Design of a Live and Maximally Permissive Petri Net Controller Using the Theory of Regions

Size: px
Start display at page:

Download "Design of a Live and Maximally Permissive Petri Net Controller Using the Theory of Regions"

Transcription

1 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY [5] H. Cho and S. I. Marcus, Supremal and maximal sublanguages arising in supervisor synthesis problems with partial observations, Math. Syst. Theory, vol. 22, pp , [6] R. Cieslak, C. Desclaux, A. S. Fawaz, and P. Varaiya, Supervisory control of discrete-event processes with partial observations, IEEE Trans. Automat. Contr., vol. 33, pp , Mar [7] A. Haji-Valizadeh and K. A. Loparo, Minimizing the cardinality of an events set for supervisors of discrete-event dynamical systems, IEEE Trans. Automat. Contr., vol. 41, pp , Nov [8] F. Lin and W. A. Wonham, On observability of discrete event systems, Inform. Sci., vol. 44, no. 3, pp , [9] P. J. Ramadge and W. M. Wonham, Supervisory control of a class of discrete event processes, SIAM J. Control Optim., vol. 25, no. 1, pp , [10] A. F. Vaz and W. M. Wonham, On supervisor reduction in discreteevent systems, Int. J. Control, vol. 44, no. 2, pp , Fig. 11. Megacontroller dynamics. small enough such that during any interval [t; t +1t], at most, one of the following events might happen. 1) Plant Event: which includes all enabled events in 6, at time t. 2) Sensory Network Event: which is any uncontrollable change of sensory network, i.e., N = (d1; d2;...; dn)! N = (d1; d2;...; dn) where di = di = di if di = I di = I or U if di = U 8 i di = U or W if di = W and N is different from N only by one element, say i, i.e., dk 6= dk dk = dk if k = i if k 6= i Now the megacontroller must select an appropriate state from set R(IM). The selected state is shown by OM in Fig. 11. If jr(im)j > 1, then a decision rule is required to select the optimal OM. This problem can be addressed in the context of dynamic optimization, which is not discussed here. Having OM, the megacontroller updates the states of the controller and the sensory network. V. CONCLUSION In this paper, we developed a theoretical framework for control switching of discrete event systems. A megacontroller structure was developed using a combined state and event reduction technique. This structure was applied to monitoring the switching between different control policies for a given discrete event system. REFERENCES [1] T. O. Boucher, Computer Automation in Manufacturing: An Introduction. London, U.K.: Chapman & Hall, [2] B. A. Brandin, The real-time supervisory control of an experimental manufacturing cell, IEEE Trans. Robot. Automat., vol. 12, pp. 1 14, Feb [3] A. L. Buczak, H. Darabi, and M. A. Jafari, Study of genetic algorithm convergence for sensor network optimization problem, Inform. Sci., vol. 133, no. 3 4, pp , [4] C. G. Cassandras and S. Lafortune, Introduction to Discrete Event Systems. Norwell, MA: Kluwer, : ; Design of a Live and Maximally Permissive Petri Net Controller Using the Theory of Regions Asma Ghaffari, Nidhal Rezg, and Xiaolan Xie Abstract This paper addresses the forbidden state problem of Petri nets (PN) with liveness requirement and uncontrollable transitions. The proposed approach computes a maximally permissive PN controller, whenever such a controller exists. The first step, based on a Ramadge Wonham-like reasoning, determines the legal and live maximal behavior the controlled PN should have. In the second step, the theory of regions is used to design control places to add to the original model to realize the desired behavior. Furthermore, necessary and sufficient conditions for the existence of control places realizing the maximum permissive control are given. A parameterized manufacturing application of significant state space is used to show the efficiency of the proposed approach. Index Terms Controllability, Petri nets (PN), supervisory control, theory of regions. I. INTRODUCTION The pioneering work of Ramadge and Wonham [9] on the existence and synthesis of controller for discrete event systems (DES) used finite state automata and formal languages to model the plant. Although the Ramadge Wonham approach is very general, the lack of structure in controlled automata models limit the possibilities of developing computationally efficient algorithms for analysis and synthesis. Petri nets (PNs) have been proposed as an alternative modeling formalism for DES control [7]. Structure properties of PN models have been successfully exploited for design of efficient supervisors of some supervisory control problems. The forbidden state problem of PNs addressed in this paper is a supervisory control problem for which, under appropriate conditions, efficient solutions exist. Restrictive conditions include 1) the set L of legal markings can be expressed by a set of linear inequality constraints also called general mutual exclusion constraints (GMECs), and 2) L is Manuscript received November 29, 2001; revised April 17, 2002 and June 13, This paper was recommended for publication by Associate Editor S. Reveliotis and Editor N. Viswanadham upon evaluation of the reviewers comments. The authors are with INRIA Lorraine/MACSI Team, Metz Cedex, France ( ghaffari@loria.fr; nrezg@loria.fr; xie@loria.fr). Digital Object Identifier /TRA X/03$ IEEE

