<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A General Approach for the Computation of a Liveness Enforcing Supervisor for the Petri Net Model of an FMS</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">M</forename><surname>Uzam</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Meliksah Universitesi Mühendislik-Mimarlık Fakültesi Elektrik-Elektronik Mühendisliği Bölümü</orgName>
								<address>
									<postCode>38280</postCode>
									<settlement>Talas, Kayseri</settlement>
									<country key="TR">Turkey</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
							<affiliation key="aff1">
								<orgName type="department" key="dep1">Faculty of Information Technology</orgName>
								<orgName type="department" key="dep2">School of Electro-Mechanical Engineering</orgName>
								<orgName type="institution">Macau University of Science and Technology</orgName>
								<address>
									<settlement>Taipa</settlement>
									<country>Macau</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Xidian University</orgName>
								<address>
									<addrLine>Xi&apos;an</addrLine>
									<postCode>710071</postCode>
									<settlement>Shaanxi</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">U</forename><forename type="middle">S</forename><surname>Abubakar</surname></persName>
							<affiliation key="aff3">
								<orgName type="institution">Meliksah Universitesi Mühendislik-Mimarlık Fakültesi Elektrik-Elektronik Mühendisliği Bölümü</orgName>
								<address>
									<postCode>38280</postCode>
									<settlement>Talas, Kayseri</settlement>
									<country key="TR">Turkey</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A General Approach for the Computation of a Liveness Enforcing Supervisor for the Petri Net Model of an FMS</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">5780F4015E37FC0729096D60834596C1</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Discrete Event Systems</term>
					<term>Petri Nets</term>
					<term>Flexible Manufacturing Systems</term>
					<term>Deadlock</term>
					<term>Liveness Enforcing</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In this paper, a general approach is proposed for the computation of a liveness enforcing supervisor for the Petri net model of a flexible manufacturing system (FMS) prone to deadlocks. The proposed method is applicable to a lot of PN classes. A global sink/source place (GP) is used temporarily in the design steps and is finally removed when the liveness of the system is achieved. The aim is to obtain an easy to design deadlock prevention policy for PN models of FMSs that ensures liveness with optimal or near optimal permissiveness while maintaining the necessary computations simple.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Flexible manufacturing systems (FMS) are widely used by manufacturers. In an FMS, in order to finish pre-established operations, different processes compete for the limited number of shared resources such as buffers, fixtures, robots, automated guided vehicles (AGV), and other material-handling devices. Thus, this competition may result in deadlocks, a highly undesirable situation in which some processes keep waiting indefinitely for the other processes to release resources. Recently, a lot of work has been done to deal with the deadlock problem in FMSs <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>.</p><p>Petri nets are widely used for the modeling of FMS due to their ability to easily detect the good behavior of a system like boundedness and deadlock-freeness <ref type="bibr" target="#b0">[1]</ref>. A live Petri net guarantees deadlock-free operations. There are mainly two Petri net analysis techniques used to deal with deadlock prevention in FMS: structural analysis and reachability graph (RG) analysis. The examples of using the former may be found in <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6]</ref> for different classes of FMS. The deadlock prevention control policy is obtained based on the characterization of the liveness in terms of Petri net items, i.e., siphons. The control policy can be implemented by adding control places (monitors) with initial marking and related arcs, to the initial Petri net model (PNM) of an FMS. In general the controlled model obtained in this case is suboptimal. The examples of using the latter may be found in <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b6">7,</ref><ref type="bibr" target="#b7">8,</ref><ref type="bibr" target="#b9">10]</ref>. In this case, the RG of a PNM is used to obtain the live system behavior. The problem with these methods is that for very big PNs the computation of the monitors becomes very difficult to carry out due to the "state explosion problem". To tackle this problem, a first-met-bad-marking (FBM) based computationally efficient method is proposed in <ref type="bibr" target="#b9">[10]</ref>. It was claimed in <ref type="bibr" target="#b8">[9]</ref> that deadlock prevention based on the divide-and-conquer strategy is computationally superior compared with the well-established traditional global-conquer techniques such as <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>. To develop a computationally efficient method of liveness-enforcing supervisors, the work in <ref type="bibr" target="#b10">[11]</ref> presents a divide-and-conquer strategy for the computation of liveness enforcing supervisors (LES) from submodels for a large scale net system. Although the divide-and-conquer strategy proposed in <ref type="bibr" target="#b10">[11]</ref> improves the traditional RG based methods proposed in <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>, it is necessary to deal with too many submodels when the number of shared resources is very big. Therefore the main purpose of this paper is to propose a general approach for the computation of a liveness enforcing supervisor for the Petri net model of an FMS without the necessity to divide a given PN model into its submodels. The proposed method is computationally efficient and provides optimal or near optimal permissive behavior for FMSs.</p><p>The rest of this paper is organized as follows. Some basic Petri net definitions used in this paper are briefly reviewed in Section 2. A general synthesis approach for liveness enforcement in Petri net models of FMS is proposed in section 3. An illustrative example is given in section 4, to show the applicability of the proposed method. Finally, some conclusions and directions for further research are provided in section 5.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Basics of Petri Nets</head><p>In this paper, Petri nets are used to model the flow of products in an FMS. Petri nets as a mathematical tool have a number of properties. When interpreted in the context of modeled manufacturing system, these properties allow one to identify the presence or absence of the functional properties of the system. In this section, some definitions and concepts which are related to this paper are briefly reviewed.</p><p>A Petri net is a five-tuple, PN = (P, T, F, W, M 0 ) where: P = {p 1 , p 2 , …, p m } is a finite set of places, where m &gt; 0; T = {t 1 , t 2 , …, t n } is a finite set of transitions, where n &gt; 0, with P  T   and P  T  ; F  ( P  T )  ( T  P ) is the set of all directed arcs, where P  T  N is the input function that defines the set of directed arcs from P to T, and T  P  N is the output function that defines the set of directed arcs from T to P, where N = {0, 1, 2, …} is a set of non-negative integers, W: F  N is the weight function. M 0 : P  N is the initial marking. The set of input (resp., output) transitions of a place p is denoted by  p (resp., p  ). Similarly, the set of input (resp., output) places of a transition t is denoted by  t (resp., t  ). A Petri net structure (P, T, F, W) without any specific initial marking is denoted by G. A Petri net with the given initial marking is denoted by (G, M 0 ). A transition t is said to be enabled or firable if each input place p   t is marked with at least w(p,t) tokens, where w(p,t) is the weight of the arc from p to t. A transition may fire if it is enabled. The firing of an enabled transition t removes w(p,t) tokens from each input place p   t, and adds w(t,p) tokens to each output place p  t  , where w(t,p) is the weight of the arc from t to p. This process is denoted by M [t &gt; M'. The marking M of a Petri net indicates the number of tokens in each place, which represents the current state of the modelled system. When a marking M' is reached from a marking M by firing a sequence of transitions  = t 0 t 1 t 2 …t k , this process is then denoted by M [ &gt; M'. The set of all reachable markings for a Petri net with initial marking M 0 is denoted by RM(G,M 0 ).</p><p>A pair of a place p and a transition t is called a self-loop if both p  t  and p   t hold. A Petri net is said to be pure if it has no self-loops. A Petri net is said to be ordinary if the weight of each arc is 1. A Petri net G is called k-bounded, or simply bounded if for every reachable marking M  RM(G,M 0 ), the number of tokens in any place p, p  P, is not greater than a finite number k, i.e.</p><formula xml:id="formula_0">M(p)  k. A place p is called k-bounded, if the number of tokens in it is not greater than k. A Petri net G is called safe, if it is 1-bounded. A 1-</formula><p>bounded place p is called a safe place. Places are frequently used to represent buffers, tools, pallets, and AGVs in manufacturing systems. Boundedness is used to identify the existence of overflows in the modelled system. When a place models an operation, its safeness guarantees that the controller will not attempt to initiate an on-going process. A transition t is said to be live if for any M  RM(G,M 0 ), there exists a sequence of transitions firable from M which contains t. A Petri net G is said to be live if all the transitions are live. A Petri net G contains a deadlock if there is a marking M  RM(G,M 0 ) at which no transition is enabled. Such a marking is called a dead marking. Deadlock situations are a result of inappropriate resource allocation policies or exhaustive use of some or all resources. Liveness of a Petri net means that for each marking M  RM(G,M 0 ) reachable from M 0 , it is finally possible to fire any transition t, t  T, in the Petri net through some firing sequence. This means that a live Petri net guarantees deadlock-free operations, no matter what firing sequence is chosen, i.e. if a Petri net is live, then it has no deadlock. A Petri net (G, M 0 ) is said to be reversible, if for each marking M  RM(G,M 0 ), M 0 is reachable from M. Thus, in a reversible net it is always possible to go back to initial marking (state) M 0 . Many systems are required to return from the failure states to the preceding correct states. Thus the reversibility property is important to manufacturing system error recovery. This property also guarantees cyclic behavior for all repetitive manufacturing systems. Moreover, if a net contains a deadlock, then it is not reversible. A marking M' is said to be a home state, if for each marking M  RM(G,M 0 ), M' is reachable from M. Reversibility is a special case of the home state property, i.e. if the home state M' = M 0 , then the net is reversible.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">A General Approach for Liveness Enforcing in Petri Net Models of FMS</head><p>In this section, a general method is proposed for the computation of a liveness enforcing supervisor for a given Petri net model (PNM) of an FMS prone to deadlocks. There are usually three groups of the places in a PNM of an FMS: resource places (P R ), activity places (P A ) and sink/source places (P S/S ). Resource places represent either shared or non-shared resources and initially there are tokens in these places representing the number of available resources. Activity places represent an action to process a part in a production sequence by a resource (machine, robot, etc.) and initially there are no tokens in these places. Initially, tokens deposited in sink/source places represent the maximal possible number of concurrent activities that can take place in a production sequence. In cyclic models a sink place is also a source place and vice versa.</p><p>The proposed method is applicable to a lot of Petri net classes currently available in the related literature. All computed monitors have ordinary arcs due to the proposed method. The algorithm provided below is used to compute the control places (monitors) based on the PNM. In the monitor computation steps of the proposed algorithm, a global sink/source place (GP) is used to make the necessary computation easily in an iterative way. The input transitions of the GP are input transitions of all sink/source places P S/S . Likewise output transitions of the GP are output transitions of all sink/source places P S/S . At each iteration, the reachability graph (RG) of the related net is computed. If the net is not live, then the RG is divided into a dead zone (DZ) and a live zone (LZ). The former may contain deadlock states (markings), and states which are inevitable lead to deadlocks or livelocks. The latter constitutes remaining good states of the RG representing the optimal system behavior. The control policy is based on the exclusion of the DZ from the RG, while making sure that every state within the LZ can still be reached. All states in the DZ are considered as bad markings (BM). From a BM, only the markings of activity places are considered. Then, the objective is to prevent the marking of the subset of the activity places of the BM from being reached. Therefore, the marking of the subset of the activity places is characterized as a place invariant (PI) of the PNM. In the PI relating to a BM, the sum of tokens within the subset of the activity places has to be at most one token less than their current value within the BM in order not to reach the BM. A PI can be implemented by a control place with its related arcs and initial marking. Here the simplified version <ref type="bibr" target="#b6">[7]</ref> of the method proposed in <ref type="bibr" target="#b12">[13]</ref> is used in order to obtain a control place (monitor) from a PI. The redundancy test of <ref type="bibr" target="#b11">[12]</ref> is adopted to find out if there are any redundant monitors within computed control places in the computation procedures. Finally, a live controlled Petri net is