial engineering field and, more precisely, in model-based systems engineering and the supervision of DES. Conceptualization, S.R.; methodology, S.R.; software, S.R.; validation, N.R.; formal analysis, S.R; investigation, S.R.; resources, N.R.; data curation, Z.H.; writing—original draft preparation, S.R.; writing—review and editing, S.R.; visualization, Z.H.; supervision, N.R.; project administration, N.R.; funding acquisition, N.R. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Acknowledgments

We used our equipment in the laboratory with all the appropriate accessories and software, such as Siemens STEP7 and SCHNEIDER Control Expert control software; the simulation and modeling software CPN Tools; and supervision software such as WINCC FLEXIBLE.

Conflicts of Interest

The authors Sadok Rezig, Nidhal Rezg, and Zied Hajej declare no conflict of interest.

References

  1. Murata, T.; Subrahmanian, V.; Wakayama, T. A Petri net model for reasoning in the presence of inconsistency. IEEE Trans. Knowl. Data Eng. 1991, 3, 281–292. [Google Scholar] [CrossRef]
  2. Murata, T. Petri nets: Properties, analysis and applications. Proc. IEEE 1989, 77, 541–580. [Google Scholar] [CrossRef]
  3. Chen, T.; Sanchez-Aarnoutse, J.C.; Buford, J. Petri Net Modeling of Cyber-Physical Attacks on Smart Grid. IEEE Trans. Smart Grid 2011, 2, 741–749. [Google Scholar] [CrossRef] [Green Version]
  4. Ramadge, P.J.; Wonham, W.M. The control of discrete event systems. Proc. IEEE 1989, 77, 81–98. [Google Scholar] [CrossRef]
  5. Wonham, W.M.; Ramadge, P.J. On the Supremal Controllable Sublanguage of a Given Language. SIAM J. Control. Optim. 1987, 25, 637–659. [Google Scholar] [CrossRef]
  6. Ghaffari, A.; Rezg, N.; Xie, X. Design of a live and maximally permissive petri net controller using the theory of regions. IEEE Trans. Robot. Autom. 2003, 19, 137–141. [Google Scholar] [CrossRef]
  7. Ghaffari, A.; Rezg, N.; Xie, X. Feedback control logic for forbidden-state problems of marked graphs: Application to a real manufacturing system. IEEE Trans. Autom. Control 2003, 48, 18–29. [Google Scholar] [CrossRef]
  8. Ghaffari, A.; Rezg, N.; Xie, X. Live and Maximally Permissive Controller Synthesis Using Theory of Regions. In Synthesis and Control of Discrete Event Systems; Springer: Singapore, 2002; pp. 155–166. [Google Scholar]
  9. Ghaffari, A.; Rezg, N.; Xie, X. Algebraic and geometric characterization of Petri net controllers using the theory of regions. In Proceedings of the Sixth International Workshop on Discrete Event Systems, Zaragoza, Spain, 4 October 2002; pp. 219–224. [Google Scholar]
  10. Bashir, M.; Zhou, J.; Muhammad, B.B. Optimal Supervisory Control for Flexible Manufacturing Systems Model with Petri Nets: A Place-Transition Control. IEEE Access 2021, 9, 58566–58578. [Google Scholar] [CrossRef]
  11. Der Jeng, M. A Petri net synthesis theory for modeling flexible manufacturing systems. IEEE Trans. Syst. Man Cybern. Part B 1997, 27, 169–183. [Google Scholar] [CrossRef] [PubMed]
  12. Xing, K.-Y.; Hu, B.-S.; Chen, H.-X. Deadlock avoidance policy for Petri-net modeling of flexible manufacturing systems with shared resources. IEEE Trans. Autom. Control 1996, 41, 289–295. [Google Scholar] [CrossRef]
  13. Ji, Y.; Yin, X.; Lafortune, S. Optimal supervisory control with mean payoff objectives and under partial observation. Automatica 2021, 123, 109359. [Google Scholar] [CrossRef]
  14. Uzam, M.; Wonham, W. A hybrid approach to supervisory control of discrete event systems coupling RW supervisors to Petri nets. Int. J. Adv. Manuf. Technol. 2006, 28, 747–760. [Google Scholar] [CrossRef]
  15. Zhao, M.; Uzam, M.; Hou, Y. Near-optimal supervisory control of flexible manufacturing systems using divide-and-conquer iterative method. Adv. Mech. Eng. 2016, 8, 1687814016639823. [Google Scholar] [CrossRef] [Green Version]
  16. Abubakar, U.S.; Liu, G.; Uzam, M. Petri Net-Based Robust Supervisory Control of Automated Manufacturing Systems with Multiple Unreliable Resources. IEEE Access 2021, 9, 100264–100278. [Google Scholar] [CrossRef]
  17. Chen, Y.; Li, Z.; Zhou, M. Optimal Supervisory Control of Flexible Manufacturing Systems by Petri Nets: A Set Classification Approach. IEEE Trans. Autom. Sci. Eng. 2013, 11, 549–563. [Google Scholar] [CrossRef]
  18. Uzam, M.; Zhou, M. An Iterative Synthesis Approach to Petri Net-Based Deadlock Prevention Policy for Flexible Manufacturing Systems. IEEE Trans. Syst. Man Cybern. Part A Syst. Humans 2007, 37, 362–371. [Google Scholar] [CrossRef]
