<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Refining Discovered Petri Nets by Sequencing Repetitive Components</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Ernesto</forename><surname>López-Mellado</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">CINVESTAV Unidad Guadalajara</orgName>
								<address>
									<addrLine>Av. del Bosque 1145. Col. El Bajío</addrLine>
									<postCode>45015</postCode>
									<settlement>Zapopan</settlement>
									<country key="MX">México</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Tonatiuh</forename><surname>Tapia-Flores</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">CINVESTAV Unidad Guadalajara</orgName>
								<address>
									<addrLine>Av. del Bosque 1145. Col. El Bajío</addrLine>
									<postCode>45015</postCode>
									<settlement>Zapopan</settlement>
									<country key="MX">México</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Refining Discovered Petri Nets by Sequencing Repetitive Components</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DC66E6E25EC931E9967AE959B71D3F96</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T00:52+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Discrete event process discovery</term>
					<term>Petri nets refinement</term>
					<term>Repetitive components</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The problem of refining a Petri net (PN) discovered from a single sequence S of events T generated by discrete event processes is addressed. The refinement aims to reduce a possible exceeding language in the discovered model. A technique that extends a t-invariant based discovery method is presented. Given a discovered PN and its set of minimal t-invariants Y, the technique analyses the execution of the t-components in S and determines a sequencing pattern S Y that schedules the execution of t-components in the initial PN. Then, S Y is used to discover a PN' that uses transitions in T and new places; PN' schedules representative transitions of each t-invariant in S Y . The refined model is obtained by merging the representative transitions of both PN and PN' if the pattern is discovered. A first result coping with a subclass of safe PN in which each t-component has at least a transition not shared with any other component is reported.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Automated modelling of discrete event processes from external behaviour is nowadays studied by numerous research groups along the two last decades. The main motivation is to discover the current behaviour of unknown or ill known systems, because the documentation is not updated or missing. The aim is to obtain models that express clearly causal and concurrency relationships between the events generated by the process. Petri nets have been mostly used to represent such models.</p><p>Variations on this problem have been named differently in the research community. Earlier methods were called language learning techniques, which aimed to build finite automata, or grammars of languages from samples of accepted words <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. In discrete manufacturing systems the problem is referred as process identification, in which the purpose is to build finite automata or Petri nets from sequences of inputoutput signals. In this field several approaches and methods have been proposed: the incremental approach <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>, and the integer programming based approach <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>.</p><p>Input-output identification of automated production process is addressed in <ref type="bibr" target="#b6">[7]</ref>; an interpreted PN is obtained from a long single observation of input-output vectors. Overviews of these methods are presented in <ref type="bibr" target="#b7">[8]</ref> and <ref type="bibr" target="#b8">[9]</ref>.</p><p>In the field of workflow management systems (WMS) the problem is named process mining: discovery. Most of the proposals obtain Petri nets from a set of event traces representing the system behaviour as process cases. A complete review of recent works can be found in <ref type="bibr" target="#b9">[10]</ref>.</p><p>The work presented herein concerns to identification of discrete event processes, in which the available data is a set of sequences of input-output vectors, which represent the exchanged signals between a controller and a plant from the controller point of view. The events, the number of places, and the number of transitions are not known a priori. The proposed method yields a Petri net model including input functions and outputs. The method is based on a two-phase strategy presented in a recent previous work <ref type="bibr" target="#b6">[7]</ref>, in which the observable components of the labelled PN are first obtained, and then the non-observable part is inferred.