2 138 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY 2003 controllable, i.e., from any marking m 2 L no forbidden marking is reachable by firing only uncontrollable transitions. It was shown that under these two conditions, the maximally permissive control can be realized by simply adding a set of so-called control places to the plant PN model [3]. Otherwise, general forbidden marking constraints may be enforced by a PN-based controller only if the PN model of the system is safe [2], [3]. This paper is part of a joint research action called MARS of INRIA (France). The purpose here is to demonstrate the usefulness of the theory of regions [1], developed by partners of the MARS action, for supervisory controller design. Given a bounded PN model of the plant, the proposed method computes a PN model which corresponds to the behavior of the closed-loop system. The controller design is subject to constraints including a liveness requirement, maximal permissiveness with respect to given forbidden state specifications, and the presence of uncontrollable transitions. The proposed approach can be considered as a combination of the Ramadge Wonham approach and the theory of regions. It first determines the automation model of the closed-loop system using a Ramadge Wonham-like approach. It then uses the theory of regions to design the PN controller, which is a set of control places, whenever a PN controller exists. Compared with the existing PN-based supervisory control approaches, the contributions of the paper can be summarized as follows. 1) The proposed approach is general, thanks to the use of a Ramadge Wonham-like method for the computation of closed-loop behavior. In fact, it considers a general set of forbidden states in addition to the liveness requirement and the presence of uncontrollable transitions. 2) It establishes necessary and sufficient conditions for the existence of control places realizing the maximum permissive control determined by the Ramadge Wonham-like approach. This is a first satisfactory answer to the long-standing problem about the existence of a PN controller. Of course, our conditions are based on the state space. A challenging issue is the identification of structure-based conditions to this problem. 3) The proposed approach allows a compact PN representation of the maximum permissive control policy. Although this approach suffers the usual state explosion problem in the design phase, the resulting PN controller is expected to be compact and can be efficiently used in real-time control. 4) Concerning the theory of regions, we provide a new interpretation which is entirely based on the basic definitions of PNs. This makes the theory of regions more accessible than its original presentation given in [1]. The rest of the paper is organized as follows. Section II provides the necessary background on PNs as well as on the supervisory control theory, and presents the algorithm for the computation of the closed-loop behavior adopted here. Section III presents a new interpretation of the theory of regions and its use for PN controller synthesis. Section IV deals with a practical application and provides some numerical performances. II. PRELIMINARIES A. PNs A PN is a bipartite graph N = (P; T; Pre; Post), where P is a set of places; T is a set of transitions; Pre: P 2 T! IN is the preincidence function that defines arcs from places to transitions; and Post: P 2 T! IN is the postincidence function that defines arcs from transitions to places. A net is said to be pure if no place is both the input place and output place of the same transition. A pure PN can be represented by the so-called incidence matrix C defined as C(p; t) = Post(p; t) 0 Pre(p; t). A marking is a mapping M : P! IN that assigns to each place an integer number of so-called tokens. A PN (N; M 0 ) is a net N with an initial marking M 0. A transition t is said enabled at a marking M iff M Pre(:; t), which will be denoted by M [t >. Any marking M reachable from an initial marking M 0 by firing a sequence = t 1 t 2 111t n satisfies the following state equation: M = M 0 + C~, where ~: T! IN is a vector of nonnegative integers, called the counting vector. The set of all reachable markings from M in N is denoted as R(N; M). The behavior of a net can be described by a so-called reachability graph in which nodes correspond to reachable markings, and there is an arc with label t from node M to node M 0 if M [t >M 0. B. Supervisory Control Problem In this paper, we are concerned with the forbidden state problem and liveness requirement. The control specifications are given as a set of forbidden markings which correspond to undesirable states because they either compromise the system safety or they yield deadlock situations. Let M F be the set of markings for which specifications do not hold or forbidden markings. The objective is to determine a convenient set of places that, once added to a given PN plant model, will prevent the whole system from reaching these states. It is assumed that transitions of the plant model can be partitioned into two disjoint subsets: T u the set of uncontrollable transitions, and T c the set of controllable transitions (T = T c [ T u ). Controllable transitions may be disabled by the supervisor, while uncontrollable transitions cannot. When the net has uncontrollable transitions, to respect the specifications, it is necessary to prevent the system from reaching a superset of the forbidden markings, containing all dangerous markings from which a forbidden one may be reached by firing a sequence of uncontrollable transitions. Let M D be the set of dangerous markings, i.e., M D = fm 2 R(N; M 0)j9M 0 2 M F ^ 2 Tu 3 ;M[ > M 0 g. Obviously M F M D. We further impose the liveness requirement in the same way as in Ramadge and Wonham s approach. That is, it is required that the so-called marked markings can always be reached by the controlled model. However, we limit ourselves to a particular case with only one marked marking, that is, the initial marking. In this case, the liveness requirement is equivalent to imposing reversibility. However, we notice that the results of this paper can be extended to a general liveness requirement. Finally, the behavior of the controlled system under both safety specification and liveness requirement can be defined as follows. Definition 1: The set M L of legal or admissible markings is the maximal set of reachable markings such that 1) M L \ M D =,2)it is possible to reach the marked marking M 0 from any legal marking without leaving the set M L, and 3) any transition t from a legal marking to a nonlegal marking is a controllable transition. Let R c be the reachability graph containing all legal markings. Clearly, M L R(N;M 0) 0 M D. It was shown in [9] that M L exists and is called the maximally permissive behavior. M L is such that, whatever the marking in M L, the system cannot be uncontrollably led outside M L. To solve the control problem, one has to identify the set of state transitions from an admissible marking to a nonadmissible marking. The control places have to prevent these transitions from happening in order to keep the state space of the controlled system in the set of legal markings. Formally, the set of state transitions the controller has to disable is =f(m; t)jm [t >M 0 ^ M 2 M L ^ M 0 =2 M Lg. To summarize: Definition 2: An optimal controller is the controller that ensures the reachability of all markings in M L and that forbids all state transitions in.

3 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY C. Controlled Behavior Computation Here are the different steps of the algorithm we use to generate the behavior M L. Note that the liveness enforcement is similar to the approach proposed in [8]. Step 1) Define the set of forbidden states M F. Step 2) Generate the partial reachability graph R p (N; M 0 ). Instead of generating the whole reachability graph of the plant model, successors of forbidden markings are not computed. Step 3) Identify the set M D of dangerous markings by exploring R p (N; M 0 ). In this step, markings leading to forbidden markings by firing uncontrollable transitions are identified. If the initial state M 0 itself is a dangerous marking, then there is no solution for the control problem. Step 4) Determine the behavior R c. Let R c be the reachability graph derived from R p (N; M 0 ) by removing markings in M D. To enforce the liveness of the controlled system in the reversibility sense, R c should be a strongly connected graph containing M 0.If R c is strongly connected, then go to Step 7). Otherwise, compute the strongly connected component (SCC) of graph R c that contains M 0. Step 5) Compute the set of blocking markings M b. Blocking markings are markings that uncontrollably lead, from markings in the SCC of R c, to markings outside the SCC. They are given by M b = fm 2 SCCj9M 0 =2 SCC; 9t 2 T u;m[t >M 0 g. Step 6) Remove blocking markings from R c and go to step 4). Step 7) Set R c as the legal behavior and M L the set of markings in R c. The algorithm gives the legal behavior R c, the set M L, and the set of state transitions leading outside R c. III. CONTROLLER SYNTHESIS The theory of regions was initially proposed for the synthesis of pure PNs from given finite transition systems [1]. This work was done from a pure theoretical computer scientist s point of view and terminologies used are unfamiliar to the control community. The goal of Section III-A is to give a new interpretation of the theory of regions using the basic notions of PNs. Section III-B applies the theory of regions for the design of controller places. Section III-C is an example. A. A New Interpretation of the Theory of Regions Let T be a set of transitions and G a finite oriented graph where arcs are labeled by transitions in T. Assume that there exists a node S 0 in G such that there exists a path from it to any node (see Fig. 1 for an example). The objective of the theory of regions is to find a pure PN (N; M 0), having T as its set of transitions and characterized by its incidence matrix C and its initial marking M 0, such that its reachability graph is G and the marking of the node S 0 is M 0. In the following, without confusion, we use M to denote both a reachable marking and its corresponding node in G. Consider any place p of the net (N; M 0 ) we look for. Since (N; M 0) is pure, p can be fully characterized by its corresponding incidence vector C(p; :). For any transition t that is firable at any marking M, i.e., t is the label of an outgoing arc of the node M in G M 0 (p) =M (p) +C(p; t); 8 (M; M 0 ) 2 G and M [t >M 0 (1) where M 0 is the new marking, or equivalently, the destination node of arc t. Consider now any nonoriented cycle of the reachability graph. Applying the state equation to nodes in and summing them up gives the following cycle equation: C(p; t) 1 ~[t] =0; 8 2 S (2) t2t Fig. 1. Reachability graph. where ~[t] denotes the algebraic sum of all occurrences of t in and S is the set of nonoriented cycles of the graph. ~ will be called the counting vector of. Consider now each node M of the reachability graph G. According to the definition of G, there exists a nonoriented path 0M from the initial state M 0 to M. Applying (1) along the path leads to M (p) = M 0 (p) +C(p; 1 0! ) 0 M, where 0! 0 M is the counting vector of the path 0M defined similarly as ~. There may exist several paths from M 0 to M. Under the cycle equations, the product C(p; 1 ) 0! 0 M is the same for all these paths. As a result, the path 0M can be arbitrarily chosen. The reachability of any marking M in G implies that M 0 (p) +C(p; 1 ) 0! 0 M 0; 8 M 2 G (3) which will be called the reachability condition. It is now clear that the cycle equations and the reachability conditions hold for any place p of the net (N; M 0 ). Unfortunately, these equations are not sufficient to obtain the reachability graph G. In order to obtain exactly the reachability graph G, for each pair (M; t) such that M is a reachable marking of G and t is a transition not firable at M; t, should be prevented from happening by some place p. Since the net is pure, t is prevented from happening at M by a place p iff M 0 (p) +C(p; 1 ) 1 0! 0 M + C(p; t); 01: (4) Relation (4) will be called the event separation condition of (M; t). The set of all possible pairs (M; t) where M is a reachable marking and t is not firable at M will be called the set of event separation instances. One last condition for having the same reachability graph is to ensure that the markings are different one from another. This is the so-called state separation condition and is as follows: or equivalently 8 M; M 0 2 G; 9p such that M (p) 6= M 0 (p) (5) 8 M; M 0 2 G; 9p such that C(p; 1 ) 0! 0 M 6= C(p; 1 ) 0! 0 M : (5 0 ) Theorem 1: There exists a PN (N; M 0 ) with G as its reachability graph iff there exists a set P of places (M 0 (p); C(p; :)) such that 1) each place p satisfies cycle equation (2) and reachability conditions (3), 2) the set of places P satisfies the state separation conditions (5), and 3) for each transition t not firable at a reachable marking M, there exists a place p that satisfies the event separation condition (4) of (M; t). The solution to the reachability graph of Fig. 1 is given in Fig. 2. B. Controller Synthesis In a supervisory control problem, rather than reconstruct a whole net model for the controlled system, it is sufficient to compute a convenient set of places fp cg to add to the original plant model and which will act as a controller. It follows that the synthesis principle here is a bit different. This section shows how to adopt the theory of regions to compute a PN-based controller. Given the plant model of the system to control (N; M 0 ) and the reachability graph R c, i.e., the legal behavior of the controlled system, we use the theory of regions to design the control places fp cg to add.

4 140 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY 2003 Fig. 2. PN synthesized from the reachability graph of Fig. 1. Consider a new control place pc. Every marking M in the legal behavior Rc must still be reachable after the addition of pc, which implies that pc has to satisfy reachability condition (3), i.e., M (pc) =M0(pc) +C(pc; 1 ) 0! 0 M 0; 8 M 2 Rc (1 0 ) where 0M is any nonoriented path in Rc from M0 to M. Similarly, each place pc should satisfies cycle equation (2) for cycles in Rc, i.e., C(pc; t) 1 0! [t] =0; 8 2 Sc (2 0 ) t2t where Sc is the set of cycles of the reachability graph Rc. Concerning the event separation instances to forbid, recall that to synthesize a PN having exactly a given reachability graph, all transitions not firable at a marking were considered in the previous subsection. For the supervisory problem under consideration, to obtain Rc from the initial reachability graph R(N; M0), only state transitions of the set from Rc to outside Rc need to be considered. Hence, the set of event separation instances is. This set is expected to be much smaller than the number of all transitions not enabled at a marking. Concerning the event separation instances to forbid, recall that to synthesize a PN having exactly a given reachability graph, all transitions not firable at a marking were considered in the previous subsection. For the supervisory problem under consideration, to obtain Rc from the initial reachability graph R(N; M0), only state transitions of the set from Rc to outside Rc need to be considered. Hence, the set of event separation instances is. This set is expected to be much smaller than the number of all transitions not enabled at a marking. Therefore, each element in will be solved by the addition of a place pc. This means that the number of new places to add is, at most, equal to (in practice, much smaller than) the number of state transitions to inhibit. Hence, each added place pc must solve at least one event separation instance (M; t) in, i.e., M0(pc) +C(pc; 1 ) 0! 0 M + C(pc; t) 01: (3 0 ) The relations (1 ) (3 ) determine the control place pc. Contrary to the PN synthesis problem, the state separation conditions are not needed for the controller synthesis, as they are already satisfied by existing places of the plant PN model. Remark 1: According to well-known results of graph theory, the cycle equations can be reduced to independent cycle equations of basis cycles [5], which can be determined in polynomial time. Clearly, the number of mutually independent cycle equations is, at most, card(t ). Remark 2: Different event separation instances may have common solutions. As a result, the number of places needed for solving all event separation instances is generally much smaller than the number of event separation instances. Algorithm 1: Given a reachability graph and a set of event separation instances with. 1. Compute a spanning tree of and its basis cycles. 2. Compute the independent cycle equation (2 ) using Gaussian elimination method. 3. Generate the reachability condition (1 ) for each marking in using the unique path from to of the spanning tree. 4. While do: 4.1 Generate the event separation condition (3 ) for any element of 4.2 Solve the set of relations (1 ) (3 ). Let be the solution if it exists. Otherwise, exit, as the maximum permissive controlled behavior cannot be enforced by adding control places to the plant PN model Eliminate from all the separation instances that can be solved by. 5. Remove redundant control places to obtain the controlled net by comparing the set of separation instances solved by each control place. The controller computed by Algorithm 1 is optimal as stated in Theorem 2. Theorem 2: The supervisory control problem can be optimally solved by adding a set of control places to the plant model, iff there exists a solution (C(pc; :); M0(pc)) satisfying (1 ) (3 ) for each event separation instance (M; t) in. Proof: (() Consider the controlled net (Nc; M0) =(N; M0)[ fpcg. Since all places in fpcg satisfy (1 ) and (2 ), all transitions in Rc are firable, and the reachability graph obtained by firing labeling transitions in Rc is still Rc, which imply that Rc R(Nc; M0). Further, each event separation instance in is solved by a control place pci, i.e., event separation condition (3 ) holds with the place pci. This implies that all transitions in are disabled in the controlled net (Nc; M0).To conclude, R(Nc; M0) = Rc. ()) Assume that the reachability graph of the controlled system R(Nc; M0) is the maximally permissive behavior. Each place of (Nc; M0) necessarily satisfies (1 ) and (2 ), and for each instance in ; tis necessarily prevented by some place pc, thus satisfying relation (3 ). Q.E.D. Concerning the complexity of the proposed controller design approach, it was established in [9] that the computation of the reachability graph Rc of the controlled system is of polynomial complexity in the number of states. We focus on the complexity of the computation of control places. Theorem 3: Algorithm 1 for the computation of control places is of polynomial complexity in the number of markings in the reachability graph Rc of the controlled system. Proof: Let us consider the complexity of each step of Algorithm 1. From the basic result of graph theory, step 1 is polynomial in the number of nodes nm in Rc [5]. The Gaussian elimination method used in step 2 is of polynomial complexity [10] in the number of basis cycle equations and hence, is polynomial in nm. The result of step 2 is a set of no more than card(t ) equations. Finding the path from M0 to any state M is linear in nm and hence, step 3 is of complexity O(n 2 M ). The

5 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY complexity of each iteration of step 4 depends on the resolution of the linear system defined in step 4.2, whose complexity is polynomial [10] in the number of linear relations. Since the number of linear relations is no more than card(t ) +nm +1, the complexity of each iteration of step 4.2 is polynomial in nm. As the number of event separation instances in is bounded by nm card(t ), step 4 is of polynomial complexity in nm. Checking whether a control place is redundant with respect to n other control places is of complexity n.card(). Since the number of control places generated by step 4 is, at most, card(), step 5 is of complexity (card()) 2 and hence, is complexity in nm. To summarize, Algorithm 1 is of polynomial complexity in nm. C. Example Consider the net and its reachability graph in Figs. 1 and 2. The net is not live, since in state M7 =(1; 2; 0; 0; 0; 0) no transition can fire. Let us apply Algorithm 1 to synthesize the set of control places that will avoid the reachability of M7. First, using the procedure of Section II-C, the legal behavior is a reachability graph derived from the one of Fig. 1 by removing M7. WehaveML = fm1, M2, M3, M4, M5, M6g, and =f(m5, t1)g. The single event separation condition to solve is M7(pc) =M0(pc) +2C(pc; t1) +2C(pc; t2) +C(pc; t1) 01. The reachability graph contains two cycles that have the same equation C(pc; t1) +C(pc; t2) +C(pc; t3) +C(pc; t4) =0 whereas, the reachability conditions can be expressed as follows: M0(p) 0 M1(p) =M0(p) +C(p; t1) 0 Fig. 3. Fig. 4. Production cell example. PN model of the production cell. M2(p) =M0(p) +C(p; t1) +C(p; t2) 0 M3(p) =M0(p) +C(p; t1) +C(p; t2) +C(p; t3) 0 M4(p) =M0(p) +2C(p; t1) +C(p; t2) 0 M5(p) =M0(p) +2C(p; t1) +2C(p; t2) 0 M6(p) =M0(p) +2C(p; t1) +2C(p; t2) +C(p; t3) 0: The above linear system can be solved by taking C(pc; :) = (01; 0; 0; 1) and M0(pc) = 2. The corresponding control place is an input place of t1 and an output place of t4 and initially contains two tokens. IV. PRACTICAL APPLICATION Consider the production cell shown in Fig. 3. It is composed of two robots R1 and R2, each one can hold one product at a time, and three types of machines M1 (2 units), M2 (2 units), and M3 (1 unit). There are three working processes in this cell, as shown in the table of Fig. 3, to perform three products: P1 1 and P1 2 which are variants of the same type, and P2. The net of Fig. 4 is the model of the production cell. Places p1 and p10 limits the in-process parts of each part type to three, the interpretation of the other nodes of the model is straightforward. Suppose that once the manufacturing of the products starts, no event in the working processes can be prevented from occurring, i.e., only transitions t1; t2; and t10 are controllable. The controlled system computed by the proposed methodology has 215 states. The controller consists of three control places pc1; pc2; and pc3 that are connected to the system model as shown in Fig. 5. At a first glance, it seems that the proposed controller tries to control uncontrollable transitions t4 and t9 via pc2 and pc3. A careful check proves that the controller does not disable any uncontrollable transition. Suppose that t4 is process and resource enabled, but disabled by control place pc3, i.e., M (p4) 1;M(R2) 1 and M (pc3) = 0. Then, the invariant related to R2 implies that M (p5) = 0, and since M (pc3) = 0, the invariant associated with pc3 implies that M (p9) = Fig. 5. Additional control places. 2. But then, the invariant associated with pc1 implies that M (p4) = 0, which contradicts the initial assumption that M (p4) 1. To conclude, pc3 never tries to disable the uncontrollable transition t4. Similarly, pc2 never tries to disable the uncontrollable transition t9. Note that an iterative approach was proposed in [6] to address a similar problem for deadlock prevention problems with uncontrollable transitions. The approach of [6] is as general as the one presented in this paper, but it does not ensure the maximum permissiveness. The same manufacturing example was parameterized to generate other problem instances. In each instance, we vary the number of in-process parts of each part type (marking of p1 and p10) and the number of available units of some resource types (marking of M 1; M 2; and R2). Table I summarizes results of the numerical experimentation. We give for each value of the triplet (M0(p1) = M0(p10); M0(M 1) = M0(M 2); M(R2)) the number of states NR in the original graph R(N; M0), the number of states NRc in Rc, the number of separation instances to solve Nsep, the number of synthesized control places Np, and the CPU time required by Algorithm 1 for the synthesis of control places. It is important to note that even for problems of relatively large state space and large number of event separation instances, few control places are enough to represent the optimal control policy. This is further confirmed by another numerical experience, not reported here due to the limited space, concerning the control of a railway system