obtained by including all necessary control places in the PNM. Although not explained in the algorithm, in order to simplify big PNMs so as to make necessary computation easily as in <ref type="bibr" target="#b1">[2]</ref>, the Petri net reduction approach may be used. The reachability graph analysis of PNMs can be carried out by currently available Petri net analysis tools. In this work, INA <ref type="bibr" target="#b13">[14]</ref> is used. For a given PNM suffering from deadlocks (and/or livelocks) INA provides both LZ and DZ. The former is the first strongly connected component, and the latter is the strongly connected components other than the first one. In this work, the DZ is then considered as the collection of all bad markings (BM i , i= 1, 2, . . .).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm: Synthesis of Liveness Enforcing Supervisor for Petri Net Models</head><p>Input: A Petri net model (PNM) of an FMS prone to deadlocks Output: Liveness enforcing supervisor for the PNM</p><p>Step 1. Define input and output transitions of all sink/source places P S/S . Add a global sink/source place (GP) to the PNM. Thus a new net system denoted as N B = PNM + GP is obtained, where B  N = {1, 2, …}.</p><p>Step 2. for (B = 1; B ≤ K; B ++) /* B is the number of tokens in GP and K is the sum of initial tokens in all sink/source places P S/S */ { 2.B.4. If the number of monitors computed for N B is greater than 1, then carry out the redundancy test by using the method proposed in <ref type="bibr" target="#b4">[5]</ref> to find out the set of necessary monitors C B,i ; i = 1, 2, 3, . .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.B.5. Augment all necessary monitors computed in the previous step into N B (N</head><formula xml:id="formula_1">B : = N B + C B,i , i = 1, 2, 3, . . . ). }</formula><p>Step 3. Obtain a live controlled PNM by augmenting all necessary monitors computed in step 2 into the PNM.</p><p>Step 4. Exit end of Algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Illustrative Example</head><p>In order to show the applicability of the proposed synthesis approach, in this section an example is considered. Fig. <ref type="figure">1</ref> shows an L-S 3 PR net taken from <ref type="bibr" target="#b12">[13]</ref>. In this PNM there are eight activity places P A = {p2p5, p7p10}, four shared resource places P R = {p11p14}, and two sink/source (idle) places P S/S = {p1, p6}. The RG of this PNM contains 119 states, 27 of which are bad states. Then, the optimal solution should provide a live system behavior with 92 good states. Let us now apply the proposed method to this PNM. Step2.</p><p>Step 2.1.1. (B = 1). When one token is deposited in the GP, the net N 1 shown in Fig. <ref type="figure" target="#fig_1">3</ref> is obtained. The net N 1 is live with 7 good states. B:= B+1 = 2.</p><p>Step 2. The net N 2 is not live. There are 35 states within the RG 2 of N 2 . DZ 2 includes 1 bad state, i.e., BM 1 and LZ 2 contains 34 good states.</p><p>Step 2.2.2. The markings of the activity places of BM 1 are shown in Table <ref type="table">1</ref>.</p><p>Table <ref type="table">1</ref>. The markings of activity places of BM 1 .</p><p>State number p2 p3 p4 p5 p7 p8 p9 p10 s 18 0 0 0 1 0 0 1 0</p><p>In order not to reach BM 1 the place invariant PI 1 =  5 +  9  1 is established.</p><p>Step 2.2.3. In order to enforce PI 1 , monitor C 1 is computed as shown in Table <ref type="table">2</ref>.</p><p>Table <ref type="table">2</ref>. Computed monitor C 1 for PI 1 .</p><formula xml:id="formula_2">C i  C i C i   0 (C i ) C 1 t4, t9 t5, t8<label>1</label></formula><p>Step 2.2.4. There is no need for redundancy test as there is only one computed monitor.</p><p>Step 2.2.5. When C 1 is augmented in the uncontrolled model N 2 , the controlled N 2 is obtained as follows: N 2 := N 2 + C 1 and is shown in Fig. <ref type="figure" target="#fig_3">5</ref>. It is verified that the controlled model N 2 shown in Fig. <ref type="figure" target="#fig_3">5</ref> is live with 34 good states. This is the optimal live behavior for the controlled N 2 .</p><p>Step 2.3.1. (B:= B+1 = 3). The net N 3 , shown in Fig. <ref type="figure" target="#fig_4">6</ref>, is obtained by increasing the number of tokens in the GP within the controlled N 2 . The net N 3 is not live. There are 73 states within the RG 3 of N 3 . DZ 3 includes 3 bad states BM 1 , BM 2 and BM 3 , and LZ 3 contains 70 good states.</p><p>Step 2.3.2. The markings of the activity places of BM 2 , BM 3 and BM 4 are shown in Table <ref type="table">3</ref>.</p><p>Table <ref type="table">3</ref>. The markings of activity places of BM 2 , BM 3 and BM 4 .</p><p>State number p2 p3 p4 p5 p7 p8 p9 p10 s 17 0 2 0 0 1 0 0 0 s 43 0 0 1 0 0 2 0 0 s 44 0 0 0 1 0 2 0 0</p><p>In order not to reach BM 2 , BM 3 and BM 4 the following place invariants are established respectively: PI 2 = μ 3 + μ 7 ≤ 2, PI 3 = μ 4 + μ 8 ≤ 2, PI 4 = μ 5 + μ 8 ≤ 2.