</p><p>This paper focuses on the second phase in which a PN is obtained from a sequence S of events (transitions) from a given alphabet T. More precisely, a method based on the computation of the t-invariants <ref type="bibr" target="#b10">[11]</ref> is extended; the proposed technique refines the obtained PN by determining a sequencing pattern, given also as a PN', that schedules the execution of t-components in the initial PN.</p><p>The paper contains a) an overview of the t-invariant based discovery method and b) the repetitive component scheduling technique.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Context and background</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Input-Output identification</head><p>The present paper follows the approach presented in <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b10">11]</ref> for dealing with inputoutput identification. The method processes off-line the I/O-sequence w captured during the process operation and builds an interpreted PN (IPN) model that reproduces w.</p><p>Example 1. Consider a process handling 3 inputs (s, x, y) and 3 outputs (A, B, C), from which the following I/O sequence is captured:</p><p>The construction of an interpreted Petri net (IPN) model from w is performed in two stages. The first stage processes the sequence w and obtains the observable part of the model consisting of components using observable places and transitions labelled with output symbols and expressions of input symbols respectively (Fig. <ref type="figure">1</ref>). This determines the set of transitions T. A transition sequence S that corresponds to the observed event sequence is also delivered. In the example S 1 =t 1 t 2 t 3 t 4 t 1 t 2 t 5 t 6 t 1 t 2 t 3 t 4 t 1 t 2 t 5 t 6 t 1 is obtained. A simpler technique for this stage is proposed later in <ref type="bibr" target="#b11">[12]</ref>.</p><p>The second stage builds a PN model that is able to reproduce S with a reduced excessive behaviour; furthermore, the number of nodes is small since only the necessary places to represent the discovered structural constrains are added. The resulting PN corresponds to the process' internal behaviour represented by non observable places. In the example the obtained PN showed in figure <ref type="figure">2</ref> reproduces S 1 (thus w). Merging A technique that allows determining more complex behaviours, in particular implicit dependencies, is proposed in <ref type="bibr" target="#b10">[11]</ref>; besides discovering the non observable PN the technique delivers the t-invariant supports. In this example, the supports are &lt;Y 1 &gt;={t 1 , t 2 , t 3 , t 4 } and &lt;Y 2 &gt;={t 1 , t 2 , t 5 , t 6 }; the t-components ||Y i || can be clearly distinguished in this example.</p><formula xml:id="formula_0">⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ⎤ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ ⎡ =</formula><p>In the present paper we are extending the method in <ref type="bibr" target="#b10">[11]</ref> for obtaining a more precise non observable IPN with respect to the observed sequence S.</p><p>In Example 1, notice that the execution of S exhibit always the occurrence of tcomponents in alternate way: S Y =τ 1 τ 2 τ 1 τ 2 τ 1 τ 2 ..., where τ i is a sub-sequence of S including transitions in &lt;Y i &gt;. However, in the model sub-sequences of repeated components (τ 1 τ 1 τ 1 ... τ 2 τ 2 ) may occur, which is a kind of exceeding behaviour.</p><p>A possible refining of the PN N of figure <ref type="figure">3</ref> to reduce this behaviour can be done by adding a component that ensures the occurrence of the t-components. Being ρ(τ 1 )=t 3 and ρ(τ 1 )=t 5 the representative transitions of each component, it is easy to determine that a circuit N' including such transitions and new places can be added to the PN to ensure the order of occurrence, as shown in figure <ref type="figure">4</ref>. Next section describes this metaanalysis technique.  <ref type="figure">(y, x</ref>))=1}, and</p><formula xml:id="formula_1">x • = {y | O((x, y)=1}. The incidence matrix of G is C = C + − C − , where C − = [c ij − ]; c ij − = I(p i , t j ); and C + = [c ij + ]; c ij + = O(p i , t j</formula><p>) are the pre-incidence and postincidence matrices respectively.</p><p>A marking function M : P→ Z + represents the number of tokens residing inside each place; it is usually expressed as an |P|-entry vector. Z + is the set of nonnegative integers.  