  19. Huang, Y.-S.; Pan, Y.-L. An improved maximally permissive deadlock prevention policy based on the theory of regions and reduction approach. IET Control Theory Appl. 2011, 5, 1069–1078. [Google Scholar] [CrossRef]
  20. Rezig, S. Approches Canoniques Pour la Synthèse des Contrôleurs Réseaux de Petri. Ph.D. Thesis, Université de Lorraine, Lorraine, French, 2016. [Google Scholar]
  21. Rezig, S.; Ezzeddine, W.; Turki, S.; Rezg, N. Mathematical Model for Production Plan Optimization—A Case Study of Discrete Event Systems. Mathematics 2020, 8, 955. [Google Scholar] [CrossRef]
  22. Darondeau, P.; Xie, X. Linear control of live marked graphs. Automatica 2003, 39, 429–440. [Google Scholar] [CrossRef] [Green Version]
  23. Giua, A.; DiCesare, F.; Silva, M. Generalized mutual exclusion contraints on nets with uncontrollable transitions. In Proceedings of the 1992 IEEE International Conference on Systems, Man, and Cybernetics, Chicago, IL, USA, 18–21 October 1992; pp. 974–979. [Google Scholar]
  24. Li, Z.; Zhou, M. Deadlock Resolution in Automated Manufacturing Systems: A Novel Petri Net Approach; Springer Science & Business Media: Berlin/Heidelberg, Germany, 2009. [Google Scholar]
  25. Park, E.; Tilbury, D.M.; Khargonekar, P.P. A modeling and analysis methodology for modular logic controllers of machining systems using Petri net formalism. IEEE Trans. Syst. Man Cybern. Part C 2011, 31, 168–188. [Google Scholar] [CrossRef]
Figure 1. The Petri net example.
Figure 1. The Petri net example.
Symmetry 13 02218 g001
Figure 2. The generated reachability graph.
Figure 2. The generated reachability graph.
Symmetry 13 02218 g002
Figure 3. The controlled Petri net.
Figure 3. The controlled Petri net.
Symmetry 13 02218 g003
Figure 4. Flowchart of the control method.
Figure 4. Flowchart of the control method.
Symmetry 13 02218 g004
Figure 5. Flexible manufacturing system in UFR MIM.
Figure 5. Flexible manufacturing system in UFR MIM.
Symmetry 13 02218 g005
Figure 6. The PN modeling.
Figure 6. The PN modeling.
Symmetry 13 02218 g006
Figure 7. The reachability graph/the state space.
Figure 7. The reachability graph/the state space.
Symmetry 13 02218 g007
Table 1. Information of SZ markings.
Table 1. Information of SZ markings.
SZiMarking No.CategorizationMarking (P1, P2, P3)
SZ1M2MS1(3,0,1)
M4MI1(2,0,2)
M5MS1(2,1,1)
M8MI2(1,1,2)
M6MS1(2,2,0)
M9MI3(1,2,1)
M10MS1(1,3,0)
M13MI4(0,3,1)
M3MI5(3,1,0)
SZ2M5MS2(2,1,1)
M9MI2(1,2,1)
Table 2. Information about activation/deactivation vectors.
Table 2. Information about activation/deactivation vectors.
PN SupervisorMarking No.Deactivation VectorActivation Vector
P c 1 M2[0,1,0,0,1][0,1,0,0,0]
M3[1,0,0,1,0][1,0,0,0,0]
P c 2 M5[0,0,0,1,1][1,1,0,0,0]
Table 3. Table of comparisons with FMS example.
Table 3. Table of comparisons with FMS example.
MethodologyNumber of SupervisorsNCalculation Time (ms)
RS1215319
Gh2240693
Table 4. The controlled system with FMS example.
Table 4. The controlled system with FMS example.
MethodologyControl Place M 0 i P c i C P c i ,   .
RS1Pc11(−1,−2,0,1,2)
Pc21(−2,0,0,0,0)
Gh2Pc11(0,−1,0,0,1)
Pc21(−1,−2,0,1,2)
Table 5. Table of comparisons with Hu3 example.
Table 5. Table of comparisons with Hu3 example.
MethodologyNumber of SupervisorsN Calculation Time (ms)
RS1322334
Gh2346589
Table 6. The controlled system with Hu3 example.
Table 6. The controlled system with Hu3 example.
MethodologyControl Place M 0 i P c i C P c i ,   .
RS1Pc10(−2,0,0,0,0,0,0,0,0,0)
Pc20(0,−2,0,0,0,0,0,0,0,0)
Pc30(0,0,0,0,0,−2,0,0,0,0)
Gh2Pc12(0,0,0,0,1,−1,0,1,−1,0)
Pc23(0,0,0,1,−1,0,0,1,−1,0)
Pc32(0,0,0,1,−1,0,0,0,1,−1)
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Rezig, S.; Rezg, N.; Hajej, Z. Online Activation and Deactivation of a Petri Net Supervisor. Symmetry 2021, 13, 2218. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13112218

AMA Style

Rezig S, Rezg N, Hajej Z. Online Activation and Deactivation of a Petri Net Supervisor. Symmetry. 2021; 13(11):2218. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13112218

Chicago/Turabian Style

Rezig, Sadok, Nidhal Rezg, and Zied Hajej. 2021. "Online Activation and Deactivation of a Petri Net Supervisor" Symmetry 13, no. 11: 2218. https://0-doi-org.brum.beds.ac.uk/10.3390/sym13112218

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop