<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Refining Discovered Petri Nets by Sequencing Repetitive Components</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ernesto López-Mellado</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tonatiuh Tapia-Flores</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CINVESTAV Unidad Guadalajara. Av. del Bosque 1145. Col.</institution>
          <addr-line>El Bajío 45015 Zapopan</addr-line>
          ,
          <country country="MX">México</country>
        </aff>
      </contrib-group>
      <fpage>131</fpage>
      <lpage>138</lpage>
      <abstract>
        <p>The problem of refining a Petri net (PN) discovered from a single sequence S of events T generated by discrete event processes is addressed. The refinement aims to reduce a possible exceeding language in the discovered model. A technique that extends a t-invariant based discovery method is presented. Given a discovered PN and its set of minimal t-invariants Y, the technique analyses the execution of the t-components in S and determines a sequencing pattern SY that schedules the execution of t-components in the initial PN. Then, SY is used to discover a PN' that uses transitions in T and new places; PN' schedules representative transitions of each t-invariant in SY. The refined model is obtained by merging the representative transitions of both PN and PN' if the pattern is discovered. A first result coping with a subclass of safe PN in which each t-component has at least a transition not shared with any other component is reported.</p>
      </abstract>
      <kwd-group>
        <kwd>Discrete event process discovery</kwd>
        <kwd>Petri nets refinement</kwd>
        <kwd>Repetitive components</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Automated modelling of discrete event processes from external behaviour is
nowadays studied by numerous research groups along the two last decades. The main
motivation is to discover the current behaviour of unknown or ill known systems,
because the documentation is not updated or missing. The aim is to obtain models that
express clearly causal and concurrency relationships between the events generated by
the process. Petri nets have been mostly used to represent such models.</p>
      <p>
        Variations on this problem have been named differently in the research community.
Earlier methods were called language learning techniques, which aimed to build finite
automata, or grammars of languages from samples of accepted words [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. In
discrete manufacturing systems the problem is referred as process identification, in
which the purpose is to build finite automata or Petri nets from sequences of
inputoutput signals. In this field several approaches and methods have been proposed: the
incremental approach [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], and the integer programming based approach [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ].
      </p>
      <p>
        Input-output identification of automated production process is addressed in [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]; an
interpreted PN is obtained from a long single observation of input-output vectors.
Overviews of these methods are presented in [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] and [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        In the field of workflow management systems (WMS) the problem is named process
mining: discovery. Most of the proposals obtain Petri nets from a set of event traces
representing the system behaviour as process cases. A complete review of recent
works can be found in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        The work presented herein concerns to identification of discrete event processes, in
which the available data is a set of sequences of input-output vectors, which represent
the exchanged signals between a controller and a plant from the controller point of
view. The events, the number of places, and the number of transitions are not known a
priori. The proposed method yields a Petri net model including input functions and
outputs. The method is based on a two-phase strategy presented in a recent previous
work [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], in which the observable components of the labelled PN are first obtained,
and then the non-observable part is inferred.
      </p>
      <p>
        This paper focuses on the second phase in which a PN is obtained from a sequence S
of events (transitions) from a given alphabet T. More precisely, a method based on the
computation of the t-invariants [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] is extended; the proposed technique refines the
obtained PN by determining a sequencing pattern, given also as a PN’, that schedules
the execution of t-components in the initial PN.
      </p>
      <p>The paper contains a) an overview of the t-invariant based discovery method and b)
the repetitive component scheduling technique.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Context and background</title>
      <sec id="sec-2-1">
        <title>2.1 Input-Output identification</title>
        <p>
          The present paper follows the approach presented in [
          <xref ref-type="bibr" rid="ref11 ref7">7, 11</xref>
          ] for dealing with
inputoutput identification. The method processes off-line the I/O-sequence w captured
during the process operation and builds an interpreted PN (IPN) model that
reproduces w.