Definition 2. A Petri Net system or Petri Net (PN) is the pair N = (G,M 0 ), where G is a PN structure and M 0 is an initial marking.</p><p>In a PN system, a transition t j is enabled at marking M k if ∀p i ∈ P, M k (p i ) ≥ I(p i , t j ); an enabled transition t j can be fired reaching a new marking M k+1 , which can be computed as M k+1 = M k + Cu k , where u k (i) = 0, i≠j, u k (j) = 1; this equation is called the PN state equation. The reachability set of a PN is the set of all possible reachable markings from M 0 firing only enabled transitions; this set is denoted by R(G,M 0 ). Definition 3. A PN system is 1-bounded or safe iff for any M i ∈ R(G,M 0 ) and any p ∈ P, M i (p) ≤ 1. A PN system is live iff for every reachable marking M i ∈ R(G,M 0 ) and ∀t ∈ T there is a reachable marking</p><formula xml:id="formula_2">M k ∈ R(G, M i ) such that t is enabled in M k .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Definition 4. A t-invariant Y i of a PN is an integer solution to the equation CY i =0</head><p>such that Y i ≥0 and Y i ≠0. The support of Y i denoted as &lt;Y i &gt; is the set of transitions whose corresponding entries in Y i are strictly positive. Y is minimal if its support is not included in the support of other t-invariant.</p><formula xml:id="formula_3">A t-component G(Y i ) is a subnet of PN induced by a &lt;Y i &gt;: G(Y i )=(P i , T i , I i , O i ), where P i = • &lt;Y i &gt;∪&lt;Y i &gt; • , T i =&lt;Y i &gt;, I i = P i ×T i ∩I, and O i =P i ×T i ∩O. G(Y i ) is usually denoted as ||Y i ||.</formula><p>In a t-invariant Y i , if we have initial marking (M 0 ) that enables a t i ∈ &lt;Y i &gt;, when t i is fired, then M 0 can be reached again by firing only transitions in &lt;Y i &gt;.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Sequencing repetitive components</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Problem statement</head><p>Consider the t-invariant based discovery method, which treats a single sequence S∈T* and delivers a safe PN N and a set of minimal t-invariant supports &lt;Y&gt;={&lt;Y i &gt;} such that PN executes all the t-invariants Y <ref type="bibr" target="#b10">[11]</ref>. The refining technique has to find a PN N' using a set of transitions T'⊆ T and new places, such that the composed PN N''= N||N' by merging transitions in T' in both nets executes the t-components ||Y i || in the order they appear in S. This statement has been briefly introduced through Example 1, where N and N'' are illustrated in figures 2 and 4 respectively.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Sequence of t-components</head><p>A sequence S Y of t-components execution can be determined by parsing S from the first transition. Every component ||Y i || can be identified when a given transition that distinguishes the component is found or, in the worst case, the whole set &lt;Y i &gt; is found during the tracking of S.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.1">Representative transitions</head><p>Definition. The distinguishable transitions of a t-component ι(||Y i ||)⊆&lt;Y i &gt; are the transitions that only belong to this support. When such transitions are fired, we are sure that a t-component is executed. ι(||Y i ||)=&lt;Y i &gt;∩(⊗ j &lt;Y j &gt;∀j). Notice that ι(||Y i ||)=∅ when every t j ∈ &lt;Y i &gt; belongs also to other t-invariant supports. Eventually, all the ι(||Y i ||)=∅.</p><p>Definition. The representative transition ρ i of &lt;Y i &gt; is a t j ∈&lt;Y i &gt; such that it determines precisely the t-component is being executed is S. If ι(||Y i ||)≠∅ then ρ i is the first transition in ι(||Y i ||) that occurs in S; else, ρ i is the last transition in &lt;Y i &gt; found in the current subsequence tracked in S, then τ i is determined.</p><p>In Example 1, ι(||Y 1 ||)={t 3 , t 4 } and ι(||Y 2 ||)={t 5 , t 6 }; ρ 1 = t 3 and ρ 2 =t 5 .</p><p>Property 1. In a firing sequence S all the transitions of a t-component are fired consecutively as a subsequence τ i if there is no other nested t-components (τ j , τ k ...) sharing transitions with τ i . In case of nested t-components, part of τ i is fired, then one or several occurrences of τ j may appear; afterwards some other transitions of τ i are fired, then other nested τ k may occur and so on; finally, the remainder transitions of τ i are fired.</p><p>Proof. In a repetitive execution of a PN if a t-invariant is executed, all the transitions of the support must be fired. When a nested t-component is executed, then this component will be executed (one or several times), and then the remaining transitions of the first t-component will be fired.