MODERN automated manufacturing systems require. An Extended Event Graph With Negative Places and Tokens for Time Window Constraints

Size: px
Start display at page:

Download "MODERN automated manufacturing systems require. An Extended Event Graph With Negative Places and Tokens for Time Window Constraints"

Transcription

1 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER An Extended Event Graph With Negative Places and Tokens for Time Window Constraints Tae-Eog Lee and Seong-Ho Park Abstract We introduce places with negative holding times and tokens with negative token counts into a timed event graph in order to model and analyze time window constraints. We extend the enabling and firing rules for such an extended event graph named a negative event graph (NEG). We develop necessary and sufficient conditions based on the circuits for which the NEG is live, that is, an infinite sequence of feasible firing epochs exist for each transition. We prove that the minimum cycle time is the same as the maximum circuit ratio of the circuits with positive token counts. We also show that when there exists circuits with negative token counts, the maximum cycle time is bounded and the same as the minimum circuit ratio of such circuits. A scheduling example for a robot-based cluster tool with wafer residency time constraints for semiconductor manufacturing is explained. Note to Practitioners Scheduling and control problems for modern man-made systems, including automated manufacturing systems such as cluster tools for semiconductor manufacturing, microcircuits, and real-time software systems, are usually modeled as discrete event systems. Such systems often have strict time constraints on timings of some events. Our results can be used for identifying whether there can be a feasible schedule that satisfies all time constraints, computing the range of the feasible cycle times, and determining a steady schedule with the minimum cycle time. By using the feasibility condition, we also can accommodate the system configuration, the task times, and the task sequence so that the system can satisfy the time constraints while meeting the target cycle time. Such practice is already used for real cluster tool engineering. We have more results on implementing a real-time scheduler and controller for time constrained systems. Index Terms Discrete event system, negative place, negative token, Petri net, time window constraint. I. INTRODUCTION MODERN automated manufacturing systems require strict timing constraints. A part processed at a machine should leave the machine within a time limit or the processing should be performed within a time interval called a time window. Examples include chemical processing systems such as hoist-based production systems for printed circuit board manufacturing, robot-based cluster tools for chemical vapor deposition in semiconductor manufacturing, and other robot cells [1] [3]. Manuscript received September 25, This paper was recommended for publication by Associate Editor M. Lawley and Editor N. Viswanadham upon evaluation of the reviewers comments. This work was supported in part by Korea Science Foundation under Grant and by the Brain Korea 21 Project in The authors are with the Department of Industrial Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejeon , Korea ( telee@kaist.ac.kr; crinece@kaist.ac.kr). Digital Object Identifier /TASE There have been attempts to model and investigate scheduling problems of automated manufacturing systems with time window constraints [2] [6]. Besides such domain-specific ad hoc methods, Khansa et al. [7] introduce p-time Petri nets for modeling time window constraints. Kim et al. [8] apply p-time Petri nets to scheduling cluster tools with timing constraints. A p-time Petri net assigns a time interval to each timed place of which associated activity has a time window constraint. By analyzing synchronizing circuits or synchronizing paths, a necessary condition based on the notion of dead marking is derived for which feasible timings or schedules exist [7]. Van der Aalst [9] suggests a time interval on a firing delay that is intended for representing the range of the possible sample values of a firing delay (that models a processing time or an activity time) instead of a particular probability distribution of the firing delay. The time interval is not for indicating a time window constraint that restricts the feasible difference between two events. He is not concerned with the feasibility issues, but with computing performance bounds. It still remains open whether it is possible to extend notions of places and tokens, generic elements of event graphs or Petri nets, so that they not only can model general time constraints but also generalize fundamental properties such as enabling and firing rules, liveness conditions, cycle time, etc. in a unified framework. Since places and tokens are essential for analyzing dynamic behavior of a system, we expect that their extensions are required to examine dynamic properties of a time constrained system. In this paper, in order to model and examine time window constraints, we introduce negative places with negative holding times and negative tokens with negative token counts into timed event graphs. The enabling and firing rules for the extended event graph called negative event graph (NEG) are extended to incorporate negative places and negative tokens. The generation and consumption rules of negative tokens are opposite to those of conventional positive tokens. We characterize necessary and sufficient conditions for the NEG to be live, that is, each transition fires infinitely without violating any time window constraint, based on the circuits of the NEG. We also present linear programming models for finding a steady schedule of firing epochs that minimizes or maximizes the cycle time. We prove that the minimum cycle time is the same as the maximum circuit ratio of the circuits with positive token counts. We also show that when there exist circuits with negative token counts, the maximum cycle time is bounded and the same as the minimum circuit ratio of such circuits. A scheduling example for a robot-based cluster tool with constraints on wafer residency /$ IEEE

2 320 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 times within processing chambers for semiconductor manufacturing is explained. We note that Murata and Yamaguchi [10] also propose similar ideas of negative tokens into Petri nets for the purpose of modeling truth in automated reasoning, which have reversed firing behavior. The rest of the paper is organized as follows. In Section II, we formally define the NEG which can model time window constraints. We also characterize necessary and sufficient conditions for which there exists a feasible firing schedule that satisfies all time constraints. In Section III, we present associated linear programming models to find the minimum and maximum cycle times and the steady feasible schedules for a given NEG. Finally, we summarize the results and discuss future research issues. II. NEGATIVE EVENT GRAPH We first briefly explain conventional timed Petri nets from Murata [11] and Wang [12]. A Petri net is a graphical and mathematical representation of a discrete event system. It consists of transitions, places, tokens, and arcs, which usually model events or activities, activities or conditions, entities or parts, and precedence relations between transitions or flow of tokens, respectively. Rectangles, circles, black dots, and arrows represent transitions, places, tokens, and arcs, respectively. A token at a place represents that a condition is satisfied or an activity or an entity is in progress. When a place models an activity, a token at the place can join enabling the succeeding transition after its sojourn time at the place has elapsed beyond a specified time, that is, the time required for the activity. Such a place is called a timed place and the required sojourn time is called the token holding time at the place. A transition is enabled when each preceding place has at least one token assuming that the net is composed by no-weighted arcs. An enabled transition fires immediately or after a firing delay, if any. After a transition fires, a token from each preceding place is removed and a token is added to each succeeding place. For expositional convenience, we assume that all transitions are instantaneous events. A transition with a positive firing delay can be transformed into instantaneous transitions and a place with the holding time same as the firing delay [13]. An event graph with token holding times is often called a timed event graph. We focus on timed event graphs. In the sequel, an event graph indicates a timed event graph. In order to model a time-constrained activity, Khansa et al. [7] introduce a time interval for the token holding time at a place, during which a token should reside at the place for at least time units and no more than time units. We propose an alternative way of extending a timed Petri net or a timed event graph. Consider a place that models an activity. Let and be the input and output transitions of the place, respectively. They may model start and completion of the activity, respectively. Alternatively, may represent start of the next activity. Suppose that the activity at should complete during time window once it starts. In other words, event can occur at least time units but no later than time units after event. For instance, in a robot cell and represent loading a part into a process module and unloading the part from the process module, respectively. Let indicate the processing time at the process module. Then, represents the maximum allowed delay time of the part for which the processed part can stay at the process module until it is unloaded. A robot-based cluster tool for chemical vapor deposition has such time window constraints. When the part or wafer stays within the process module more than time units, it has significant quality problems due to residual gases and heat within the process module. Let and denote the starting times of and in a cycle, respectively. Then, in order to meet the time window constraint, it should hold that and. The latter inequality can be written as. These two inequalities naturally lead to two different arcs, one from to and the other from to, in a program evaluation and review technique (PERT)-like directed graph. Similar ideas for robot scheduling based or the associated directed graphs can be more or less found in the literature [2], [3], [6]. In such a graph, the arc from to denotes that event can occur time units after event occurs. The arc from to represents that event can occur time units after event occurs. In other words, event should occur no earlier than time units before event occurs. Equivalently, event should occur no later than time units after event occurs. A p-time Petri net and a PERT-like directed graph are primarily intended to identify the existence of a feasible schedule rather than analyzing dynamic state change and schedule dynamics. To capture dynamic state change and timing behavior, we introduce negative places and negative tokens into timed event graphs. A. Definitions of Negative Place and Negative Token A negative place that has an incoming arc from transition and an outgoing arc to is defined as follows. 1) A negative place, marked by a dotted circle, has a negative token, marked by a white dot. 2) A negative place has a negative token holding time. 3) A negative place does not affect enabling of output transition. That is, a transition can be enabled regardless of the input negative places. 4) However, it restricts enabling of input transition. The input transition is enabled only when each outgoing negative place has a negative token in addition to having a token in each normal input place. 5) If output transition of negative place fires, a negative token is added into the negative place. 6) If input transition of negative place fires, a negative token is removed from the negative place. More formal definitions of negative places and negative tokens are given together with the definitions of the enabling and firing rules in the definition of a NEG. An arc that connects a negative place is called a negative arc and marked by a dotted arrow. In contrast with negative places and tokens, conventional places and tokens are called positive places and positive tokens. It is noted that the negative places and tokens in enabling and firing work backward while positive places and positive tokens act forward. An event graph that has negative places and tokens is called a NEG.