        </p>
        <p>Example 1. Consider a process handling 3 inputs (s, x, y) and 3 outputs (A, B, C),
from which the following I/O sequence is captured:
s ⎡0⎤⎡1⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤⎡1⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤⎡1⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤⎡1⎤⎡0⎤⎡0⎤⎡0⎤⎡0⎤
⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥
x ⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥
w = y ⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢1⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢0⎥⎥⎢⎢1⎥⎥⎢⎢0⎥⎥</p>
        <p>A ⎢0⎥⎢1⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥
B ⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢1⎥⎢1⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥⎢0⎥
⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥⎢ ⎥</p>
        <p>C ⎢⎣0⎥⎦⎢⎣0⎦⎥⎣⎢0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎣⎢0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣1⎦⎥⎢⎣1⎦⎥⎢⎣0⎦⎥⎣⎢0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎣⎢0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣0⎦⎥⎢⎣1⎦⎥⎢⎣1⎦⎥</p>
        <p>
          The construction of an interpreted Petri net (IPN) model from w is performed in
two stages. The first stage processes the sequence w and obtains the observable part of
the model consisting of components using observable places and transitions labelled
with output symbols and expressions of input symbols respectively (Fig. 1). This
determines the set of transitions T. A transition sequence S that corresponds to the
observed event sequence is also delivered. In the example S1=t1 t2 t3 t4 t1 t2 t5 t6 t1 t2 t3
t4 t1 t2 t5 t6 t1 is obtained. A simpler technique for this stage is proposed later in [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ].
        </p>
        <p>The second stage builds a PN model that is able to reproduce S with a reduced
excessive behaviour; furthermore, the number of nodes is small since only the necessary
places to represent the discovered structural constrains are added. The resulting PN
corresponds to the process’ internal behaviour represented by non observable places.
In the example the obtained PN showed in figure 2 reproduces S1 (thus w). Merging
this model with the observable model and eliminating implicit places (p11, p22, p33)
yields the final IPN model shown in figure 3.</p>
        <p>
          A technique that allows determining more complex behaviours, in particular
implicit dependencies, is proposed in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]; besides discovering the non observable PN
the technique delivers the t-invariant supports. In this example, the supports are
&lt;Y1&gt;={t1, t2, t3, t4} and &lt;Y2&gt;={t1, t2, t5, t6}; the t-components ||Yi|| can be clearly
distinguished in this example.
        </p>
        <p>
          In the present paper we are extending the method in [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] for obtaining a more
precise non observable IPN with respect to the observed sequence S.
        </p>
        <p>In Example 1, notice that the execution of S exhibit always the occurrence of
tcomponents in alternate way: SY=τ1τ2τ1τ2τ1τ2..., where τi is a sub-sequence of S
including transitions in &lt;Yi&gt;. However, in the model sub-sequences of repeated
components (τ1τ1τ1 ...τ2τ2) may occur, which is a kind of exceeding behaviour.</p>
        <p>A possible refining of the PN N of figure 3 to reduce this behaviour can be done by
adding a component that ensures the occurrence of the t-components. Being ρ(τ1)=t3
and ρ(τ1)=t5 the representative transitions of each component, it is easy to determine
that a circuit N’ including such transitions and new places can be added to the PN to
ensure the order of occurrence, as shown in figure 4. Next section describes this
metaanalysis technique.</p>
        <p>t1
p1
t2
s_1
A
ε
t3
P22</p>
      </sec>
      <sec id="sec-2-2">
        <title>2.2 Petri nets definitions and notation</title>
        <p>This section presents the basic concepts and notations of ordinary PN.</p>
        <p>Definition 1. An ordinary Petri Net structure G is a bipartite digraph represented
by the 4-tuple G = (P, T, I, O) where: P = {p1, p2, ..., p|P|} and T = {t1, t2, ..., t|T|} are
finite sets of vertices named places and transitions respectively; I(O) : P × T → {0,1}
is a function representing the arcs going from places to transitions (from transitions to