</p><p>It is clear from S of Example 1 that all the transitions of &lt;Y 1 &gt; are fired first and then those of &lt;Y 2 &gt;. Thus, it can be expressed as S Y =τ 1 τ 2 τ 1 τ 2 τ 1 τ 2 ... Example 2. The PN in Figure <ref type="figure" target="#fig_4">5</ref> When some ι(||Y i ||)=∅, the transitions in &lt;Y 1 &gt; must be tracked during the parsing of S until the last transition or the support is found; then τ k is determined.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.2">Obtaining the Y-Sequence</head><p>The sequence of t-components S Y , thus S ρ can be obtained from S by considering the representative transitions and the cardinality of the t-invariant support. A procedure that parses S and delivers S ρ is decidable and yields always the same S ρ ; the outline of a simple procedure for the case in which all ι(||Y i ||)≠∅, and there are not nested t-invariants is given below. The procedure for determining ρ must deal with the case in which some ι(||Y i ||)=∅; in the worst all the transitions in &lt;Y i &gt; must be tracked in S to determine uniquely the t-component that is being executed. Furthermore, when there are nested tcomponents, a stack can be used to parse the components execution, in particular when there is nesting at several levels; in this case, regarding the t-component at higher level ρ r , several representative transitions ρ r1 , ρ r2 , ... could be determined to go ahead the execution of the "interrupted" t-component. The structure of the discovered PN can be also exploited.</p><p>In </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3">Repetitive patterns</head><p>Now, the next stage is to determine from S ρ the repetitive pattern that schedules the execution of the t-components. The problem is similar to that of process discovery but some other facts must be considered.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.1">Simple patterns</head><p>It is easy to see in Example 1 that the S ρ =t 3 t 5 t 3 t 5 corresponds to a pattern that can be represented by a PN N' that is a cycle p 6 t 3 p 7 t 5 p 6 with p 6 initially marked. Similarly, in Example 2, the pattern N' derived from S ρ =t 1 t 4 t 3 t 1 is a cycle including the representative transitions; the merging of N' with N is shown in Figure <ref type="figure">6</ref>; when the implicit place (marked) is removed, the simplified PN is shown in Figure <ref type="figure">7</ref>. Notice that in previous examples, the refined PNs have one t-component.   <ref type="figure">2</ref> and the same tinvariants. Thus, the representative transitions are the same; however, the sequence of representative transitions is not the same: S ρ =t 3 t 5 t 5 t 3 t 5 t 3 ...; in the pattern the tcomponent ||Y 1 || is executed once, whilst ||Y 2 || twice. This cyclic pattern, which establishes a production rate 1-2 for the jobs, is designed as a 2-bounded PN N' that is shown in Figure <ref type="figure">8</ref>. For patterns that handle k jobs given by S Y =(τ 1 ) n (τ 2 ) m ...(τ k ) r (τ 1 ) n ... with regular executions (fixed n, m, ..., r) of jobs, the PN can be designed similarly. Now, consider the discovered PN, which describes the behaviour of a process involving three jobs. The t-invariant supports are: &lt;Y 1 &gt;= {t 1 , t 2 , t 3 }, &lt;Y 2 &gt;= {t 1 , t 4 , t 5 }, and &lt;Y 1 &gt;= {t 1 , t 6 , t 7 }; the representative transitions are: ρ 1 = t 2 , ρ 2 = t 4 , and ρ 3 = t 6 . Be- .., that is, τ 1 is executed between the alternation of τ 2 and τ 3 . The PN N' that describes this pattern is shown in Figure <ref type="figure">10</ref>. Notice that N' has two invariants; thus, in a recursive manner, being t 4 and t 6 the representative transitions of these t-components, N'' can be obtained (Figure <ref type="figure" target="#fig_1">11</ref>). The refined PN is obtained by merging N with N''; such a PN, shown in Figure <ref type="figure">12</ref> has only a tinvariant. </p><formula xml:id="formula_4">p</formula></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head></head><label></label><figDesc>the observable model and eliminating implicit places (p 11 , p 22 , p 33 ) yields the final IPN model shown in figure 3.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .Definition 1 .</head><label>11</label><figDesc>Fig. 1. IPN fragments Fig. 2. Non-observable PN Fig. 3. Complete IPN Fig. 4. Scheduled t-components</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Algorithm1.</head><label></label><figDesc>Building S Y Input: S, &lt;Y&gt; = {&lt;Y 1 &gt;,&lt;Y 2 &gt;,... &lt;Y NY &gt;} Output: S ρ 1. Determine ρ={ρ 1, ρ 2 , ...ρ NY } from S and &lt;Y&gt; 2. S Y ← ε; k ← 1 3. Repeat a. If S(k)∈ ρ, where S(k)= ρ r b. Then S ρ ← S ρ •ρ r ; S Y ← S Y •τ r c. Endif 4. k ← k+1 5. Until k&gt;|S| 6. Return S ρ</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 .