6 142 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 19, NO. 1, FEBRUARY 2003 TABLE I SOLUTIONS OF PARAMETERIZED PROBLEM INSTANCES [5] M. Gondran and M. Minoux, Graphes et Algorithmes. Paris, France: Editions Eyrolles, [6] M. V. Iordache, J. O. Moody, and P. J. Antsaklis, A method for the synthesis of deadlock prevention controllers in systems modeled by Petri nets, in Proc. ACC 00, Chicago, IL, June 28 30, 2000, pp [7] B. H. Krogh and L. E. Holloway, Synthesis of feedback control logic for discrete manufacturing systems, Automatica, vol. 27, no. 4, pp , [8] Y. Li and W. M. Wonham, Deadlock issues in supervisory control of discrete event systems, in Proc. Conf. Information Science Systems, 1988, pp [9] P. J. Ramadge and W. M. Wonham, The control of discrete event systems, Proc. IEEE, vol. 77, pp , [10] A. Schrijer, Theory of Linear and Integer Programming. New York: Wiley, Stable Fault Adaptation in Distributed Control of Heterarchical Manufacturing Job Shops with more than states (see [4] for its description). These experiences show that the methodology proposed in this paper is able to provide a compact PN representation of the optimal control policy for a wide range of real-life systems. Further, computation time remains reasonable for problems of large size. V. CONCLUSION In this paper, we have proposed an optimal design methodology of PN controllers for the forbidden state problem with both a liveness requirement and uncontrollable transitions. Our approach combines Ramadge Wonham s approach and the theory of regions. It uses a Ramadge Wonham-like approach to determine the automation model of the controlled system, and then it uses the theory of regions to design a PN controller that is a set of control places. A necessary and sufficient condition for the existence of such a PN controller is obtained. The proposed methodology has been applied to supervisory control of manufacturing systems. The numerical experimentation shows that the proposed approach is able to provide a compact PN representation of the optimum control policies of large systems. We are working on the improvement of the computational efficiency of the proposed method which seems to be promising. Another important issue is the impact of control specifications and system configuration on the feasibility and size of PN controllers. Apart from these issues, future research will be conducted in several directions. A natural research direction concerns the design of suboptimal PN controllers when an optimal one does not exist. The second research direction addresses the cooperation of several PN controllers. It seems that some supervisory control problems that do not have optimal PN controllers can be solved by the joint application of two or more PN controllers. REFERENCES [1] E. Badouel, L. Bernardinello, and P. Darondeau, Polynomial algorithms for the synthesis of bounded nets, in Proc. CAAP 95, 1995, Springer Verlag LNCS 915, pp [2] F. Basile, P. Chiacchio, and A. Giua, Supervisory control of Petri nets based on suboptimal monitor places, in Proc. WODES 98, Sardinia, Italy, 1998, pp [3] A. Giua, F. DiCesare, and M. Silva, Petri net supervisors for generalized mutual exclusion constraints, in Proc. 12th IFAC World Congr., Sydney, Australia, July 1993, pp. I: [4] A. Giua and C. Seatzu, Supervisory control of railway networks with Petri nets, in Proc. 40th IEEE CDC, Orlando, FL, Dec. 2001, pp Vittaldas V. Prabhu Abstract In this paper, a control theoretic model is developed for analyzing the dynamics of distributed cooperative control systems for manufacturing job shops with multiple processing steps with parallel dissimilar machines in which parts control their release times autonomously. The model allows an arbitrary number of part types to be produced using an arbitrary number of machines with an arbitrary number of alternate routings. Conditions for global stability of the resulting distributed control system with nonlinearities are shown using results from Lyapunov stability theory. System stability is found to be robust to a variety of faults and disturbances that may be encountered in a manufacturing environment as long they are bounded in the mean. Feedback enables implicit adaptation to faults in real time, which allows the flexibility in the systems to be fully utilized to compensate for faults and disturbances. Numerical simulation experiments are used to illustrate the global stability and the distributed fault adaptation capability of the system without requiring explicit notification or compensation to conditions such as machine deterioration, multiple machine failures, and network communication delays. Simulation results for job shops with 2000 parts are also presented to illustrate the scalability of the approach. Index Terms Adaptive systems, distributed control, manufacturing automation, uncertain systems. I. INTRODUCTION Heterarchical control systems are characterized by highly distributed control among a large number of loosely coupled autonomous entities that retain a minimal amount of global information, and the absence of supervisory controllers [1]. Control in heterarchical manufacturing systems is highly distributed among its entities such as part entities (workpieces), machine tools, robots, automated guided vehicles, and human operators, resulting in flat control architectures. Such heterarchical architectures tend to enhance robustness to faults by Manuscript received August 8, 2000; revised April 15, This paper was recommended for publication by Associate Editor R. Kumar and Editor N. Viswanadham upon evaluation of the reviewers comments. This work was supported in part by the National Science Foundation under Grant DMI and Grant DMI , and the Ben Franklin Technology Partnership through Pennsylvania State University s Center for Manufacturing Enterprise Integration. The author is with the Pennsylvania State University, University Park, PA USA ( prabhu@engr.psu.edu). Digital Object Identifier /TRA X/03$ IEEE

Feedback Control Logic for Forbidden-State Problems of Marked Graphs: Application to a Real Manufacturing System

Feedback Control Logic for Forbidden-State Problems of Marked Graphs: Application to a Real Manufacturing System 18 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 48, NO 1, JANUARY 2003 Feedback Control Logic for Forbidden-State Problems of Marked Graphs: Application to a Real Manufacturing System Asma Ghaffari, Nidhal

More information

APETRI net (PN) (cf. [1] [3]) is said to be live if it is possible

APETRI net (PN) (cf. [1] [3]) is said to be live if it is possible IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 57, NO 2, FEBRUARY 2012 435 On the Existence of Supervisory Policies That Enforce Liveness in Partially Controlled Free-Choice Petri Nets R S Sreenivas, Senior

More information

DISCRETE-event dynamic systems (DEDS) are dynamic

DISCRETE-event dynamic systems (DEDS) are dynamic IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 7, NO. 2, MARCH 1999 175 The Supervised Control of Discrete-Event Dynamic Systems François Charbonnier, Hassane Alla, and René David Abstract The supervisory

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis

Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Wenle Zhang and Robert P. Judd School of Electrical Engineering and Computer Science Ohio University

More information

Minimal Communication in a Distributed Discrete-Event System

Minimal Communication in a Distributed Discrete-Event System IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 6, JUNE 2003 957 Minimal Communication in a Distributed Discrete-Event System Karen Rudie, Senior Member, IEEE, Stéphane Lafortune, Fellow, IEEE, and

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

PETRI NET ANALYSIS OF BATCH RECIPES

PETRI NET ANALYSIS OF BATCH RECIPES Presented at FOCAPO 98, Snowbird, USA. PETRI NET ANALYSIS OF BATCH RECIPES STRUCTURED WITH GRAFCHART Charlotta Johnsson and Karl-Erik Årzén Department of Automatic Control, Lund Institute of Technology,

More information

Parameterized graph separation problems

Parameterized graph separation problems Parameterized graph separation problems Dániel Marx Department of Computer Science and Information Theory, Budapest University of Technology and Economics Budapest, H-1521, Hungary, dmarx@cs.bme.hu Abstract.

More information

Structured System Theory

Structured System Theory Appendix C Structured System Theory Linear systems are often studied from an algebraic perspective, based on the rank of certain matrices. While such tests are easy to derive from the mathematical model,

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications.