places). For any node x ∈ P∪T, •x = {y | I((y, x))=1}, and x• = {y | O((x, y)=1}.</p>
        <p>The incidence matrix of G is C = C+ − C−, where
C− = [cij−]; cij− = I(pi, tj); and C+ = [cij+]; cij+ = O(pi, tj) are the pre-incidence and
postincidence matrices respectively.</p>
        <p>A marking function M : P→ Z+ represents the number of tokens residing inside
each place; it is usually expressed as an |P|-entry vector. Z+ is the set of nonnegative
integers.</p>
        <p>Definition 2. A Petri Net system or Petri Net (PN) is the pair N = (G,M0), where G
is a PN structure and M0 is an initial marking.</p>
        <p>In a PN system, a transition tj is enabled at marking Mk if ∀pi ∈ P, Mk(pi) ≥ I(pi, tj);
an enabled transition tj can be fired reaching a new marking Mk+1, which can be
computed as Mk+1 = Mk + Cuk, where uk(i) = 0, i≠j, uk(j) = 1; this equation is called the PN
state equation. The reachability set of a PN is the set of all possible reachable
markings from M0 firing only enabled transitions; this set is denoted by R(G,M0).</p>
        <p>Definition 3. A PN system is 1-bounded or safe iff for any Mi ∈ R(G,M0) and any
p ∈ P, Mi(p) ≤ 1. A PN system is live iff for every reachable marking Mi ∈ R(G,M0)
and ∀t ∈ T there is a reachable marking Mk ∈ R(G, Mi) such that t is enabled in Mk.</p>
        <p>Definition 4. A t-invariant Yi of a PN is an integer solution to the equation CYi=0
such that Yi≥0 and Yi≠0. The support of Yi denoted as &lt;Yi&gt; is the set of transitions
whose corresponding entries in Yi are strictly positive. Y is minimal if its support is
not included in the support of other t-invariant. A t-component G(Yi) is a subnet of PN
induced by a &lt;Yi&gt;: G(Yi)=(Pi, Ti, Ii, Oi), where Pi =•&lt;Yi&gt;∪&lt;Yi&gt;•, Ti =&lt;Yi&gt;, Ii=
Pi×Ti∩I, and Oi=Pi×Ti∩O. G(Yi) is usually denoted as ||Yi||.</p>
        <p>In a t-invariant Yi, if we have initial marking (M0) that enables a ti ∈ &lt;Yi&gt;, when ti
is fired, then M0 can be reached again by firing only transitions in &lt;Yi&gt;.
3</p>
      </sec>
      <sec id="sec-2-3">
        <title>Sequencing repetitive components</title>
      </sec>
      <sec id="sec-2-4">
        <title>3.1. Problem statement</title>
        <p>
          Consider the t-invariant based discovery method, which treats a single sequence
S∈T* and delivers a safe PN N and a set of minimal t-invariant supports &lt;Y&gt;={&lt;Yi&gt;}
such that PN executes all the t-invariants Y [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. The refining technique has to find a
PN N’ using a set of transitions T’⊆ T and new places, such that the composed PN
N’’= N||N’ by merging transitions in T’ in both nets executes the t-components ||Yi|| in
the order they appear in S. This statement has been briefly introduced through
Example 1, where N and N’’ are illustrated in figures 2 and 4 respectively.
        </p>
      </sec>
      <sec id="sec-2-5">
        <title>3.2 Sequence of t-components</title>
        <p>A sequence SY of t-components execution can be determined by parsing S from the
first transition. Every component ||Yi|| can be identified when a given transition that
distinguishes the component is found or, in the worst case, the whole set &lt;Yi&gt; is
found during the tracking of S.</p>
      </sec>
      <sec id="sec-2-6">
        <title>3.2.1 Representative transitions</title>
        <p>Definition. The distinguishable transitions of a t-component ι(||Yi||)⊆&lt;Yi&gt; are the
transitions that only belong to this support. When such transitions are fired, we are
sure that a t-component is executed. ι(||Yi||)=&lt;Yi&gt;∩(⊗j&lt;Yj&gt;∀j).</p>
        <p>Notice that ι(||Yi||)=∅ when every tj ∈ &lt;Yi&gt; belongs also to other t-invariant
supports. Eventually, all the ι(||Yi||)=∅.</p>
        <p>Definition. The representative transition ρi of &lt;Yi&gt; is a tj∈&lt;Yi&gt; such that it
determines precisely the t-component is being executed is S. If ι(||Yi||)≠∅ then ρi is the
first transition in ι(||Yi||) that occurs in S; else, ρi is the last transition in &lt;Yi&gt; found in
the current subsequence tracked in S, then τi is determined.</p>
        <p>In Example 1, ι(||Y1||)={t3, t4} and ι(||Y2||)={t5, t6}; ρ1= t3 and ρ2=t5.</p>
        <p>Property 1. In a firing sequence S all the transitions of a t-component are fired
consecutively as a subsequence τi if there is no other nested t-components (τj, τk ...)