3 LEE AND PARK: EXTENDED EVENT GRAPH WITH NEGATIVE PLACES AND TOKENS 321 Fig. 1. Negative place and negative token. Fig. 2. General time window constraints. B. Generalized Time Window Constraints For any two transitions and in an NEG, the th firing of should occur within time units after the th firing of occurred for all, a negative place is configured from to, where and. The negative place has holding time and negative tokens. The generalized time window constraint can be written as equivalently (1) As implied by (2), the negative tokens at the negative place should be counted negatively. As a special case of the generalized time window constraint, an activity of which start event and completion event are constrained by a time window constraint is specified by a positive place with the token holding time from input transition to output transition, and a negative place from to with a negative token holding time. When an activity is in progress at positive place, the negative place also has a negative token. A negative token at a negative place implies that the time window constraint is enforced for the activity of the corresponding positive place in progress. Such a simple case is illustrated in Fig. 1. The negative places and tokens can model more general time window constraints. A negative place can constrain the time interval between any two events or transitions, for instance, from unloading a wafer from the loadlock to returning to the loadlock after undergoing several processing and transportation operations. An example for such general time window constraints is illustrated in Fig. 2. Negative place constraints the time interval from event to event. A negative place can have more than one negative tokens. The two negative tokens at negative place indicate that two time windows are activated for the two activities in progress between transition and. Such generalized time window modeling capabilities increase the modeling power of an NEG for various time constraints. The negative places and the number of negative tokens should be appropriately configured so that the intended time constraints are correctly modeled. No matter how they are configured and whatever they mean, the formally defined NEG can be analyzed. We may further generalize the time window constraints so that can be negative so that the firing instance of is allowed to be later than that of, that is, a negative place allows a positive token. However, we do not consider such a case in this work. (2) C. Definition of Marking Counts A marking count for positive tokens is the number of positive tokens at the place. A marking count for negative tokens is -(the number of negative tokens at the place). The marking count of a path (or circuit) is the sum of the marking counts of the places along the traverse of the path (or circuit). We let or indicate the marking counts for positive place and negative place, respectively. From the above specifications on an NEG, an NEG is formally defined as a 6-tuple, where the following are true. 1) is a finite set of positive places and negative places, where and are the arc index sets for the positive places and negative places, respectively. 2) is a finite set of transitions, where is the set of indexes for the transitions. 3) : is an input function that defines directed arcs from places to transitions. 4) : is an output function that defines directed arcs from transitions to places. 5) : is the initial marking, where is a set of all integers. 6) : is the token holding time function, where is the set of real numbers. 7) Enabling Rule: A transition is enabled for a marking if for all such that, for all such that, and the elapsed sojourn time of each token at each input positive place of exceeds the holding time and also the elapsed sojourn time of each token at each output negative place of does not exceed the time limit, the absolute value of the negative holding time. 8) Firing Rule: An enabled transition can fire while the transition is enabled. After fires, for all such that, for all such that, for all such that, and for all such that, where is the current marking and is the marking after the firing.

4 322 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 For a transition to be enabled, two conditions should be satisfied. First, each incoming positive place of the transition should have more than one positive token and each outgoing negative place of the transition has more than one negative token. This is called a marking condition. Second, the sojourn time of at least one positive token in each incoming positive place should elapse the holding time and the elapsed sojourn time of any negative token in each outgoing negative place should not exceed the absolute value of the negative holding time of the negative place. This requirement is called a token sojourn time condition. An enabled transition can fire at any time while the transition is enabled. There can be different firing schedules. An NEG itself does not assume a specific firing schedule while most conventional timed Petri nets or event graphs presume earliest firing schedules, where each transition fires as soon as it can fire. Therefore, an NEG specifies only time constraints or relationships between the transitions, time window type or not. Decision on the firing epochs should be made separately. We are primarily interested in whether there exists any firing schedule that satisfies all time constraints and the characteristics of such feasible firing schedules. A token sojourn time constraint is violated when the token sojourn time of a negative token in an outgoing negative place already had exceeded the sojourn time limit before the elapsed sojourn time of a positive token in each incoming positive place exceeds the required holding time. In the case, one or more time window constraints are violated. When such violation occurs, the NEG stops firing. Therefore, an NEG is live if each transition has an infinite sequence of firing epochs that satisfies the time window constraints, that is, there exists an infinite feasible firing schedule. A reachable marking is a marking of such an infinite feasible firing schedule. In the sequel, a firing schedule indicates an infinite feasible firing schedule unless it has a specific other explanation. We note that the time window constraint for a general case is defined based on the firing epochs of two transitions. It means that there can be a negative place from to without there being a positive place from to. As in an event graph, in an NEG, the input or output function for a pair of transition and place is 0 or 1. There is no parallel arcs between a transition and a place, or equivalently the arc cardinality or multiplicity of each arc is 1. For expositional convenience, we define the index of a place or from transition to based on or. When there are parallel places between two transitions and, we assume that distinct copies of arc are included in or. We let. Remark 1: (Holding Times and Marking Counts of Circuits of a Composite Circuit): We discuss the holding times and the marking counts of a circuit or a path. In an event graph or NEG, a composite circuit is composed of more than one circuits that share one or more transitions or places. An elementary circuit is a circuit that does not have a smaller circuit. When is an elementary circuit, we let and denote the sum of the holding times and the sum of the marking counts of circuit, respectively. The values play essential roles for analyzing an NEG. When is a composite circuit, we should be careful for evaluating the holding time sum and the marking count sum of the circuit. Suppose that and are the elementary circuits that comprise. Then, the sum of holding times of the places in is not the same as. Further, the sum of marking counts of the places in is not the same as. It is because the holding times and the marking counts of the shared places are counted once in the composite circuit while they are counted twice in and. The holding time sum and the marking count sum of the shared path segment may be positive, zero, or negative. This might lead to some confusion in analyzing an NEG. The real roles of the holding time sum and the marking count sum are clarified when the firing instances of the transitions and the number of visits to the places for a traverse along the circuit are explicitly counted. When a composite circuit is evaluated, the holding time sum and the marking count sum of a shared place should be added as many as the number of the constituent elementary circuits that share the place. A place should be counted as many as the number of visits in a traverse along the circuit. For instance, the holding time sum of composite circuit, denoted by,isdefined to be, and the marking count sum of the composite circuit, denoted by, is defined to be. A path may also include a circuit. In the case, the path should be defined by specifying how many the circuit is traversed. Otherwise, a path is assumed to have no circuit. In the sequel, we therefore assume that a path has no circuit unless its circuit traversal is explicitly specified. Keeping this in mind, we let and denote the holding time sum and the marking count sum of path. We also let and, where is positive or negative. Remark 2: (Initial Token Delays): An initial marking of an event graph or Petri net represents a state of the system that performs the steady work cycle. Initial transient behavior of the system, that is, how the initial tokens are created, is not modeled. For instance, consider an empty cluster tool. For such an empty tool, the event graph model has no tokens that correspond to wafers. The tool performs the steady work cycle after some number of wafers are loaded into the tool. The event graph for a state of the the steady work cycle period has tokens for wafers in progress as well as the robot hand s position. The initial transient period from the empty state to a state of the steady period is not modeled by such an event graph with an initial marking. An initial marking of the event graph indicates the state of the tool in a steady period. We note that the steady period does not mean that the firing schedule has a steady timing pattern. Nor does the initial marking specify the event timings of the system. In a timed event graph, the initial state cannot be completely defined by the initial marking only. How long each token at each place has stayed there should be specified. Such times are called the initial token delays of the tokens. The initial delays should be appropriately defined so that the marking and the initial token delays define a feasible state of the system. Such initial token delays are called compatible [13]. Further, in order to avoid overtaking between the tokens at a place, the first-in first-out (FIFO) rule that the tokens leave the place in the order of their arrivals is assumed [13]. Therefore, we assume that an NEG models a system in a steady period and use the FIFO token rule. For an NEG, we may define specific initial token delays. In the case, the firing schedule of the NEG is restricted by the initial token delays. However, we do not specify the initial token delays for an NEG since we wish to know whether there exists a feasible one among all kinds of firing schedules, including ones with