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications. Petri Nets 2. Applications Y Narahari Y Narahari is currently an Associate Professor of Computer Science and Automation at the Indian Institute of Science, Bangalore. His research interests are broadly

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs Algorithmic Operations Research Vol.2 (27) 5 2 Vertex 3-colorability of claw-free graphs Marcin Kamiński a Vadim Lozin a a RUTCOR - Rutgers University Center for Operations Research, 64 Bartholomew Road,

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

1. Lecture notes on bipartite matching February 4th,

1. Lecture notes on bipartite matching February 4th, 1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)

More information

DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS

DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS Asian Journal of Control, Vol. 9, No. 2, pp. 111-120, June 2007 111 DEADLOCK AVOIDANCE FOR FLEXIBLE MANUFACTURING SYSTEMS WITH CHOICES BASED ON DIGRAPH CIRCUIT ANALYSIS Wenle Zhang and Robert P. Judd ABSTRACT

More information

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Massimo Benerecetti and Marco Faella Università di Napoli Federico II, Italy Abstract. We consider the problem

More information

MODERN automated manufacturing systems require. An Extended Event Graph With Negative Places and Tokens for Time Window Constraints

MODERN automated manufacturing systems require. An Extended Event Graph With Negative Places and Tokens for Time Window Constraints IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 319 An Extended Event Graph With Negative Places and Tokens for Time Window Constraints Tae-Eog Lee and Seong-Ho Park

More information

Computer Science Technical Report

Computer Science Technical Report Computer Science Technical Report Feasibility of Stepwise Addition of Multitolerance to High Atomicity Programs Ali Ebnenasir and Sandeep S. Kulkarni Michigan Technological University Computer Science

More information

Composability Test of BOM based models using Petri Nets

Composability Test of BOM based models using Petri Nets I. Mahmood, R. Ayani, V. Vlassov and F. Moradi 7 Composability Test of BOM based models using Petri Nets Imran Mahmood 1, Rassul Ayani 1, Vladimir Vlassov 1, and Farshad Moradi 2 1 Royal Institute of Technology

More information

Deadlock Avoidance in Flexible Manufacturing Systems Using Finite Automata

Deadlock Avoidance in Flexible Manufacturing Systems Using Finite Automata 424 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 16, NO. 4, AUGUST 2000 TABLE IV NUMERICAL RESULTS FOR EXAMPLE 3 REFERENCES [1] H. Chen, C. Chu, and J. M. Proth, A more efficient Lagrangian relaxation

More information

Solutions for the Exam 6 January 2014

Solutions for the Exam 6 January 2014 Mastermath and LNMB Course: Discrete Optimization Solutions for the Exam 6 January 2014 Utrecht University, Educatorium, 13:30 16:30 The examination lasts 3 hours. Grading will be done before January 20,

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

Incremental Optimization of Cyclic Timed Event Graphs

Incremental Optimization of Cyclic Timed Event Graphs Proceedings of the 2000 IEEE International Conference on Robotics & Automation San Francisco, CA = April 2000 Incremental Optimization of Cyclic Timed Event Graphs Alessandro Giua, Aldo Piccaluga, Carla

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

Outline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04

Outline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04 Outline Petri nets Introduction Examples Properties Analysis techniques 1 Petri Nets (PNs) Model introduced by C.A. Petri in 1962 Ph.D. Thesis: Communication with Automata Applications: distributed computing,

More information

Bijective Proofs of Two Broken Circuit Theorems

Bijective Proofs of Two Broken Circuit Theorems Bijective Proofs of Two Broken Circuit Theorems Andreas Blass PENNSYLVANIA STATE UNIVERSITY UNIVERSITY PARK, PENNSYLVANIA 16802 Bruce Eli Sagan THE UNIVERSITY OF PENNSYLVANIA PHILADELPHIA, PENNSYLVANIA

More information

Progress Towards the Total Domination Game 3 4 -Conjecture

Progress Towards the Total Domination Game 3 4 -Conjecture Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa

More information

EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007

EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata. Chang-Ching Wu 10/9/2007 EE249 Discussion Petri Nets: Properties, Analysis and Applications - T. Murata Chang-Ching Wu 10/9/2007 What are Petri Nets A graphical & modeling tool. Describe systems that are concurrent, asynchronous,

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Abstract We present two parameterized algorithms for the Minimum Fill-In problem, also known as Chordal

More information

A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net

A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net 582 JOURNAL OF SOFTWARE, VOL. 9, NO. 3, MARCH 2014 A Fast Method for Extracting all Minimal Siphons from Maximal Unmarked Siphons of a Petri Net Qiaoli Zhuang School of Information Science and Technology,

More information

ARITHMETIC operations based on residue number systems

ARITHMETIC operations based on residue number systems IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 53, NO. 2, FEBRUARY 2006 133 Improved Memoryless RNS Forward Converter Based on the Periodicity of Residues A. B. Premkumar, Senior Member,

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

THE TRANSITIVE REDUCTION OF A DIRECTED GRAPH*

THE TRANSITIVE REDUCTION OF A DIRECTED GRAPH* SIAM J. COMPUT. Vol. 1, No. 2, June 1972 THE TRANSITIVE REDUCTION OF A DIRECTED GRAPH* A. V. AHO, M. R. GAREY" AND J. D. ULLMAN Abstract. We consider economical representations for the path information

More information

Studying Graph Connectivity

Studying Graph Connectivity Studying Graph Connectivity Freeman Yufei Huang July 1, 2002 Submitted for CISC-871 Instructor: Dr. Robin Dawes Studying Graph Connectivity Freeman Yufei Huang Submitted July 1, 2002 for CISC-871 In some

More information

Faster parameterized algorithms for Minimum Fill-In

Faster parameterized algorithms for Minimum Fill-In Faster parameterized algorithms for Minimum Fill-In Hans L. Bodlaender Pinar Heggernes Yngve Villanger Technical Report UU-CS-2008-042 December 2008 Department of Information and Computing Sciences Utrecht

More information

AN ALGORITHM WHICH GENERATES THE HAMILTONIAN CIRCUITS OF A CUBIC PLANAR MAP

AN ALGORITHM WHICH GENERATES THE HAMILTONIAN CIRCUITS OF A CUBIC PLANAR MAP AN ALGORITHM WHICH GENERATES THE HAMILTONIAN CIRCUITS OF A CUBIC PLANAR MAP W. L. PRICE ABSTRACT The paper describes an algorithm which generates those Hamiltonian circuits of a given cubic planar map

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

From Task Graphs to Petri Nets

From Task Graphs to Petri Nets From Task Graphs to Petri Nets Anthony Spiteri Staines Department of Computer Inf. Systems, Faculty of ICT, University of Malta Abstract This paper describes the similarities between task graphs and Petri

More information

Chordal deletion is fixed-parameter tractable

Chordal deletion is fixed-parameter tractable Chordal deletion is fixed-parameter tractable Dániel Marx Institut für Informatik, Humboldt-Universität zu Berlin, Unter den Linden 6, 10099 Berlin, Germany. dmarx@informatik.hu-berlin.de Abstract. It

More information

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS

PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PACKING DIGRAPHS WITH DIRECTED CLOSED TRAILS PAUL BALISTER Abstract It has been shown [Balister, 2001] that if n is odd and m 1,, m t are integers with m i 3 and t i=1 m i = E(K n) then K n can be decomposed

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Scan Scheduling Specification and Analysis

Scan Scheduling Specification and Analysis Scan Scheduling Specification and Analysis Bruno Dutertre System Design Laboratory SRI International Menlo Park, CA 94025 May 24, 2000 This work was partially funded by DARPA/AFRL under BAE System subcontract