</p><p>Step 2.3.3. Monitors C 2 , C 3 and C 4 are computed in order to enforce PI 2 , PI 3 and PI 4 as shown in Table <ref type="table">4</ref>. Table <ref type="table">4</ref>. Computed monitors C 2 , C 3 and C 4 .</p><formula xml:id="formula_3">C i • C i C i •  0 (C i ) C 2 t2, t7 t3, t6 2 C 3 t3, t8 t4, t7 2 C 4 t4, t8 t5, t7<label>2</label></formula><p>Step 2.3.4. The redundancy test shows that computed monitors C 2 , C 3 and C 4 are all necessary.</p><p>Step 2. It is verified that the controlled model N 3 shown in Fig. <ref type="figure">7</ref> is live with 70 good states. This is the optimal live behavior for the controlled N 3 .</p><p>Step 2.4.1. (B:= B+1 = 4). The net N 4 , shown in Fig. <ref type="figure" target="#fig_6">8</ref>, is obtained by increasing the number of tokens in the GP within the controlled N 3 . The net N 4 is not live. There are 91 states within the RG 4 of N 4 . DZ 4 includes 3 bad states BM 5 , BM 6 and BM 7 and LZ 4 contains 88 good states.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C1</head><p>Step 2.4.2. The markings of the activity places of BM 5 , BM 6 and BM 7 are shown in Table <ref type="table">5</ref>.</p><p>Table <ref type="table">5</ref>. The markings of activity places of BM 5 , BM 6 and BM 7 .</p><p>State number p2 p3 p4 p5 p7 p8 p9 p10 s 41 0 1 0 1 1 1 0 0 s 42 0 1 1 0 1 1 0 0 s 83 0 0 1 1 1 1 0 0</p><p>In order not to reach BM 5 , BM 6 and BM 7 the following place invariants are established respectively: PI 5 =  3 +  5 +  7 +  8 ≤ 3, PI 6 =  3 +  4 +  7 +  8 ≤ 3, PI 7 =  4 +  5 +  7 +  8 ≤ 3.</p><p>Step 2.4.3. Monitors C 5 , C 6 and C 7 are computed in order to enforce PI 5 , PI 6 and PI 7 as shown in Table <ref type="table">6</ref>. Table <ref type="table">6</ref>. Computed monitors C 5 , C 6 and C 7 .</p><formula xml:id="formula_4">C i • C i C i •  0 (C i ) C 5 t2, t4, t8 t3, t5, t6 3 C 6 t2, t8 t4, t6 3 C 7 t3, t8 t5, t6<label>3</label></formula><p>Step 2.4.4. The redundancy test shows that computed monitors C 5 , C 6 and C 7 are all necessary.</p><p>Step 2. It is verified that the controlled model N 4 shown in Fig. <ref type="figure">9</ref> is live with 88 good states.</p><p>Step 2.5.1. (B:= B+1 = 5). The net N 5 , shown in Fig. <ref type="figure" target="#fig_8">10</ref>, is obtained by increasing the number of tokens in the GP within the controlled N 4 . The net N 5 is live with 92 good states. This is the optimal solution for both the N 5 and the original uncontrolled PNM.</p><p>Step 3. The live controlled PNM shown in Fig. <ref type="figure" target="#fig_9">11</ref> is obtained by augmenting seven monitors, computed in step 2 and provided in Table <ref type="table" target="#tab_1">7</ref>, into the uncontrolled model PNM shown in Fig. <ref type="figure">1</ref>. It is live with 92 good states. The liveness enforcing procedure applied for the PNM is provided in Table <ref type="table" target="#tab_2">8</ref>. In this table the last column shows the number of unreachable states. As the elements of this column are all zero this indicates that there are no good states lost due to included monitors.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>In this paper, a general method is proposed to obtain an optimal or a near optimal solution for the synthesis of liveness enforcing supervisors in flexible manufacturing systems modeled with Petri nets. The applicability of the proposed approach is shown by means of an example from the literature. The method is easy to use and provides very high behavioral permissiveness. The proposed method is applicable as is to a lot of Petri net classes currently available in the literature without modifications. Therefore further publications will be provided to show the applicability of the proposed method to different classes of Petri nets. Further research will also be conducted to improve the behavioral permissiveness of the proposed approach for generalized Petri net models such as S 4 R or S 4 PR.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 .Figure 2 .</head><label>12</label><figDesc>Figure 1. An L-S 3 PR net taken from [16].</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 .</head><label>3</label><figDesc>Figure 3. The net N 1 (B = 1).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 .</head><label>4</label><figDesc>Figure 4. The net N 2 (B = 2).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. The controlled N 2 (N 2 := N 2 + C 1 ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 6 .</head><label>6</label><figDesc>Figure 6. The net N 3 .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>3 . 5 .Figure 7 .</head><label>357</label><figDesc>Figure 7. The controlled N 3 (N 3 := N 3 + C 2 + C 3 + C 4 ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 8 .