</head><label>5</label><figDesc>Figure 5. Nested cycles Figure 6. Sequenced t-components Figure 7. Simplified PN</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 8 .Fig. 11 .</head><label>811</label><figDesc>Fig. 8. Sequencing jobs rate Fig.9. Modelling three jobs: N Fig. 10. Sequencing ||Yi||</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>, discovered from S= t 1 t 2 t 4 t 2 t 3 t 1 t 2 t 4 t 2 t 3 t 1 t 2 t 4 t 2 t 3..., has two supports: &lt;Y 1 &gt;={t 1 , t 2 , t 3 } and &lt;Y 2 &gt;={t 2 , t 4 }. ι(||Y 1 ||)={t 1 , t 3 } and ι(||Y 2 ||)={t 4 }; ρ 1 = t 1 and t 3 , and ρ 2 =t 4 . Then S Y =τ 11 τ 2 τ 12 τ 11 τ 2 τ 12 ..., which means that τ 1 is split into two sub-sequences τ 11 and τ 12 . Since ||Y 2 || is a nested t-component, ρ 11 = t 1 ρ 12 = t 3</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>Example 1, S Y =τ 1 τ 2 τ 1 τ 2 τ 1 τ 2 ... can be straightforward obtained by observing ρ 1 and ρ 2 in S=...t 3 ...t 5 ...t 3 ...t 5 .... In Example 2 instead, one must consider two representative transitions ρ 11 =t 1 ρ 12 =t 3 for one component; S = t 1 ...t 4 ...t 3 ...t 1 ...t 4 ...t 3 ..., thus S Y =τ 11 τ 2 τ 12 τ 11 τ 2 τ 12 ... Finally, the sequence of representative transitions S ρ is derived. In Examples 1 and 2 the sequences are S ρ =t 3 t 5 t 3 t 5 ... and S ρ =t 1 t 4 t 3 t 1 ... respectively.</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>3.3.2 Other patterns Consider</head><label></label><figDesc>a sequence S 1 =t 1 t 2 t 3 t 4 t 1 t 2 t 5 t 6 t 1 t 2 t 5 t 6 t 1 t 2 t 3 t 4 t 1 t 2 t 5 t 6 t 1 t 2 t 5 t 6 t 1 ... The invariant-based method discovers the same PN of Figure</figDesc><table /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head></head><label></label><figDesc>sides consider that S ρ =t 2 t 4 t 2 t 6 t 2 t 4 t 2 t 6 .</figDesc><table><row><cell></cell><cell></cell><cell>t 4</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>t 4</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>t 4</cell><cell></cell><cell></cell><cell></cell></row><row><cell>p 1</cell><cell>t 1</cell><cell>2</cell><cell>t 2</cell><cell>p 3</cell><cell>t 3</cell><cell>p 1</cell><cell>t 1</cell><cell>p 2</cell><cell>t 2</cell><cell>p 3</cell><cell>t 3</cell><cell>p 1</cell><cell>t 1</cell><cell>2</cell><cell>t 2</cell><cell>p 3</cell><cell>t 3</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Remarks and challenges</head><p>We have sketched a refining technique for PN discovered by a t-invariant method. If the scheduling pattern can be determined, t-components relied by N' become a single t-component; thus, the refined PN has less exceeding behaviour than the first discovered PN. In this meta-analysis of a discovered model, the patterns considered in this short paper are found often in discrete manufacturing systems; however, the strategy to discover more complex patterns is still being studied. Determining the patterns from S Y is an interesting problem. In general, the dependency of occurrence among the τ i must be found; this pose a new discovery problem in which, besides the order of execution of the τ i in S Y , the regularity of the repetitions of τ i must be established.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Language identification in the limit</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">E</forename><surname>Gold</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information and Control</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="447" to="474" />
			<date type="published" when="1967">1967</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Queries and Concept Learning</title>
		<author>
			<persName><forename type="first">D</forename><surname>Angluin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Machine Learning</title>
				<imprint>
			<date type="published" when="1988">1988</date>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="319" to="342" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Asymptotic identification of discrete event systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Meda-Campana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ramirez-Treviño</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lopez-Mellado</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 39th IEEE Conf. on Decision and Control</title>
				<meeting>of the 39th IEEE Conf. on Decision and Control</meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
			<biblScope unit="page" from="2266" to="2271" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Identification of concurrent discrete event systems using Petri nets</title>
		<author>