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH

PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH PETRI NET BASED SCHEDULING APPROACH COMBINING DISPATCHING RULES AND LOCAL SEARCH Gašper Mušič (a) (a) University of Ljubljana Faculty of Electrical Engineering Tržaška 25, Ljubljana, Slovenia (a) gasper.music@fe.uni-lj.si

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

4 Integer Linear Programming (ILP)

4 Integer Linear Programming (ILP) TDA6/DIT37 DISCRETE OPTIMIZATION 17 PERIOD 3 WEEK III 4 Integer Linear Programg (ILP) 14 An integer linear program, ILP for short, has the same form as a linear program (LP). The only difference is that

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION

RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION Franco Blanchini,1 Felice Andrea Pellegrino Dipartimento di Matematica e Informatica Università di Udine via delle Scienze, 208 33100, Udine, Italy blanchini@uniud.it,

More information

Vertex-Colouring Edge-Weightings

Vertex-Colouring Edge-Weightings Vertex-Colouring Edge-Weightings L. Addario-Berry a, K. Dalal a, C. McDiarmid b, B. A. Reed a and A. Thomason c a School of Computer Science, McGill University, University St. Montreal, QC, H3A A7, Canada

More information

Complexity Results on Graphs with Few Cliques

Complexity Results on Graphs with Few Cliques Discrete Mathematics and Theoretical Computer Science DMTCS vol. 9, 2007, 127 136 Complexity Results on Graphs with Few Cliques Bill Rosgen 1 and Lorna Stewart 2 1 Institute for Quantum Computing and School

More information

Metaheuristic Optimization with Evolver, Genocop and OptQuest

Metaheuristic Optimization with Evolver, Genocop and OptQuest Metaheuristic Optimization with Evolver, Genocop and OptQuest MANUEL LAGUNA Graduate School of Business Administration University of Colorado, Boulder, CO 80309-0419 Manuel.Laguna@Colorado.EDU Last revision:

More information

Combining Tree Partitioning, Precedence, and Incomparability Constraints

Combining Tree Partitioning, Precedence, and Incomparability Constraints Combining Tree Partitioning, Precedence, and Incomparability Constraints Nicolas Beldiceanu 1, Pierre Flener 2, and Xavier Lorca 1 1 École des Mines de Nantes, LINA FREE CNRS 2729 FR 44307 Nantes Cedex

More information

Unlabeled equivalence for matroids representable over finite fields

Unlabeled equivalence for matroids representable over finite fields Unlabeled equivalence for matroids representable over finite fields November 16, 2012 S. R. Kingan Department of Mathematics Brooklyn College, City University of New York 2900 Bedford Avenue Brooklyn,

More information

An Improved Measurement Placement Algorithm for Network Observability

An Improved Measurement Placement Algorithm for Network Observability IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 4, NOVEMBER 2001 819 An Improved Measurement Placement Algorithm for Network Observability Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper

More information

Paths, Flowers and Vertex Cover

Paths, Flowers and Vertex Cover Paths, Flowers and Vertex Cover Venkatesh Raman M. S. Ramanujan Saket Saurabh Abstract It is well known that in a bipartite (and more generally in a König) graph, the size of the minimum vertex cover is

More information

A new NC Algorithm for Perfect Matching in Bipartite Cubic Graphs

A new NC Algorithm for Perfect Matching in Bipartite Cubic Graphs A new NC Algorithm for Perfect Matching in Bipartite Cubic Graphs Roded Sharan Avi Wigderson Institute of Computer Science, Hebrew University of Jerusalem, Israel. E-mail: roded@math.tau.ac.il, avi@cs.huji.ac.il

More information

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

More information

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem L. De Giovanni M. Di Summa The Traveling Salesman Problem (TSP) is an optimization problem on a directed

More information

An Improved Upper Bound for the Sum-free Subset Constant

An Improved Upper Bound for the Sum-free Subset Constant 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin

More information

Petri Nets. Robert A. McGuigan, Department of Mathematics, Westfield State

Petri Nets. Robert A. McGuigan, Department of Mathematics, Westfield State 24 Petri Nets Author: College. Robert A. McGuigan, Department of Mathematics, Westfield State Prerequisites: The prerequisites for this chapter are graphs and digraphs. See Sections 9.1, 9.2, and 10.1

More information

Topological Invariance under Line Graph Transformations

Topological Invariance under Line Graph Transformations Symmetry 2012, 4, 329-335; doi:103390/sym4020329 Article OPEN ACCESS symmetry ISSN 2073-8994 wwwmdpicom/journal/symmetry Topological Invariance under Line Graph Transformations Allen D Parks Electromagnetic

More information

An Algorithm to Compute a Basis of Petri Net Invariants

An Algorithm to Compute a Basis of Petri Net Invariants An Algorithm to Compute a Basis of Petri Net Invariants S. Cayir and M. Ucer Electronics and Communication Department, Istanbul Technical University, Istanbul, Turkey cayirs@itu.edu.tr and murvet@ehb.itu.edu.tr

More information

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching

Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Reducing Directed Max Flow to Undirected Max Flow and Bipartite Matching Henry Lin Division of Computer Science University of California, Berkeley Berkeley, CA 94720 Email: henrylin@eecs.berkeley.edu Abstract

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Enhancing The Fault-Tolerance of Nonmasking Programs

Enhancing The Fault-Tolerance of Nonmasking Programs Enhancing The Fault-Tolerance of Nonmasking Programs Sandeep S Kulkarni Ali Ebnenasir Department of Computer Science and Engineering Michigan State University East Lansing MI 48824 USA Abstract In this

More information

LECTURES 3 and 4: Flows and Matchings

LECTURES 3 and 4: Flows and Matchings LECTURES 3 and 4: Flows and Matchings 1 Max Flow MAX FLOW (SP). Instance: Directed graph N = (V,A), two nodes s,t V, and capacities on the arcs c : A R +. A flow is a set of numbers on the arcs such that

More information

A fuzzy k-modes algorithm for clustering categorical data. Citation IEEE Transactions on Fuzzy Systems, 1999, v. 7 n. 4, p.

A fuzzy k-modes algorithm for clustering categorical data. Citation IEEE Transactions on Fuzzy Systems, 1999, v. 7 n. 4, p. Title A fuzzy k-modes algorithm for clustering categorical data Author(s) Huang, Z; Ng, MKP Citation IEEE Transactions on Fuzzy Systems, 1999, v. 7 n. 4, p. 446-452 Issued Date 1999 URL http://hdl.handle.net/10722/42992

More information

Dominance Constraints and Dominance Graphs

Dominance Constraints and Dominance Graphs Dominance Constraints and Dominance Graphs David Steurer Saarland University Abstract. Dominance constraints logically describe trees in terms of their adjacency and dominance, i.e. reachability, relation.