</head><label>8</label><figDesc>Figure 8. The net N 4 .</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>4 . 5 .Figure 9 .</head><label>459</label><figDesc>Figure 9. The controlled N 4 (N 4 := N 4 + C 5 + C 6 + C 7 ).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 10 .</head><label>10</label><figDesc>Figure 10. The net N 5 (B = 5).</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 11 .</head><label>11</label><figDesc>Figure 11. Optimally controlled live PNM.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>2.B.1. Compute the reachability graph RG B of N B . If N B is live, Then consider net N B with B:=B+1, i.e., go to step 2.B.1). Else define the LZ B and DZ B of RG B . 2.B.2. Define a PI for each bad marking (BM) within DZ B , from the subset of marked activity places of BM. 2.B.3. Compute a monitor C for each PI using the simplified invariant-based control method.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 7 .</head><label>7</label><figDesc>Monitors computed for the L-S 3 PR net.</figDesc><table><row><cell>C i</cell><cell>• C i</cell><cell>C i •</cell><cell> 0 (C i )</cell></row><row><cell cols="2">C 1 t4, t9</cell><cell>t5, t8</cell><cell>1</cell></row><row><cell cols="2">C 2 t2, t7</cell><cell>t3, t6</cell><cell>2</cell></row><row><cell cols="2">C 3 t3, t8</cell><cell>t4, t7</cell><cell>2</cell></row><row><cell cols="2">C 4 t4, t8</cell><cell>t5, t7</cell><cell>2</cell></row><row><cell cols="2">C 5 t2, t4, t8</cell><cell>t3, t5, t6</cell><cell>3</cell></row><row><cell cols="2">C 6 t2, t8</cell><cell>t4, t6</cell><cell>3</cell></row><row><cell cols="2">C 7 t3, t8</cell><cell>t5, t6</cell><cell>3</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 8 .</head><label>8</label><figDesc>Liveness enforcing procedure applied to the L-S 3 PR net.</figDesc><table><row><cell>B</cell><cell>included C</cell><cell>Is the net live?</cell><cell>RG</cell><cell># states in DZ</cell><cell>LZ</cell><cell>Computed monitor C</cell><cell cols="2"># states in the con-trolled PNM RG=LZ UR</cell></row><row><cell>1 -</cell><cell></cell><cell>Yes</cell><cell>9</cell><cell>-</cell><cell>9</cell><cell>-</cell><cell></cell></row><row><cell>2 -</cell><cell></cell><cell>No</cell><cell>35</cell><cell>1</cell><cell>34</cell><cell>C1</cell><cell>34</cell><cell>0</cell></row><row><cell cols="2">3 C1</cell><cell>No</cell><cell>73</cell><cell>3</cell><cell>70</cell><cell>C2, C3, C4</cell><cell>70</cell><cell>0</cell></row><row><cell cols="3">4 C1, …, C4 No</cell><cell>91</cell><cell>3</cell><cell>88</cell><cell>C5, C6, C7</cell><cell>88</cell><cell>0</cell></row><row><cell cols="3">5 C1, …, C7 Yes</cell><cell>92</cell><cell>0</cell><cell>92</cell><cell>-</cell><cell></cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgements</head><p>This work was supported by the research grant of the Scientific and Technological Research Council of Turkey (Türkiye Bilimsel ve Teknolojik Araştırma Kurumu) under the project number TÜBİTAK-112M229, and the Science and Technology Development Fund, MSAR, under Grant No. 066/2012/A2, and National Natural Science Foundation of China under Grant No. 61374068</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Deadlock control of automated manufacturing systems based on Petri nets_a literature review</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on System, Man, and Cybernetics, Part C; Applications and Reviews</title>
		<imprint>
			<biblScope unit="page" from="432" to="462" />
			<date type="published" when="2012-07">July 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A survey and comparison of Petri net-based deadlock prevention policies for flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">Q</forename><surname>Wu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Sys. Man and Cybern. Part C-Applications and Reviews</title>
		<imprint>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="173" to="188" />
			<date type="published" when="2008-03">March 2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A Petri net based deadlock prevention policy for flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">J</forename><surname>Ezpeleta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Colom</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Martinez</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Robot. Automat</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="173" to="184" />
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">An optimal deadlock prevention policy for flexible manufacturing systems using Petri net models with resources and the theory of regions</title>
		<author>