5 LEE AND PARK: EXTENDED EVENT GRAPH WITH NEGATIVE PLACES AND TOKENS 323 Fig. 3. Dual-armed cluster tool. Fig. 4. NEG for a dual-armed cluster tool. different initial token delays. The initial token delays are considered as a part of a firing schedule. An NEG model for a cluster tool example is given below. Example 1: (Cluster Tool): We quote and adapt a dual-armed cluster tool scheduling example from Kim and Lee [8] (also see Shin et al. [1]). A cluster tool for semiconductor wafer manufacturing consists of a transfer module, several process modules (PMs), and two loadlocks, which are integrated within a closed mini-environment (see Fig. 3). The robot has dual opposite pan type arms, and performs wafer transportation, loading, and unloading. The tool can have diverse wafer flow patterns by logically reconfiguring the PM s and scheduling the robot tasks appropriately depending on the recipe. The figure shows a simple flow pattern such that a wafer, unloaded from loadlock A and aligned, undergoes processing at one of PM1 and PM2, and then PM3 sequentially. PM4 and the cooler are not used for the flow pattern. The wafer alignment time at the aligner is included in the time for unloading the wafer from the loadlock. Finished wafers return to the loadlock. After the last wafer of the cassette in loadlock A is unloaded from the loadlock, the tool begins processing the wafers of the cassette at loadlock B. By such pipelined processing, the tool keeps repeating steady work cycles until all wafers of the cassettes in a lot are processed. The dual-armed robot mostly repeats swap operations for loading and unloading wafers at each PM. It unloads a processed wafer from a PM into an empty arm, rotates the arms, and immediately loads the next wafer on the other arm. Cluster tools for chemical vapor deposition often require strict timing constraints that a processed wafer at a PM should be unloaded within a time limit. Otherwise, the wafer is subject to severe quality problems due to residual gases and heat. Fig. 4 illustrates an NEG model for the cluster tool. The robot work cycle has the robot task sequence, unload a new wafer from the loadlock ( ) move the empty arm to PM1 ( ) swap the completed wafer with the unprocessed wafer at PM1 ( ) move to PM3 ( ) swap at PM3 ( ) move to the loadlock ( ) return the wafer to the loadlock ( ) unload a new wafer from the loadlock ( ) move to PM2 ( ) swap at PM2 ( ) move to PM3 ( ) swap at PM3 ( ) move to the loadlock ( ) return the wafer to the loadlock ( ), where the symbols in the parentheses are the corresponding places in the NEG. Each robot work cycle produces 2 wafers. Places from to and to correspond to the first and second wafer cycles, respectively. Each wafer cycle requires two robot tasks for each process step (a move to a PM of the process step and a swap) and 3 additional robot tasks, unloading a wafer from a loadlock, moving to the loadlock, and returning the completed wafer to the loadlock. Each transition represents the event of completion or readiness of a robot task. In order to start a swap operation at PM1, the robot should have arrived at PM1 and wafer processing at PM1 should have finished. Therefore, the input places of transition are for moving to PM1 and for processing a wafer at PM1. Since each wafer cycle requires one wafer processing operation at PM3, each robot work cycle needs two wafer cycles. indicates the first wafer processing at PM3 after the first swap at the PM completes ( ), which should complete before the second swap for the second wafer processing at the PM begins ( ). represents the second wafer processing at PM3 after the second swap at the PM completes ( ), which should complete before the first swap for the first wafer processing at the PM for the next robot work cycle begins ( ). Symbols,,, and indicate the minimum task times for unloading, moving, returning, and swapping, respectively, which do not include any delay or waiting. As soon as the robot completes a swap operation at a PM, the PM starts processing the wafer and the robot should move to the next PM. Therefore, the interval for each swap task (,,, and ) should be since intermediate delay during a swap process is allowed as [8] suggests as a more flexible alternative to the conventional swap operation method. The token sojourn time at a place for processing a wafer at a PM includes the wafer processing time and the wafer waiting or delay time within the PM s chamber after processing. The wafer delay time after processing at a PM for process step is not allowed to exceed the maximum wafer delay time limit. Therefore, such a place for wafer processing for process step (,,, and ) has a time window,. The negative places model the upper bounds on the process times at the PMs. For each place for wafer processing in progress (,, and ), each corresponding negative place (,, and ) have one negative token in the initial marking. Remark 3: (Marking Compatibility): For a conventional event graph to be live, the initial marking should be made not to make a null circuit, a circuit that has no token. In an

6 324 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 Fig. 5. Example of incompatible marking. NEG, improper marking in the negative places as well as in the positive places can make a transition never be enabled. A simple example is shown in Fig. 5. The embedded event graph of the NEG in Fig. 5, that is, the graph that excludes the negative places, is strongly connected and live. Nonetheless, no transition is enabled because transition has no token in the incoming positive place and transition has no token in the outgoing negative place. In this example, the net with such a marking is not live regardless of the holding times and the initial token delays. Such a marking is thus called incompatible. An NEG with an incompatible initial marking has no feasible firing schedule and hence need not be examined. Therefore, an NEG should be initially marked to be compatible. When the NEG properly models a real system, it has a compatible initial marking. In Example 1, a negative token is allocated to indicate the wafer residency time constraint for the loaded wafer. Therefore, in the example, a negative token is assigned to a negative place when the corresponding positive place has a token that indicates the loaded wafer. The negative token indicates the wafer residency time constraint is effective for the loaded wafer. In the sequel, we consider only NEGs with compatible markings. We note that an NEG with a compatible initial marking may not be live due to violation of the token sojourn time requirement. We are concerned with liveness of an NEG with a compatible initial marking. In an event graph, it is known that the number of tokens in a circuit remains constant for any reachable marking. An NEG has a similar property. Lemma 1: In an NEG, the sum of the marking counts for any circuit remains constant for any reachable marking. Proof: For an NEG, consider the corresponding event graph that removes the negative places and negative tokens. In the event graph, the number of (positive) tokens in a circuit remains constant for any reachable marking. Therefore, in a circuit that does not have any negative place, the (positive) marking count remains constant. Now, consider a circuit in the NEG that passes a negative place. Each time a negative token is generated into the negative place, that is, each time transition fires, a positive token is added to each output place of transition in the circuit, and if the output place of is a negative place, a negative token is removed from the negative place. On the other hand, each time a negative token is removed from the negative place, that is, each time transition fires, a positive token is removed from each input place of in the circuit, and if the input place of is a negative place, a negative token is added to the negative place. Consequently, any circuit that goes through an input place of through negative place to an output place of keeps the marking count unchanged for any firing of or. Fig. 6. Cases of L(). Even if there are consecutive negative places like and in a circuit, firing transition moves a negative token at backward into the preceding negative place. From the lemma, it is seen that a circuit of zero marking count, a negative marking count, or a positive marking count remains as such a circuit for any reachable marking. It is seen that the circuit always has a constant marking count 0. In other words, the two places have no token or have a positive token and a negative token, respectively. From the firing rule, a negative token is generated and removed only at a negative place. It does not move into a positive place. So is a positive token. A positive place has only positive tokens and a negative place has only negative tokens at any marking. An event graph is said to be live if each transition has an infinite firing sequence. The liveness of an NEG is defined as follows. D. Definition: Liveness of NEG An NEG is live if there exists a firing schedule such that every transition has an infinite firing sequence and the firing epochs satisfy the time window constraints. We explain the firing epochs of the transitions associated with a negative place. Let denote the th firing epoch of transition. It is known that for a positive place with input transition and output transition,, where is the number of tokens at place and is the token holding time at place [13]. The following lemma characterizes the relationship between the firing epochs of two transitions. Lemma 2: Suppose that there is a path from a transition to a transition in an NEG. for all, where and are the sum of marking counts and the sum of holding times of the places in the path, respectively. Proof: Suppose that the path passes sequentially the places,,, which may be positive or negative places. Let marking count and holding time. Then, for each, we have for all. By summing up the inequalities and canceling each two successive terms, we have the claimed inequality. Lemma 2 suggests that for a negative place with negative tokens and holding time, for all. Let be the set of all circuits in NEG. We let. Then, function is the upper hull of the collections of linear functions. Fig. 6 illustrates the function. An event graph is live if and only if every circuit has at least one token. An NEG is considered as an event graph with ad-

7 LEE AND PARK: EXTENDED EVENT GRAPH WITH NEGATIVE PLACES AND TOKENS 325 ditional time window constraints. We now present a necessary and sufficient condition for liveness of an NEG. For expositional convenience, we primarily examine the case that the embedded event graph is strongly connected. Theorem 3: Suppose that an NEG has a compatible marking and the embedded event graph of the NEG is strongly connected. Then, the NEG is live if and only if there exists a nonnegative real value such that. Proof: We prove each direction of the statement. ( ) Let the NEG be live. Then, we disprove the claimed liveness condition, that is, we suppose that it does not hold that for a nonnegative real value. This implies that a function for all nonnegative real-valued. It can be shown that is a convex function. Therefore,, where. is not unique, we take any one. The minimum of func- occurs at one or two of the constituent linear functions (see Fig. 6). We examine the cases When tion of such linear functions where the minimum point locates. 1) When the minimum point locates on linear function such that [see Fig. 6(a)], condition implies. Therefore, the inequality by Lemma 2 that reduces to. This is a contradiction. 2) When the minimum point occurs at the intersection of two linear functions [see Fig. 6(b)], such that and such that. Therefore, from condition, we have and. From Lemma 2, these two inequalities imply and for any positive integer, where and are transitions on circuits and, respectively. The former inequality can be written as. This implies that the asymptotic average cycle times of the two transitions and are different. This contradicts the assumption that the embedded event graph of the NEG is strongly connected because in a strongly connected event graph, the asymptotic average cycle times of the transitions should be identical [12]. This makes another contradiction. Since the assumption disproving the claimed liveness condition leads to contradictions, we prove the liveness condition that there exists a nonnegative real value of such that. ( ) Suppose that for a nonnegative real-valued. For each specific value of firing instance, we consider a directed graph of which node set is and each arc has length. We let be the starting time of node in the graph. From the assumption, for all circuit in, that is, the graph has no positive circuit (that is, a circuit that has a positive arc length sum). This implies that there exists a solution that satisfies. The solution is considered as a schedule for a specific cycle. The inequalities can be written as. Take a steady, infinite firing schedule that such Then, by substituting into the inequalities, we have. Since due to the steadiness, the inequalities are written as (4) Therefore, the steady infinite firing schedule satisfies all time constraints of the NEG. Consequently, the NEG has such a feasible infinite firing schedule and is live. The liveness condition of Theorem 3 also eliminates conventional deadlocks, which prevent further firing due to logical error. It is because the condition prevents a conventional null circuit that does not include any negative place but has zero marking count. The liveness condition of Theorem 3 applies to all circuits, elementary or composite. However, when we apply the liveness condition to a composite circuit, and should be evaluated by summing up those values for the constituent elementary circuits as explained in Remark 1. When each constituent elementary circuit satisfies the liveness condition, so does the composite circuit. When any elementary circuit does not satisfy the liveness condition, the condition is violated. Therefore, it suffices to check the liveness condition only for elementary circuits. We establish this fact as a corollary for clarification. In the sequel, we let a circuit indicate an elementary circuit unless it is specified to be composite. Corollary 4: Suppose that an NEG has a compatible marking and the embedded event graph of the NEG is strongly connected. Then, the NEG is live if and only if there exists a nonnegative real value of such that for every elementary circuit. Remark 4: (Comparison With the Parametric Longest Path Approach): Consider the parametric directed graph that is induced from an NEG. Theorem 3 suggests that the necessary and sufficient condition for the NEG to be live is that has no positive circuit for some nonnegative real value. We note that Levner and Kats [6] propose a similar condition for a scheduling problem with time window constraints, independently of the Petri net theory. They formulate the scheduling problem of finding a feasible schedule for a specific cycle as a parametric linear program with parameter. They claim that the directed graph associated with the linear program, which is similar to, should have no positive circuit in order to have a finite longest path length, which corresponds to a feasible cycle time. It is well known that such a PERT-like directed graph has a finite longest path if and only if the graph has no positive circuit (or equivalently negative circuit in a shortest path problem). It is interpreted that the feasibility condition corresponds to our liveness condition, however, the feasibility claim applies to only steady firing schedules such that. In other words, the feasibility condition does not claim about whether there exists a nonsteady schedule or not. We also note that Levner and Kats [6] propose a parametric longest path algorithm to find a feasible range of the cycle time (3)

8 326 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 for the scheduling problem, which is modeled as a longest path problem in a parametric directed graph. It is an extension of the parametric shortest path algorithm of Karp and Orlin [14] for the special case of the critical circuit ratio problem for a doubly weighted directed graph of which each arc has dual weights and the second weight is 0 or 1. Levner and Kats [6] allow an arc to have as the second weight, which is intended for modeling a time window constraint. This model corresponds to the special case of the NEG or that allows only one negative token at each negative place and only one positive token at each positive place. However, the NEG model generally allows more than one token at a negative place as well as at a positive place. Therefore, the liveness condition of Theorem 3 for such a special case of the NEG can be verified by the algorithm of Levner and Kats in a polynomial time. However, for the general NEG that allows more than one token at a negative place or a positive place, the algorithm does not work in a polynomial time in general. It works in a pseudo-polynomial time, where the complexity depends on the value of the marking counts. Therefore, for a general NEG, we expect that the Floyd-Warshall algorithm of [15] or some other matrix computation-based algorithms for computing the critical circuit ratio, which works in a polynomial-time slower than Karp and Orlin s or Levner and Kats s, would be extended for our purpose. Remark 5: (Comparison With PERT-Like Directed Graphs): As explained earlier, an NEG can be compared to a directed graph that allows an arc from to with a negative length, which models the maximum delay time on the activity for arc to. Similarly as a usual event graph, an NEG can be transformed into a directed graph with such negative arcs by removing the places between each two transitions and directly connecting them by arcs. Although such a directed graph with negative arcs also can model a discrete event system with time window constraints, it has some deficiencies. First, since it loses tokens or marking information, it cannot correctly capture precedence relations between different firing instances of the transitions, that is, the activities or events of different cycles. Therefore, the directed graph model can be used for a limited class of discrete event systems that have precedence relations between activities of the same cycle or the next adjacent cycle. The tokens or marking information significantly improve the modeling power. The issues are discussed in Seo and Lee [4]. Second, the directed graph model cannot capture the dynamic state transition behavior since it does not keep track of token and marking information. Such information is essential for analyzing the steady state behavior of the firing schedule or schedule patterns [4], [13], [16]. Nonetheless, a directed graph can be associated with an NEG and plays an important role for analyzing the steady state behavior of the NEG. Such use of directed graphs for analyzing steady state of event graphs can be found in [13], [16], and [17]. The use of directed graphs for analyzing steady states of the NEG should be further investigated. The liveness conditions of Theorem 3 or Corollary 4 can be written in another form. We let,, and indicate the sets of elementary circuits with a positive marking count, a circuit with a negative marking count, and a circuit with a zero marking count, respectively. We call each of such circuits, positive circuit, negative circuit, and zero circuit, respectively. We note that the definition of positive circuit here is different from that of positive circuit in the conventional directed graph. The former is based on the marking count while the latter is based on the arc length. Theorem 5: Suppose that an NEG has a compatible marking and the embedded event graph of the NEG is strongly connected. 1) When, the NEG is live if and only if every zero circuit, if any, has a nonpositive holding time sum, that is,. 2) When, the NEG is live if and only if every zero circuit, if any, has a nonpositive holding time sum and. Proof: From Corollary 4, the NEG is live if and only if there exists a nonnegative value such that for all. We verify the inequality. 1) Consider the case where. For any positive circuit, the inequality is written as since. This implies that. Since the embedded event graph is strongly connected, it has at least one circuit, which is also a positive circuit with a positive holding time sum. This ensures that, and hence that. For any positive circuit, there always exists a nonnegative real value that satisfies the liveness inequality. For any zero circuit, the inequality reduces to. Therefore, the inequality holds if and only if every zero circuit, if any, has a nonpositive holding time sum. 2) We now examine the case where. For any nonnegative circuit, from the claim of (i),, and every zero circuit, if any, has a nonpositive holding time sum. For any negative circuit, the inequality of the liveness condition leads to. This implies that. Therefore, for positive and negative circuits, the liveness inequality is written as. It implies that there exists a nonnegative real value that satisfies the inequality of the liveness condition if and only if. Consequently, the NEG is live if and only if every zero circuit, if any, has a nonpositive holding time sum and. Theorem 5 characterizes the liveness condition based on the elementary circuits and their marking counts. The liveness condition also prevents deadlocks as well as violation of the time constraints. Since, for all such that. Therefore, the second liveness condition of Theorem 5(ii),, ensures that negative circuits have negative holding time sums. Therefore, for liveness, nonpositive circuits should have nonpositive holding time sums. We also wish to characterize the implication of the feasible range of for which the liveness condition hold, that is,. In the next section, we will show that the feasible values of are the cycle times of the feasible firing schedules for the NEG, that is, the feasible range of is the range of feasible cycle times.

9 LEE AND PARK: EXTENDED EVENT GRAPH WITH NEGATIVE PLACES AND TOKENS 327 TABLE I CIRCUITS ANALYSIS Example 2: (Cluster Tool: Continued): For the NEG of the cluster tool example, all circuits are analyzed in Table I. The example has negative circuits. From Theorem 5(ii), we firstly examine zero circuits. have zero marking count but they always have negative holding time sums. For the circuits with zero marking count to have negative holding time sums, the following inequalities should be satisfied: The inequalities are simplified as follows: (5) For the second liveness condition of Theorem 5(ii), we examine the marking counts and holding time sum of the circuits. have negative marking counts and have positive marking counts. From the condition on their circuit ratios,,we have the following inequalities: In this example, all the inequalities of (6) are dominated by the one of inequalities of (5) or a linear combination of them. Therefore, the necessary and sufficient condition is the inequalities of (5). However, such dominance may not hold generally. We observe that the condition is equivalent to that of [8] which uses the necessary condition for liveness of a p-time Petri net and introduces an additional condition to ensure the sufficiency for liveness that each wafer s residency time at a PM should be identical. Although the p-time Petri net only provides a necessary condition for the liveness, the additional condition, which tends to make the firing schedule repeat an identical timing pattern, leads to a necessary and sufficient condition. Remark 6: (Comparison With p-time Petri Nets): Both an NEG and a p-time Petri net essentially model a discrete event system that has time window constraints. However, for modeling time window constraints, an NEG uses negative places and negative tokens while a p-time Petri net uses time intervals on token holding times at places for the time-constrained activities. The two representation methods are basically equivalent. However, an NEG can have negative places between any two transitions, which may not be adjacent. Therefore, a time window constraint can be enforced between any two events, which are not necessarily the start and completion of an activity. For instance, in the cluster tool example, a wafer unloaded from a loadlock, after completing all processing steps, should be returned into the loadlock within a specified time limit. (6)