More information

CSP solver for Safe PLC Controller: Application to manufacturing systems

CSP solver for Safe PLC Controller: Application to manufacturing systems CSP solver for Safe PLC Controller: Application to manufacturing systems R. PICHARD*, N. BEN RABAH*, V. CARRE-MENETRIER* and B. RIERA* * CReSTIC (EA3804), UFR Sciences Exactes et Naturelles, Reims University

More information

Synthesis of An Event Based Supervisor For Deadlock Avoidance In Semiconductor Manufacturing Systems

Synthesis of An Event Based Supervisor For Deadlock Avoidance In Semiconductor Manufacturing Systems Synthesis of An Event Based Supervisor For Deadlock Avoidance In Semiconductor Manufacturing Systems Wenle Zhang School of Electrical Engineering and Computer Science Ohio University Athens, Ohio 45701

More information

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori

Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori The Computer Journal, 46(6, c British Computer Society 2003; all rights reserved Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes Tori KEQIN LI Department of Computer Science,

More information

arxiv: v4 [math.co] 25 Apr 2010

arxiv: v4 [math.co] 25 Apr 2010 QUIVERS OF FINITE MUTATION TYPE AND SKEW-SYMMETRIC MATRICES arxiv:0905.3613v4 [math.co] 25 Apr 2010 AHMET I. SEVEN Abstract. Quivers of finite mutation type are certain directed graphs that first arised

More information

Boolean networks, local models, and finite polynomial dynamical systems

Boolean networks, local models, and finite polynomial dynamical systems Boolean networks, local models, and finite polynomial dynamical systems Matthew Macauley Department of Mathematical Sciences Clemson University http://www.math.clemson.edu/~macaule/ Math 4500, Spring 2017

More information

Hardness of Subgraph and Supergraph Problems in c-tournaments

Hardness of Subgraph and Supergraph Problems in c-tournaments Hardness of Subgraph and Supergraph Problems in c-tournaments Kanthi K Sarpatwar 1 and N.S. Narayanaswamy 1 Department of Computer Science and Engineering, IIT madras, Chennai 600036, India kanthik@gmail.com,swamy@cse.iitm.ac.in

More information

Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal.

Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal. Chapter 8 out of 7 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal 8 Matrices Definitions and Basic Operations Matrix algebra is also known

More information

ITERATIVE decoders have gained widespread attention

ITERATIVE decoders have gained widespread attention IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4013 Pseudocodewords of Tanner Graphs Christine A. Kelley, Member, IEEE, and Deepak Sridhara, Member, IEEE Abstract This paper presents

More information

Forced orientation of graphs

Forced orientation of graphs Forced orientation of graphs Babak Farzad Mohammad Mahdian Ebad S. Mahmoodian Amin Saberi Bardia Sadri Abstract The concept of forced orientation of graphs was introduced by G. Chartrand et al. in 1994.

More information

Open and Closed Sets

Open and Closed Sets Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

More information

Parameterized Algorithm for Eternal Vertex Cover

Parameterized Algorithm for Eternal Vertex Cover Parameterized Algorithm for Eternal Vertex Cover Fedor V. Fomin a,1, Serge Gaspers b, Petr A. Golovach c, Dieter Kratsch d, Saket Saurabh e, a Department of Informatics, University of Bergen, N-5020 Bergen,

More information

arxiv: v1 [cs.dm] 21 Dec 2015

arxiv: v1 [cs.dm] 21 Dec 2015 The Maximum Cardinality Cut Problem is Polynomial in Proper Interval Graphs Arman Boyacı 1, Tinaz Ekim 1, and Mordechai Shalom 1 Department of Industrial Engineering, Boğaziçi University, Istanbul, Turkey

More information

On competition numbers of complete multipartite graphs with partite sets of equal size. Boram PARK, Suh-Ryung KIM, and Yoshio SANO.

On competition numbers of complete multipartite graphs with partite sets of equal size. Boram PARK, Suh-Ryung KIM, and Yoshio SANO. RIMS-1644 On competition numbers of complete multipartite graphs with partite sets of equal size By Boram PARK, Suh-Ryung KIM, and Yoshio SANO October 2008 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES

More information

Super Connectivity of Line Graphs and Digraphs

Super Connectivity of Line Graphs and Digraphs Acta Mathematicae Applicatae Sinica, English Series Vol. 22, No. 1 (2006) 43 48 Super Connectivity of Line Graphs and Digraphs Min Lü 1, Jun-Ming Xu 2 1 Department of Computer Science and Technology, University

More information

Inadmissible Class of Boolean Functions under Stuck-at Faults

Inadmissible Class of Boolean Functions under Stuck-at Faults Inadmissible Class of Boolean Functions under Stuck-at Faults Debesh K. Das 1, Debabani Chowdhury 1, Bhargab B. Bhattacharya 2, Tsutomu Sasao 3 1 Computer Sc. & Engg. Dept., Jadavpur University, Kolkata

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Applied Mathematics 160 (2012) 505 512 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam 1-planarity of complete multipartite

More information

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}.

Greedy Algorithms 1 {K(S) K(S) C} For large values of d, brute force search is not feasible because there are 2 d {1,..., d}. Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

Discrete, Continuous, and Hybrid Petri Nets

Discrete, Continuous, and Hybrid Petri Nets Discrete, Continuous, and Hybrid Petri Nets Bearbeitet von René David, Hassane Alla 1. Auflage 2004. Buch. XXII, 570 S. Hardcover ISBN 978 3 540 22480 8 Format (B x L): 15,5 x 23,5 cm Gewicht: 2080 g Weitere

More information

Lecture 11: Maximum flow and minimum cut

Lecture 11: Maximum flow and minimum cut Optimisation Part IB - Easter 2018 Lecture 11: Maximum flow and minimum cut Lecturer: Quentin Berthet 4.4. The maximum flow problem. We consider in this lecture a particular kind of flow problem, with

More information

Math 170- Graph Theory Notes

Math 170- Graph Theory Notes 1 Math 170- Graph Theory Notes Michael Levet December 3, 2018 Notation: Let n be a positive integer. Denote [n] to be the set {1, 2,..., n}. So for example, [3] = {1, 2, 3}. To quote Bud Brown, Graph theory

More information

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results

More information

Notes for Lecture 24

Notes for Lecture 24 U.C. Berkeley CS170: Intro to CS Theory Handout N24 Professor Luca Trevisan December 4, 2001 Notes for Lecture 24 1 Some NP-complete Numerical Problems 1.1 Subset Sum The Subset Sum problem is defined

More information

Managing test suites for services

Managing test suites for services Managing test suites for services Kathrin Kaschner Universität Rostock, Institut für Informatik, 18051 Rostock, Germany kathrin.kaschner@uni-rostock.de Abstract. When developing an existing service further,

More information

SHIP heading control, also known as course keeping, has

SHIP heading control, also known as course keeping, has IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 20, NO. 1, JANUARY 2012 257 Disturbance Compensating Model Predictive Control With Application to Ship Heading Control Zhen Li, Member, IEEE, and Jing

More information