sharing transitions with τi. In case of nested t-components, part of τi is fired, then one
or several occurrences of τj may appear; afterwards some other transitions of τi are
fired, then other nested τk may occur and so on; finally, the remainder transitions of τi
are fired.</p>
        <p>Proof. In a repetitive execution of a PN if a t-invariant is executed, all the
transitions of the support must be fired. When a nested t-component is executed, then this
component will be executed (one or several times), and then the remaining transitions
of the first t-component will be fired.</p>
        <p>It is clear from S of Example 1 that all the transitions of &lt;Y1&gt; are fired first and
then those of &lt;Y2&gt;. Thus, it can be expressed as SY=τ1τ2τ1τ2τ1τ2...</p>
        <p>Example 2. The PN in Figure 5, discovered from S= t1 t2 t4 t2 t3 t1 t2 t4 t2 t3 t1 t2 t4 t2
t3..., has two supports: &lt;Y1&gt;={t1, t2, t3} and &lt;Y2&gt;={t2, t4}. ι(||Y1||)={t1, t3} and
ι(||Y2||)={t4}; ρ1= t1 and t3, and ρ2=t4. Then SY=τ11τ2τ12τ11τ2τ12..., which means that τ1
is split into two sub-sequences τ11 and τ12. Since ||Y2|| is a nested t-component, ρ11= t1
ρ12= t3</p>
        <p>When some ι(||Yi||)=∅, the transitions in &lt;Y1&gt; must be tracked during the parsing
of S until the last transition or the support is found; then τk is determined.</p>
      </sec>
      <sec id="sec-2-7">
        <title>3.2.2 Obtaining the Y-Sequence</title>
        <p>The sequence of t-components SY, thus Sρ can be obtained from S by considering
the representative transitions and the cardinality of the t-invariant support. A
procedure that parses S and delivers Sρ is decidable and yields always the same Sρ; the
outline of a simple procedure for the case in which all ι(||Yi||)≠∅, and there are not nested
t-invariants is given below.</p>
      </sec>
      <sec id="sec-2-8">
        <title>Algorithm1. Building SY</title>
        <p>Input: S, &lt;Y&gt; = {&lt;Y1&gt;,&lt;Y2&gt;,... &lt;YNY&gt;}
Output: Sρ
1. Determine ρ={ρ1, ρ2, ...ρNY} from S and &lt;Y&gt;
2. SY ← ε; k ← 1
3. Repeat
a. If S(k)∈ ρ, where S(k)= ρr
b. Then Sρ← Sρ•ρr; SY← SY•τr
c. Endif
4. k ← k+1
5. Until k&gt;|S|
6. Return Sρ</p>
        <p>The procedure for determining ρ must deal with the case in which some ι(||Yi||)=∅;
in the worst all the transitions in &lt;Yi&gt; must be tracked in S to determine uniquely the
t-component that is being executed. Furthermore, when there are nested
tcomponents, a stack can be used to parse the components execution, in particular
when there is nesting at several levels; in this case, regarding the t-component at
higher level ρr, several representative transitions ρr1, ρr2, ... could be determined to go
ahead the execution of the “interrupted” t-component. The structure of the discovered
PN can be also exploited.</p>
        <p>In Example 1, SY=τ1τ2τ1τ2τ1τ2... can be straightforward obtained by observing ρ1
and ρ2 in S=...t3...t5...t3...t5.... In Example 2 instead, one must consider two
representative transitions ρ11=t1 ρ12=t3 for one component; S = t1...t4...t3...t1...t4...t3..., thus
SY=τ11τ2τ12τ11τ2τ12... Finally, the sequence of representative transitions Sρ is derived.