10 328 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 Since such wafer flow time for which a wafer stays outside the loadlock includes waiting times on the robot arms, it may be required to limit the wafer flow time in order to reduce wafer contamination risk during the waiting times. Such a time constraint can be modeled by introducing a new negative place from to. The negative place restricts the wafer sojourn time outside the loadlock from to, not for the unloading activity at. Therefore, an NEG has more modeling power than a p-time Petri net. Furthermore, by Theorem 3, an NEG provides a necessary and sufficient condition on the schedulability while a p-time Petri net of Khansa et al. [7] provides only a necessary condition. Furthermore, an NEG characterizes the schedulability condition based on the circuits while a p-time Petri net provides a set of inequalities based on the synchronizing transitions. In fact, we verified from Example 2 that the first part of the schedulability condition from Theorem 3, that is, each nonpositive circuit should have a nonpositive holding time sum, is equivalent to the schedulability condition derived from a p-time Petri net. Therefore, it seems that the second part of our schedulability condition,, makes our liveness condition sufficient as well as necessary. respectively. Consider the identical firing instances of the transitions. Then, their firing epochs, for instance,, define a steady firing schedule since a steady firing schedule can be made by repeating the firing epoch pattern. With omitting the instance parameter, we let be the firing epoch of transition. Suppose that the cycle time is. Then, from Lemma 2, should satisfy the following inequalities: For a positive place, is the firing epoch of transition at the instance that is instances later than that of, where. For a negative place, is the firing epoch of transition at the instance that is instances earlier than that of, where. The inequality for a negative place enforces a time window constraint for the associated activity. We note that assumptions of Theorem 3 are also applied in this section. A steady firing schedule that minimizes the cycle time can be found by the following linear program. III. OPTIMAL STEADY SCHEDULES AND THE FEASIBLE CYCLE TIME RANGE Suppose that an NEG is live. A steady firing schedule defines a steady schedule for the modeled system, for instance, a steady activity schedule for a cluster tool, where each event or activity repeats by each constant time interval. In an automated manufacturing system, a steady schedule has several merits including predictable timing behavior, less work-in-progress, steadyproduction, etc[16],[17]. Foranautomatedmanufacturing system with time window constraints, the realized interval times of an activity for each cycle become constant in a steady schedule. Such a steady schedule is essential for meeting the time window constraints. In a nonsteady schedule, the realized start or completion times of activities tend to vary for each cycle, shorter and longer. Therefore, the system is more likely to violate the time window constraints. In the cluster tool example, the residency times for which the wafers wait for unloading within the PM chambers may vary from wafer to wafer, and hence it is highly likely to violate the time window constraints. For instance, the residency time at PM1 is the firing epoch of transition (unloading a processed wafer by a swap operation) (the firing epoch of transition (loading a wafer into PM1 and immediate starting processing) + wafer processing time at PM1 s chamber ( )). It is expected that the residency times are minimum in a steady schedule as compared with other schedules. Therefore, we are concerned with finding a steady feasible schedule and the minimum cycle time among the steady feasible schedules. We discuss a linear programming model for finding a feasible steady firing schedule that minimizes the cycle time. We let denote a doubly weighted version of such that each arc has the first weight and the second weight as defined by the holding time mapping function and the initial marking definition function, where is the set of real numbers. The decision variables are and s. The dual linear program is given below. The decision variables are s. The first constraint states that the flow into node should be balanced with the flow out from the node. Therefore, DLP1 is a linear program for a maximum reward network circulation problem in directed graph with an additional constraint that the weighted flow sum is 1. The reward for a unit flow in an arc is and the weight for such flow is. We note that there is one-to-one correspondence between the circuits of the NEG and directed graph. We therefore use the same terminology for circuits for the NEG and the directed graph, for instance, positive, negative, and zero circuits. DLP1 is very close to a linear program that finds the critical circuit ratio in [17], [18]. The only difference is that s are unrestricted and allowed to have negative values. In fact, if all s are nonnegative, DLP1 is identical to the linear program that finds the critical circuit ratio in a conventional directed graph. can be considered the flow value on arc. The set of arcs such that forms the set of circuits that have nonzero flows. Therefore, any feasible solution selects a set of circuits in graph.we note that the flow values of the arcs in a circuit is not necessarily identical. When a composite circuit is selected, more than one circuits share the arcs. Therefore, in order to make the flows

11 LEE AND PARK: EXTENDED EVENT GRAPH WITH NEGATIVE PLACES AND TOKENS 329 in each circuit feasible, the flow value of a shared arc should be the sum of the flow values of the circuits that share the arc. Therefore, by separating the flow on an arc shared by multiple elementary circuits into the flows of each of them, we can define the circuit flow along an elementary circuit. This interpretation coincides with Remark 1 that when we evaluate the holding time and the marking count of a composite circuit, those for a place in the circuit shared by the constituent circuits are multiplied times as many as the number of circuits that share the place. The set of arcs with optimal flow variables forms the set of critical circuits. Now, we discuss the implications of the negative values of in DLP1. Theorem 6: Suppose that an NEG has a compatible marking, the embedded event graph of the NEG is strongly connected, and the NEG is live. The minimum cycle time of steady firing schedules of the NEG, ( ), is. Proof: Suppose that a feasible solution of DLP1,, selects only nonpositive circuits in the associated directed graph, that is, for only for and for all other arcs. Then, since are nonnegative,, where is the circuit flow of. Therefore, such a solution is infeasible. Consequently, DLP1 does not select only nonpositive circuits. Since from the assumption the embedded event graph of the NEG is strongly connected, the NEG or equivalently has at least one positive circuit. Consider a feasible solution that selects a set of elementary circuits,. In order to select a negative circuit additionally, we also should select a positive circuit since the weighted flow sum should be maintained. Therefore, suppose that we additionally select a positive elementary circuit and a negative elementary circuit such that, where. Then, the objective function increment is However, since inequality in Theorem 5 implies that,. Therefore, DLP1 tends not to select a negative circuit. Since the NEG is live, as explained just after Theorem 5, for any zero circuit. Therefore, DLP1 need not to select any zero circuit. Therefore, DLP1 can optimize the objective function by selecting only positive circuits. The objective function is maximized by allocating more flows on the positive circuit that has the larger circuit ratio since the flow on such circuit makes higher contribution per unit flow. Therefore, in an optimal solution of DLP1, all flows are concentrated on a positive circuit with the maximum circuit ratio. The constraint on reduces to, where. Then, the objective function also reduces to. Consequently,. From Theorem 6, an optimal solution of DLP1 can include negative circuit if and only if it holds. However, from the objective function values point of view, this case is not different from the maximization problem with positive circuits only. Therefore, we can consider only the positive circuits to maximize the objective function. We wish to know whether the minimum cycle time of all steady feasible firing schedules in Theorem 6 is also the minimum cycle time for all feasible schedules. Theorem 7: Suppose that an NEG has a compatible marking, the embedded event graph of the NEG is strongly connected, and the NEG is live. Then, the minimum cycle time of all feasible firing schedules, steady or nonsteady, is. Further, the NEG has a steady firing schedule that has the minimum cycle time among all feasible firing schedules. Proof: By the complementary slackness relationship between LP1 and DLP1 [19], an optimal solution implies the corresponding inequality in LP1 should hold as the equality without any slack. Therefore, for of the arcs in a critical circuit in DLP1, the corresponding inequalities in LP1 hold tightly as the equalities. Consequently, the activities in a critical circuit have no time slack. Any delays in those activities increase the cycle time. Any schedule for the activities in a critical circuit cannot have the cycle time shorter than. Hence, any schedule, steady or nonsteady, cannot have the shorter cycle time than in Theorem 6. The theorem suggests that the minimum cycle time of an NEG is computed by examining the circuit ratios of only all positive circuits. The negative or zero circuits should not be included for computing the maximum circuit ratio as the minimum cycle time. Since a positive circuit may include negative places or tokens, the ratio is distinct from the conventional critical circuit ratio. The liveness condition of Theorem 3 also can be checked by DLP1 or LP1. Theorem 8: Suppose that an NEG has a compatible marking and the embedded event graph of the NEG is strongly connected. The NEG is live if and only if DLP1 has a finite optimal value (or equivalently LP1 has a finite optimal value ). Proof: ( ) Suppose that the NEG is live. From Theorem 7,. Since any positive circuit has,. ( ) Now, we prove this part by contraposition. Suppose that the NEG is not live. Then, from Corollary 4, there exists a circuit such that for all nonnegative real value. This implies that and. Since the embedded event graph is strongly connected, the NEG has a positive circuit with. 1) Suppose that. For any feasible solution of DLP1, we can increase the flows along and so that and and since and. Then, the weighted flow sum constraint still holds. The objective function increment is since and. We can arbitrarily increase flows and. Hence, the objec-

12 330 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 tive function value can increase indefinitely. Consequently, if the NEG is not live, does not have a finite optimal value. 2) We examine the case. In the case, for any feasible solution of DLP1, we can arbitrarily increase the flow along circuit,, since. Then, since, the objective function increases indefinitely. This completes the proof. Fig. 7. Steady schedule for the cluster tool. From Theorem 7, the lowerbound of the cycle times for the feasible firing schedules of a live NEG is.in a discrete event system with no time window constraint or a conventional event graph, an event can be delayed arbitrarily. It implies that the feasible cycle time has no upper bound. However, in a time constrained system or an NEG, a delayed event may violate a time constraint. Therefore, it is conjectured that each event can be delayed within some limit and hence the feasible cycle time has an upper bound. We wish to characterize the upper bound. To do this, we first present a linear program that finds a feasible steady schedule that has the maximum cycle time. By changing the objective function of LP1 from minimizing to maximizing, we have the linear program LP2. Its dual DLP2 is also obtained. In DLP2, the coefficients of in the constraints and the objective function are changed into and, respectively. DLP2 is a linear program for a minimum cost network circulation problem with a weighted flow sum constraint. Since the coefficients and the objective are reversed in DLP1, it can be seen that the roles of positive circuits and negative circuits in DLP1 are reversed in DLP2. Therefore, by similar reasoning as in Theorems 6 and 7, we have two corresponding results on the maximum cycle time. Theorem 9: Suppose that an NEG has a compatible marking, the embedded event graph of the NEG is strongly connected, and the NEG is live, the maximum cycle time of steady firing schedules, ( ), is. Theorem 10: Suppose that an NEG has a compatible marking, the embedded event graph of the NEG is strongly connected, and the NEG is live. Then, the maximum cycle time of all feasible firing schedules, steady or nonsteady, is. Further, the NEG has a steady firing schedule that has the maximum cycle time among all feasible firing schedules. Theorem 10 suggests that a schedule that is delayed to have cycle time longer than violates a time con- Fig. 8. NEG with a longer cycle time. straint. We can make a schedule with an arbitrary cycle time between and by delaying a schedule that is determined by LP1. Therefore, we finally establish the range of feasible cycle times of an NEG. Theorem 11: Suppose that an NEG has a compatible marking, the embedded event graph of the NEG is strongly connected, and the NEG is live. 1) When, the range of feasible cycle time is. 2) When, the range of feasible cycle time is. Example 3: (Cluster Tool: Continued): The NEG for the cluster tool example has no circuit that has a negative place and a positive marking count. Therefore, once the NEG is live, that is, there exists a feasible schedule that satisfies the time window constraints, there exists a steady schedule that has the cycle time that is identical to the minimum cycle time of the case where there is no time window constraint. In other words, in the example, the time window constraints do not increase the cycle time. They only determine the feasibility. Such unique scheduling characteristics of the cluster tool are identified by the analysis of the NEG model. A steady schedule quoted from [8], which is also obtained by LP1, is illustrated in Fig. 7. The boxes of the same shading indicate the operations for an identical wafer. in some boxes indicates the waiting time of a wafer at PM3 for the second step processing. The above example suggests that the time window constraints do not always increase the cycle time. However, the following example demonstrates the case where a time window constraint increases the cycle time. Example 4: (Cycle Time Increase): Consider an NEG in Fig. 8. The NEG is live. If there is no time window constraint, the minimum cycle time, i.e., the critical circuit ratio, is 8. However, when the time window constraint is introduced, a new circuit that has marking count 1 and passes a negative