			<persName><forename type="first">M</forename><surname>Uzam</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Adv. Manuf. Tech</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="192" to="208" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Elementary siphons of petri nets and their application to deadlock prevention in flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Robot. Sys. Man and Cyber. Part A: Systems and Humans</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="38" to="51" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Siphon-based deadlock prevention policy for flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S</forename><surname>Huang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">D</forename><surname>Jeng</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><forename type="middle">L</forename><surname>Xie</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Sys. Man and Cybern. Part A-Systems and Humans</title>
		<imprint>
			<biblScope unit="volume">36</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1248" to="1256" />
			<date type="published" when="2006-11">November 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">An improved iterative synthesis method for liveness enforcing supervisors of flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Uzam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Int. J. Prod. Res</title>
		<imprint>
			<biblScope unit="volume">44</biblScope>
			<biblScope unit="issue">10</biblScope>
			<biblScope unit="page" from="1987" to="2030" />
			<date type="published" when="2006-05-15">15 May 2006</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">An iterative synthesis approach to Petri net based deadlock prevention policy for flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Uzam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Sys., Man and Cybern. -Part A: Systems and Humans</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="362" to="371" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A Divide-and-conquer strategy to deadlock prevention in flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Sys. Man and Cybern. Part C-Applications and Reviews</title>
		<imprint>
			<biblScope unit="volume">39</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="156" to="169" />
			<date type="published" when="2009-03">March 2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Design of a maximally permissive liveness-enforcing Petri net supervisor for flexible manufacturing systems</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">F</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Khalgui</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Mosbahi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. on Auto. Sci. and Eng</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="374" to="413" />
			<date type="published" when="2011-04-03">3 April 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">The computation of liveness enforcing supervisors from submodels of a Petri net model of FMSs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Uzam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Zakariyya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Gelen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE TENCON</title>
		<imprint>
			<biblScope unit="page" from="1" to="4" />
			<date type="published" when="2013-10-22">2013. October 22-25. 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Identification and elimination of redundant control places in Petri net based liveness enforcing supervisors of FMS</title>
		<author>
			<persName><forename type="first">M</forename><surname>Uzam</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">W</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">C</forename><surname>Zhou</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Int. J. of Adv. Manuf. Tech</title>
		<imprint>
			<biblScope unit="volume">35</biblScope>
			<biblScope unit="page" from="150" to="168" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Feedback control of petri nets based on place invariants</title>
		<author>
			<persName><forename type="first">K</forename><surname>Yamalidou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Moody</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lemmon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Antsaklis</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Automatica</title>
		<imprint>
			<biblScope unit="volume">32</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="15" to="28" />
			<date type="published" when="1996">1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><surname>Ina</surname></persName>
		</author>
		<ptr target="http://www.informatik.hu-berlin.de/~starke/ina.html" />
		<title level="m">Integrated Net Analyzer, a software tool for analysis of Petri nets</title>
				<imprint>
			<date type="published" when="2003">31. 2003</date>
			<biblScope unit="page">7</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