In Examples 1 and 2 the sequences are Sρ=t3 t5 t3 t5... and Sρ=t1 t4 t3 t1... respectively.</p>
      </sec>
      <sec id="sec-2-9">
        <title>3.3 Repetitive patterns 3.3.1</title>
      </sec>
      <sec id="sec-2-10">
        <title>Simple patterns</title>
        <p>Now, the next stage is to determine from Sρ the repetitive pattern that schedules the
execution of the t-components. The problem is similar to that of process discovery but
some other facts must be considered.</p>
        <p>Consider a sequence S1=t1 t2 t3 t4 t1 t2 t5 t6 t1 t2 t5 t6 t1 t2 t3 t4 t1 t2 t5 t6 t1 t2 t5 t6 t1...
The invariant-based method discovers the same PN of Figure 2 and the same
tinvariants. Thus, the representative transitions are the same; however, the sequence of
representative transitions is not the same: Sρ=t3 t5 t5 t3 t5 t3...; in the pattern the
tcomponent ||Y1|| is executed once, whilst ||Y2|| twice. This cyclic pattern, which
establishes a production rate 1-2 for the jobs, is designed as a 2-bounded PN N’ that is
shown in Figure 8. For patterns that handle k jobs given by SY=(τ1)n(τ2)m...(τk)r(τ1)n...
with regular executions (fixed n, m, ..., r) of jobs, the PN can be designed similarly.</p>
        <p>Now, consider the discovered PN, which describes the behaviour of a process
involving three jobs. The t-invariant supports are: &lt;Y1&gt;= {t1, t2, t3}, &lt;Y2&gt;= {t1, t4, t5},
and &lt;Y1&gt;= {t1, t6, t7}; the representative transitions are: ρ1= t2, ρ2= t4, and ρ3= t6.
Bet4</p>
        <p>t2</p>
        <p>It is easy to see in Example 1 that the Sρ=t3 t5 t3 t5 corresponds to a pattern that can
be represented by a PN N’ that is a cycle p6 t3 p7 t5 p6 with p6 initially marked.
Similarly, in Example 2, the pattern N’ derived from Sρ=t1 t4 t3 t1 is a cycle including the
representative transitions; the merging of N’ with N is shown in Figure 6; when the
implicit place (marked) is removed, the simplified PN is shown in Figure 7. Notice
that in previous examples, the refined PNs have one t-component.
p1
sides consider that Sρ=t2 t4 t2 t6 t2 t4 t2 t6..., that is, τ1 is executed between the
alternation of τ2 and τ3. The PN N’ that describes this pattern is shown in Figure 10. Notice
that N’ has two invariants; thus, in a recursive manner, being t4 and t6 the
representative transitions of these t-components, N’’ can be obtained (Figure 11). The refined
PN is obtained by merging N with N’’; such a PN, shown in Figure 12 has only a
tinvariant.</p>
        <p>p4
t1
Fig. 8. Sequencing jobs rate
t3 p22 t4
p8
t4
t6</p>
        <p>p9
Fig. 11. Refining N’: N’’</p>
        <p>Fig. 12. The refined PN: N||N’’</p>
      </sec>
      <sec id="sec-2-11">
        <title>4 Remarks and challenges</title>
        <p>We have sketched a refining technique for PN discovered by a t-invariant method.
If the scheduling pattern can be determined, t-components relied by N’ become a
single t-component; thus, the refined PN has less exceeding behaviour than the first
discovered PN. In this meta-analysis of a discovered model, the patterns considered in
this short paper are found often in discrete manufacturing systems; however, the
strategy to discover more complex patterns is still being studied.</p>
        <p>Determining the patterns from SY is an interesting problem. In general, the
dependency of occurrence among the τi must be found; this pose a new discovery problem in
which, besides the order of execution of the τi in SY, the regularity of the repetitions of
τi must be established.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Gold</surname>
          </string-name>
          , “
          <article-title>Language identification in the limit”</article-title>
          ,
          <source>Information and Control</source>
          ,
          <volume>10</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>447</fpage>
          -
          <lpage>474</lpage>
          ,
          <year>1967</year>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Angluin</surname>
          </string-name>
          , “
          <article-title>Queries and Concept Learning”</article-title>
          ,
          <source>Machine Learning</source>
          , vol.