13 LEE AND PARK: EXTENDED EVENT GRAPH WITH NEGATIVE PLACES AND TOKENS 331 Fig. 9. Gantt chart with a longer cycle time. Fig. 11. Gantt chart with a cycle time upperbound. Fig. 10. Circuit with a negative marking count and a negative holding time. place is generated. The arcs of the circuit are marked bold. Therefore, the minimum cycle time increases to 10. The schedule in Fig. 9 explains why the time window constraint increases the cycle time. Each box represents the token holding time at a place. The firing instances of each transition that are marked on its top clarify the timing relationship between the transitions and places in conjunction with the markings. The shaded box and the associated dotted arrows indicate the time window constraint. The activity of place would start earlier if the time window constraint was not enforced. If starts earlier, the time window constraint is violated. However, the negative place delays the activity appropriately so as to satisfy the time window constraint. The NEG in Fig. 8 has no circuit with a negative marking count and a negative holding time. The NEG is modified into the NEG in Fig. 10 by adding a negative place with holding time, that is, should fire within 16 time units once fires. The modified NEG has a circuit ( ), which has marking count and holding time. Therefore, the maximum feasible cycle time 11, which is greater than the minimum cycle time, that is, the maximum of the circuit ratios of the positively marked circuits. Fig. 11 shows a feasible firing schedule for the NEG. If the schedule is delayed, for instance, the th firing instance of is delayed by 2 time units, the schedule violates the time window constraint between the th instance of and the th instance of. If the time window between and is less than 15, that is, the holding time of is greater than, the circuit ratio of becomes less than 10, which is less than the minimum cycle time 10. Therefore, as suggested by Theorem 11, the schedule becomes infeasible. The schedule has the minimum cycle time 10. If the time window has size 14, the th firing of cannot start earlier to meet the time window constraint. In the case, there does not exist any feasible schedule as suggested by the second part of the liveness condition in Theorem 5. We add that the definition of a cycle in a firing schedule depends on the initial marking. A cycle may include different firing instances of the transitions. For instance, the th instance of and the th instance of belong to the same cycle since has a token in the initial marking. The interpretation of the instances of the transitions in a cycle depends on how the system is modeled. If has no token, we would have a different cycle definition. A steady schedule for a cycle that is obtained by LP1 also should be accordingly interpreted. It should be noticed that a Petri net or an event graph model explains only a state in steady work cycles after some transient period. The system behavior during the transient period cannot easily be captured by the net model. IV. CONCLUSION For modeling and analysis of systems with time window constraints, we have proposed NEGs that have negative places and tokens. The time window constraints are generalized for modeling a time limit between any two events. We have developed a theoretical framework for analyzing NEGs. The theory and framework of NEGs provide a unified and generalized framework for scheduling automated manufacturing systems with time window constraints including hoist-based production systems, robot cells, and cluster tools. The proposed methods of verifying the feasibility and finding a feasible schedule have been implemented as a computer program tool for the cluster tool engineers in industry. The engineers use the tool for verifying whether the engineered process times can have

14 332 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 2, NO. 4, OCTOBER 2005 feasible schedules, evaluating the cycle time, and determining a steady schedule and timings of the robot tasks. In an NEG, time window constraints are modeled by places and tokens although they are negative. One of the main merits of this approach is that an NEG can explain the dynamic state change of a time constrained system. Although we did not restrict the firing policy, we can consider a specific firing policy. For instance, we are interested in the firing schedules that fire the transitions as soon as possible while meeting the time constraints. We may examine the steady state schedule patterns of such schedules through a steady state analysis of the NEG and the way of implementing such schedules by token play of the NEG. We need to examine the case when the embedded event graph is not strongly connected. The NEG can be further generalized to allow positive tokens in negative places or vice-versa to model more general time constraints. It is expected that the notions of negative places and tokens can be extended for more general Petri nets other than event graphs, timed or untimed. Many known theoretical results on Petri nets or event graphs, including reachability analysis, structural properties, and steady state analysis could be extended for the generalized nets. The idea of negative places and tokens for modeling time window constraints also could be extended for the cases where time window constraints or activity times are fuzzy. It is expected that fuzzy Petri nets are able to accommodate fuzzy or nonfuzzy time window constraints using negative places and tokens since in the NEG, the time window constraints as well as conventional time precedence relations are all modeled in the unified fundamental framework of places and tokens. REFERENCES [1] Y.-H. Shin, T.-E. Lee, J.-H. Kim, and H.-Y. Lee, Modeling and implementing a real-time scheduler for dual-armed cluster tools, Comput. Ind., vol. 45, no. 1, pp , [2] H. Chen, C. Chu, and J.-M. Proth, Cyclic scheduling of a hoist with time window constraints, IEEE Trans. Robot. Autom., vol. 14, no. 1, pp , Feb [3] L. Lei and Q. Liu, Optimal cyclic scheduling of a robotic processing line with two-product and time-window constraints, INFOR, vol. 39, no. 2, pp , [4] J.-W. Seo and T.-E. Lee, Steady state analysis and scheduling of cyclic job shops with overtaking, Int. J. Flex. Manuf. Syst., vol. 14, no. 4, pp , [5] E. V. Levner and A. S. Nemirovsky, A network flow algorithm for just-in-time project scheduling, Eur. J. Oper. Res., vol. 79, no. 2, pp , [6] E. V. Levner and V. Kats, A parametric critial path problem and an application for cyclic scheduling, Discr. Appl. Math., vol. 87, no. 1, pp , [7] W. Khansa, P. Aygalinc, and J.-P. Denat, Structural analysis of p-time Petri nets, in Proc. CESA 96, Jul. 1996, pp [8] J.-H. Kim, T.-E. Lee, H.-Y. Lee, and D.-B. Park, Scheduling analysis of time-constrained dual-armed cluster tools, IEEE Trans. Semicond. Manuf., vol. 16, pp , [9] W. M. P. van der Aalst, Interval timed colored Petri net and their analysis, in Lecture Notes in Computer Science. New York: Springer- Verlag, 1993, pp [10] T. Murata and H. Yamaguchi, A Petri net with negative tokens and its application to automated reasoning, in Proc. 33rd Midwest Symp. Circuits and Systems, Calgary, QC, Canada, 1990, pp [11] T. Murata, Petri nets: Properties, analysis and applications, Proc. IEEE, vol. 77, no. 3, pp , Mar [12] J. Wang, Timed Petri Nets. Boston, MA: Kluwer, [13] F. L. Baccelli, G. Cohen, G. J. Olsder, and J.-P. Quadrat, Synchronization and Linearity. New York: Wiley, [14] R. M. Karp and J. B. Orlin, Parametric shortest path algorithms with an application to cyclic staffing, Discr. Appl. Math., vol. 3, no. 1, pp , [15] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin, Network Flows: Theory, Algorithms and Applications. Englewood Cliffs, NJ: Prentice-Hall, [16] T.-E. Lee, Stable earliest starting schedules for cyclic job shops: A linear system approach, Int. J. Flex. Manuf. Syst., vol. 12, no. 1, pp , [17] T.-E. Lee and M. E. Posner, Performance measures and schedules in periodic job shops, Oper. Res., vol. 45, no. 1, pp , [18] G. B. Danzig, W. O. Blattner, and M. R. Rao, Finding a cycle in a graph with minimum cost to time ratio with application to a ship routing problem, in Theory of Graphs, P. Rosenstiehl, Ed. New York: Gordon and Breach, 1966, pp [19] K. Murty, Linear and Combinatorial Programming. New York: Wiley, Tae-Eog Lee received the Ph.D. degree in industrial and systems engineering from The Ohio State University, Columbus, in He is a Professor in the Department of Industrial Engineering, Korea Advanced Institute of Science and Technology (KAIST), Daejon, Korea. His main research interests include modeling, scheduling, control, and control software architecture for discrete event systems with application to automated manufacturing systems, especially integrated equipment such as cluster tools for semiconductor manufacturing. Prof. Lee is the Managing Editor of the Industrial Engineering and Management System Journal and an associate editor of the IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING. Seong-Ho Park received the M.S. and Ph.D. degrees in industrial engineering from Korea Advanced Institute of Science and Technology (KAIST), Daejon, Korea, in 1998 and 2005, respectively. He is interested in modeling, scheduling, and control of discrete event systems, automated manufacturing systems with robots, and production planning.

THE OPEN ARCHITECTURE SCHEDULING SYSTEM FOR A SINGLE-ARMED CLUSTER TOOL WITH PM CLEANING OPERATIONS

THE OPEN ARCHITECTURE SCHEDULING SYSTEM FOR A SINGLE-ARMED CLUSTER TOOL WITH PM CLEANING OPERATIONS THE OPEN ARCHITECTURE SCHEDULING SYSTEM FOR A SINGLE-ARMED CLUSTER TOOL WITH PM CLEANING OPERATIONS Dong-Hyun Roh (a), Tae-Eog Lee (b) (a),(b) Department of Industrial & Systems Engineering Korea Advanced

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks

Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks 60 IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, VOL. 3, NO. 1, MARCH 2002 Adaptations of the A* Algorithm for the Computation of Fastest Paths in Deterministic Discrete-Time Dynamic Networks

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Job-shop scheduling with limited capacity buffers

Job-shop scheduling with limited capacity buffers Job-shop scheduling with limited capacity buffers Peter Brucker, Silvia Heitmann University of Osnabrück, Department of Mathematics/Informatics Albrechtstr. 28, D-49069 Osnabrück, Germany {peter,sheitman}@mathematik.uni-osnabrueck.de

More information

Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

More information

EXTREME POINTS AND AFFINE EQUIVALENCE

EXTREME POINTS AND AFFINE EQUIVALENCE EXTREME POINTS AND AFFINE EQUIVALENCE The purpose of this note is to use the notions of extreme points and affine transformations which are studied in the file affine-convex.pdf to prove that certain standard

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

MAXIMAL FLOW THROUGH A NETWORK

MAXIMAL FLOW THROUGH A NETWORK MAXIMAL FLOW THROUGH A NETWORK L. R. FORD, JR. AND D. R. FULKERSON Introduction. The problem discussed in this paper was formulated by T. Harris as follows: "Consider a rail network connecting two cities

More information

Matching Theory. Figure 1: Is this graph bipartite?

Matching Theory. Figure 1: Is this graph bipartite? Matching Theory 1 Introduction A matching M of a graph is a subset of E such that no two edges in M share a vertex; edges which have this property are called independent edges. A matching M is said to

More information

x ji = s i, i N, (1.1)

x ji = s i, i N, (1.1) Dual Ascent Methods. DUAL ASCENT In this chapter we focus on the minimum cost flow problem minimize subject to (i,j) A {j (i,j) A} a ij x ij x ij {j (j,i) A} (MCF) x ji = s i, i N, (.) b ij x ij c ij,

More information

Fig. 1. A schematic of a two-cluster tool [1].

Fig. 1. A schematic of a two-cluster tool [1]. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL 8, NO 1, JANUARY 2011 5 Optimal Scheduling of Multicluster Tools With Constant Robot Moving Times, Part I: Two-Cluster Analysis Wai Kin Victor

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

6. Lecture notes on matroid intersection

6. Lecture notes on matroid intersection Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans May 2, 2017 6. Lecture notes on matroid intersection One nice feature about matroids is that a simple greedy algorithm

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols The International Arab Journal of Information Technology, Vol. 5, No. 4, October 2008 381 Incompatibility Dimensions and Integration of Atomic Commit Protocols Yousef Al-Houmaily Department of Computer

More information

DISCRETE-event dynamic systems (DEDS) are dynamic

DISCRETE-event dynamic systems (DEDS) are dynamic IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 7, NO. 2, MARCH 1999 175 The Supervised Control of Discrete-Event Dynamic Systems François Charbonnier, Hassane Alla, and René David Abstract The supervisory

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

Topology and Topological Spaces

Topology and Topological Spaces Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

More information

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs

Discrete Applied Mathematics. A revision and extension of results on 4-regular, 4-connected, claw-free graphs Discrete Applied Mathematics 159 (2011) 1225 1230 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam A revision and extension of results

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.3 Direct Proof and Counterexample III: Divisibility Copyright Cengage Learning. All rights

More information

An Algorithm to Compute a Basis of Petri Net Invariants

An Algorithm to Compute a Basis of Petri Net Invariants An Algorithm to Compute a Basis of Petri Net Invariants S. Cayir and M. Ucer Electronics and Communication Department, Istanbul Technical University, Istanbul, Turkey cayirs@itu.edu.tr and murvet@ehb.itu.edu.tr

More information

CSE 417 Network Flows (pt 4) Min Cost Flows

CSE 417 Network Flows (pt 4) Min Cost Flows CSE 417 Network Flows (pt 4) Min Cost Flows Reminders > HW6 is due Monday Review of last three lectures > Defined the maximum flow problem find the feasible flow of maximum value flow is feasible if it

More information

Timed Petri Nets in Modeling and Analysis of Cluster Tools

Timed Petri Nets in Modeling and Analysis of Cluster Tools 562 IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION, VOL. 17, NO. 5, OCTOBER 2001 Timed Petri Nets in Modeling and Analysis of Cluster Tools Wlodek M. Zuberek Abstract Timed Petri nets are used as models

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Recognizing Interval Bigraphs by Forbidden Patterns

Recognizing Interval Bigraphs by Forbidden Patterns Recognizing Interval Bigraphs by Forbidden Patterns Arash Rafiey Simon Fraser University, Vancouver, Canada, and Indiana State University, IN, USA arashr@sfu.ca, arash.rafiey@indstate.edu Abstract Let

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

We show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C.

We show that the composite function h, h(x) = g(f(x)) is a reduction h: A m C. 219 Lemma J For all languages A, B, C the following hold i. A m A, (reflexive) ii. if A m B and B m C, then A m C, (transitive) iii. if A m B and B is Turing-recognizable, then so is A, and iv. if A m

More information

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi

CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I. Instructor: Shaddin Dughmi CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 14: Combinatorial Problems as Linear Programs I Instructor: Shaddin Dughmi Announcements Posted solutions to HW1 Today: Combinatorial problems

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

APETRI net (PN) (cf. [1] [3]) is said to be live if it is possible

APETRI net (PN) (cf. [1] [3]) is said to be live if it is possible IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 57, NO 2, FEBRUARY 2012 435 On the Existence of Supervisory Policies That Enforce Liveness in Partially Controlled Free-Choice Petri Nets R S Sreenivas, Senior

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Finding Strongly Connected Components

Finding Strongly Connected Components Yufei Tao ITEE University of Queensland We just can t get enough of the beautiful algorithm of DFS! In this lecture, we will use it to solve a problem finding strongly connected components that seems to

More information

AXIOMS FOR THE INTEGERS

AXIOMS FOR THE INTEGERS AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,

More information

A Reduction of Conway s Thrackle Conjecture

A Reduction of Conway s Thrackle Conjecture A Reduction of Conway s Thrackle Conjecture Wei Li, Karen Daniels, and Konstantin Rybnikov Department of Computer Science and Department of Mathematical Sciences University of Massachusetts, Lowell 01854

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

Outline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04

Outline. Petri nets. Introduction Examples Properties Analysis techniques. 1 EE249Fall04 Outline Petri nets Introduction Examples Properties Analysis techniques 1 Petri Nets (PNs) Model introduced by C.A. Petri in 1962 Ph.D. Thesis: Communication with Automata Applications: distributed computing,

More information

arxiv: v1 [math.ho] 7 Nov 2017

arxiv: v1 [math.ho] 7 Nov 2017 An Introduction to the Discharging Method HAOZE WU Davidson College 1 Introduction arxiv:1711.03004v1 [math.ho] 7 Nov 017 The discharging method is an important proof technique in structural graph theory.

More information

Lecture 20 : Trees DRAFT

Lecture 20 : Trees DRAFT CS/Math 240: Introduction to Discrete Mathematics 4/12/2011 Lecture 20 : Trees Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we discussed graphs. Today we continue this discussion,

More information

Basics of Graph Theory

Basics of Graph Theory Basics of Graph Theory 1 Basic notions A simple graph G = (V, E) consists of V, a nonempty set of vertices, and E, a set of unordered pairs of distinct elements of V called edges. Simple graphs have their

More information

Petri Nets. Robert A. McGuigan, Department of Mathematics, Westfield State

Petri Nets. Robert A. McGuigan, Department of Mathematics, Westfield State 24 Petri Nets Author: College. Robert A. McGuigan, Department of Mathematics, Westfield State Prerequisites: The prerequisites for this chapter are graphs and digraphs. See Sections 9.1, 9.2, and 10.1

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

Winning Positions in Simplicial Nim

Winning Positions in Simplicial Nim Winning Positions in Simplicial Nim David Horrocks Department of Mathematics and Statistics University of Prince Edward Island Charlottetown, Prince Edward Island, Canada, C1A 4P3 dhorrocks@upei.ca Submitted:

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

3186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays

3186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays 3186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 51, NO 9, SEPTEMBER 2005 Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays Tuvi Etzion, Fellow, IEEE, and Kenneth G Paterson, Member,

More information

INTERLEAVING codewords is an important method for

INTERLEAVING codewords is an important method for IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 597 Multicluster Interleaving on Paths Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving

More information

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions.