          <volume>2</volume>
          , pp.
          <fpage>319</fpage>
          -
          <lpage>342</lpage>
          ,
          <year>1988</year>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Meda-Campana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ramirez-Treviño</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and E.</given-names>
            <surname>Lopez-Mellado</surname>
          </string-name>
          , “
          <article-title>Asymptotic identification of discrete event systems”</article-title>
          ,
          <source>in Proc. of the 39th IEEE Conf. on Decision and Control</source>
          , pp.
          <fpage>2266</fpage>
          -
          <lpage>2271</lpage>
          ,
          <year>2000</year>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Meda-Campana</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Lopez-Mellado</surname>
          </string-name>
          , “
          <article-title>Identification of concurrent discrete event systems using Petri nets”</article-title>
          ,
          <source>in Proc. of the 17th IMACS World Congress on Computational and Applied Mathematics</source>
          , pp.
          <fpage>11</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2005</year>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.P.</given-names>
            <surname>Cabasino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Giua</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Seatzu</surname>
          </string-name>
          ,
          <article-title>"Identification of Petri nets from knowledge of their language,"</article-title>
          <source>Discrete Event Dynamic Systems</source>
          , Vol.
          <volume>17</volume>
          , No.
          <issue>4</issue>
          , pp.
          <fpage>447</fpage>
          -
          <lpage>474</lpage>
          ,
          <year>2007</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Dotoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. Pia</given-names>
            <surname>Fanti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Mangini</surname>
          </string-name>
          , and W. Ukovich, “
          <article-title>Identification of the unobservable behaviour of industrial automation systems by Petri nets”</article-title>
          ,
          <source>Control Engineering Practice</source>
          ,
          <volume>19</volume>
          (
          <issue>9</issue>
          ), pp.
          <fpage>958</fpage>
          -
          <lpage>966</lpage>
          ,
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Estrada-Vargas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lopez-Mellado</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.-J.</given-names>
            <surname>Lesage</surname>
          </string-name>
          , “
          <string-name>
            <given-names>A</given-names>
            <surname>Black-Box Identification Method for Automated Discrete-Event</surname>
          </string-name>
          <string-name>
            <surname>Systems</surname>
          </string-name>
          ,
          <source>” IEEE Transactions on Automation Science and Engineering, Early Access</source>
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          , DOI: 10.1109/TASE.
          <year>2015</year>
          .2445332
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>A.P.</given-names>
            <surname>Estrada-Vargas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Lopez-Mellado</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J.-J.</given-names>
            <surname>Lesage</surname>
          </string-name>
          , “
          <article-title>A comparative analysis of recent identification approaches for discrete event systems”</article-title>
          , Mathematical Problems in Engineering, vol.
          <year>2010</year>
          , 2010
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Cabasino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Darondeau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Fanti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Seatzu</surname>
          </string-name>
          , “
          <article-title>Model identification and synthesis of discrete-event systems”, Contemporary Issues in Systems Science</article-title>
          and Engineering, IEEE/Wiley Press Book Series 2013
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>W. Van der Aalst</surname>
          </string-name>
          , Process Mining: Discovery, “Conformance and Enhancement of Business Processes”, Berlin: Springer-Verlag,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>T.</given-names>
            <surname>Tapia-Flores</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>López-Mellado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. P.</given-names>
            <surname>Estrada-Vargas</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Lesage</surname>
          </string-name>
          , “
          <article-title>Discovering Petri Net Models of Discrete Event Processes by Computing T-invariants”</article-title>
          .
          <source>IEEE Transactions on Automation Science and Engineering</source>
          . May,
          <year>2017</year>
          DOI: 10.1109/TASE.
          <year>2017</year>
          .2682060
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Rodríguez-Pérez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tapia-Flores</surname>
          </string-name>
          , E. López-Mellado, “
          <article-title>Identification of Timed Discrete Event Processes. Building Input-Output Petri Net Models”</article-title>
          .
          <source>ATAED@Petri Nets/ACSD</source>
          <year>2016</year>
          :
          <fpage>153</fpage>
          -
          <lpage>167</lpage>
          . Torun, Poland, June 2016
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>