THREE LECTURES ON BASIC TOPOLOGY. 1. Basic notions. THREE LECTURES ON BASIC TOPOLOGY PHILIP FOTH 1. Basic notions. Let X be a set. To make a topological space out of X, one must specify a collection T of subsets of X, which are said to be open subsets of

More information

Basic Graph Theory with Applications to Economics

Basic Graph Theory with Applications to Economics Basic Graph Theory with Applications to Economics Debasis Mishra February, 0 What is a Graph? Let N = {,..., n} be a finite set. Let E be a collection of ordered or unordered pairs of distinct elements

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Network flows and Menger s theorem

Network flows and Menger s theorem Network flows and Menger s theorem Recall... Theorem (max flow, min cut strong duality). Let G be a network. The maximum value of a flow equals the minimum capacity of a cut. We prove this strong duality

More information

Lecture 5: Duality Theory

Lecture 5: Duality Theory Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane

More information

General properties of staircase and convex dual feasible functions

General properties of staircase and convex dual feasible functions General properties of staircase and convex dual feasible functions JÜRGEN RIETZ, CLÁUDIO ALVES, J. M. VALÉRIO de CARVALHO Centro de Investigação Algoritmi da Universidade do Minho, Escola de Engenharia

More information

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena

Material handling and Transportation in Logistics. Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Material handling and Transportation in Logistics Paolo Detti Dipartimento di Ingegneria dell Informazione e Scienze Matematiche Università di Siena Introduction to Graph Theory Graph Theory As Mathematical

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

On k-dimensional Balanced Binary Trees*

On k-dimensional Balanced Binary Trees* journal of computer and system sciences 52, 328348 (1996) article no. 0025 On k-dimensional Balanced Binary Trees* Vijay K. Vaishnavi Department of Computer Information Systems, Georgia State University,

More information

Lecture 6: Faces, Facets

Lecture 6: Faces, Facets IE 511: Integer Programming, Spring 2019 31 Jan, 2019 Lecturer: Karthik Chandrasekaran Lecture 6: Faces, Facets Scribe: Setareh Taki Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Solution for Homework set 3

Solution for Homework set 3 TTIC 300 and CMSC 37000 Algorithms Winter 07 Solution for Homework set 3 Question (0 points) We are given a directed graph G = (V, E), with two special vertices s and t, and non-negative integral capacities

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 52, NO 4, APRIL 2006 1425 Tradeoff Functions for Constrained Systems With Unconstrained Positions T Lei Poo, Member, IEEE, Panu Chaichanavong, Member, IEEE,

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis

Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Deadlock Avoidance For Flexible Manufacturing Systems With Choices Based On Digraph Circuit Analysis Wenle Zhang and Robert P. Judd School of Electrical Engineering and Computer Science Ohio University

More information

Introduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation

Introduction to Electronic Design Automation. Model of Computation. Model of Computation. Model of Computation Introduction to Electronic Design Automation Model of Computation Jie-Hong Roland Jiang 江介宏 Department of Electrical Engineering National Taiwan University Spring 03 Model of Computation In system design,

More information

Non-extendible finite polycycles

Non-extendible finite polycycles Izvestiya: Mathematics 70:3 1 18 Izvestiya RAN : Ser. Mat. 70:3 3 22 c 2006 RAS(DoM) and LMS DOI 10.1070/IM2006v170n01ABEH002301 Non-extendible finite polycycles M. Deza, S. V. Shpectorov, M. I. Shtogrin

More information

Progress Towards the Total Domination Game 3 4 -Conjecture

Progress Towards the Total Domination Game 3 4 -Conjecture Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa

More information

5.4 Pure Minimal Cost Flow

5.4 Pure Minimal Cost Flow Pure Minimal Cost Flow Problem. Pure Minimal Cost Flow Networks are especially convenient for modeling because of their simple nonmathematical structure that can be easily portrayed with a graph. This

More information

Adjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge.

Adjacent: Two distinct vertices u, v are adjacent if there is an edge with ends u, v. In this case we let uv denote such an edge. 1 Graph Basics What is a graph? Graph: a graph G consists of a set of vertices, denoted V (G), a set of edges, denoted E(G), and a relation called incidence so that each edge is incident with either one

More information

5 The Theory of the Simplex Method

5 The Theory of the Simplex Method 5 The Theory of the Simplex Method Chapter 4 introduced the basic mechanics of the simplex method. Now we shall delve a little more deeply into this algorithm by examining some of its underlying theory.

More information

5 MST and Greedy Algorithms

5 MST and Greedy Algorithms 5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

More information

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016 GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS ZOÉ HAMEL March 3, 2016 1. Introduction Let G = (V (G), E(G)) be a graph G (loops and multiple edges not allowed) on the set of vertices V (G) and the set

More information

An Eternal Domination Problem in Grids

An Eternal Domination Problem in Grids Theory and Applications of Graphs Volume Issue 1 Article 2 2017 An Eternal Domination Problem in Grids William Klostermeyer University of North Florida, klostermeyer@hotmail.com Margaret-Ellen Messinger

More information

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF

ELEMENTARY NUMBER THEORY AND METHODS OF PROOF CHAPTER 4 ELEMENTARY NUMBER THEORY AND METHODS OF PROOF Copyright Cengage Learning. All rights reserved. SECTION 4.2 Direct Proof and Counterexample II: Rational Numbers Copyright Cengage Learning. All

More information

Linear Ropelength Upper Bounds of Twist Knots. Michael Swearingin

Linear Ropelength Upper Bounds of Twist Knots. Michael Swearingin Linear Ropelength Upper Bounds of Twist Knots Michael Swearingin August 2010 California State University, San Bernardino Research Experience for Undergraduates 1 Abstract This paper provides an upper bound

More information

K 4,4 e Has No Finite Planar Cover

K 4,4 e Has No Finite Planar Cover K 4,4 e Has No Finite Planar Cover Petr Hliněný Dept. of Applied Mathematics, Charles University, Malostr. nám. 25, 118 00 Praha 1, Czech republic (E-mail: hlineny@kam.ms.mff.cuni.cz) February 9, 2005

More information

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model

More information

Fundamental Properties of Graphs

Fundamental Properties of Graphs Chapter three In many real-life situations we need to know how robust a graph that represents a certain network is, how edges or vertices can be removed without completely destroying the overall connectivity,

More information

{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs

{ 1} Definitions. 10. Extremal graph theory. Problem definition Paths and cycles Complete subgraphs Problem definition Paths and cycles Complete subgraphs 10. Extremal graph theory 10.1. Definitions Let us examine the following forbidden subgraph problems: At most how many edges are in a graph of order

More information

ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE**

ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** Chin. Ann. of Math. 23B:(2002),87-9. ON THE EMPTY CONVEX PARTITION OF A FINITE SET IN THE PLANE** XU Changqing* DING Ren* Abstract The authors discuss the partition of a finite set of points in the plane

More information

The Geodesic Integral on Medial Graphs

The Geodesic Integral on Medial Graphs The Geodesic Integral on Medial Graphs Kolya Malkin August 013 We define the geodesic integral defined on paths in the duals of medial graphs on surfaces and use it to study lens elimination and connection

More information

MOST attention in the literature of network codes has

MOST attention in the literature of network codes has 3862 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 8, AUGUST 2010 Efficient Network Code Design for Cyclic Networks Elona Erez, Member, IEEE, and Meir Feder, Fellow, IEEE Abstract This paper introduces

More information

T consists of finding an efficient implementation of access,

T consists of finding an efficient implementation of access, 968 IEEE TRANSACTIONS ON COMPUTERS, VOL. 38, NO. 7, JULY 1989 Multidimensional Balanced Binary Trees VIJAY K. VAISHNAVI A bstract-a new balanced multidimensional tree structure called a k-dimensional balanced

More information

Incompatibility Dimensions and Integration of Atomic Commit Protocols

Incompatibility Dimensions and Integration of Atomic Commit Protocols Preprint Incompatibility Dimensions and Integration of Atomic Protocols, Yousef J. Al-Houmaily, International Arab Journal of Information Technology, Vol. 5, No. 4, pp. 381-392, October 2008. Incompatibility

More information

On median graphs and median grid graphs

On median graphs and median grid graphs On median graphs and median grid graphs Sandi Klavžar 1 Department of Mathematics, PEF, University of Maribor, Koroška cesta 160, 2000 Maribor, Slovenia e-mail: sandi.klavzar@uni-lj.si Riste Škrekovski

More information

arxiv: v1 [math.co] 25 Sep 2015

arxiv: v1 [math.co] 25 Sep 2015 A BASIS FOR SLICING BIRKHOFF POLYTOPES TREVOR GLYNN arxiv:1509.07597v1 [math.co] 25 Sep 2015 Abstract. We present a change of basis that may allow more efficient calculation of the volumes of Birkhoff

More information

5 MST and Greedy Algorithms

5 MST and Greedy Algorithms 5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

Strongly connected: A directed graph is strongly connected if every pair of vertices are reachable from each other.

Strongly connected: A directed graph is strongly connected if every pair of vertices are reachable from each other. Directed Graph In a directed graph, each edge (u, v) has a direction u v. Thus (u, v) (v, u). Directed graph is useful to model many practical problems (such as one-way road in traffic network, and asymmetric

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

Linear Bilevel Programming With Upper Level Constraints Depending on the Lower Level Solution

Linear Bilevel Programming With Upper Level Constraints Depending on the Lower Level Solution Linear Bilevel Programming With Upper Level Constraints Depending on the Lower Level Solution Ayalew Getachew Mersha and Stephan Dempe October 17, 2005 Abstract Focus in the paper is on the definition

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

Advanced Operations Research Techniques IE316. Quiz 2 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 2 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 2 Review Dr. Ted Ralphs IE316 Quiz 2 Review 1 Reading for The Quiz Material covered in detail in lecture Bertsimas 4.1-4.5, 4.8, 5.1-5.5, 6.1-6.3 Material

More information

Multi-Cluster Interleaving on Paths and Cycles

Multi-Cluster Interleaving on Paths and Cycles Multi-Cluster Interleaving on Paths and Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving codewords is an important method not only for combatting burst-errors,

More information

A.1 Numbers, Sets and Arithmetic

A.1 Numbers, Sets and Arithmetic 522 APPENDIX A. MATHEMATICS FOUNDATIONS A.1 Numbers, Sets and Arithmetic Numbers started as a conceptual way to quantify count objects. Later, numbers were used to measure quantities that were extensive,

More information

Powered by TCPDF (

Powered by TCPDF ( Powered by TCPDF (www.tcpdf.org) Title ON HICKS' COMPOSITE COMMODITY THEOREM Sub Title Author 長名, 寛明 (OSANA, Hiroaki) Publisher Keio Economic Society, Keio University Publication year 1982 Jtitle Keio

More information