			<persName><forename type="first">M</forename><surname>Meda-Campana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lopez-Mellado</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 17th IMACS World Congress on Computational and Applied Mathematics</title>
				<meeting>of the 17th IMACS World Congress on Computational and Applied Mathematics</meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="11" to="15" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Identification of Petri nets from knowledge of their language</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Cabasino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Giua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Seatzu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discrete Event Dynamic Systems</title>
		<imprint>
			<biblScope unit="volume">17</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="447" to="474" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Identification of the unobservable behaviour of industrial automation systems by Petri nets</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dotoli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Pia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">M</forename><surname>Fanti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Mangini</surname></persName>
		</author>
		<author>
			<persName><surname>Ukovich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Control Engineering Practice</title>
		<imprint>
			<biblScope unit="volume">19</biblScope>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="958" to="966" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">A Black-Box Identification Method for Automated Discrete-Event Systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Estrada-Vargas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lopez-Mellado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-J</forename><surname>Lesage</surname></persName>
		</author>
		<idno type="DOI">10.1109/TASE.2015.2445332</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Automation Science and Engineering, Early Access</title>
		<imprint>
			<biblScope unit="page" from="1" to="16" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A comparative analysis of recent identification approaches for discrete event systems</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Estrada-Vargas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lopez-Mellado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-J</forename><surname>Lesage</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Mathematical Problems in Engineering</title>
		<imprint>
			<biblScope unit="volume">2010</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Model identification and synthesis of discrete-event systems</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Cabasino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Darondeau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">P</forename><surname>Fanti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Seatzu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Contemporary Issues in Systems Science and Engineering</title>
				<imprint>
			<publisher>IEEE/Wiley Press</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">W</forename><surname>Van Der Aalst</surname></persName>
		</author>
		<title level="m">Conformance and Enhancement of Business Processes</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer-Verlag</publisher>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
	<note>Process Mining: Discovery</note>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Discovering Petri Net Models of Discrete Event Processes by Computing T-invariants</title>
		<author>
			<persName><forename type="first">T</forename><surname>Tapia-Flores</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>López-Mellado</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Estrada-Vargas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">J</forename><surname>Lesage</surname></persName>
		</author>
		<idno type="DOI">10.1109/TASE.2017.2682060</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Automation Science and Engineering</title>
		<imprint>
			<date type="published" when="2017-05">May, 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Identification of Timed Discrete Event Processes. Building Input-Output Petri Net Models</title>
		<author>
			<persName><forename type="first">E</forename><surname>Rodríguez-Pérez</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Tapia-Flores</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>López-Mellado</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ATAED@Petri Nets/ACSD 2016</title>
				<meeting><address><addrLine>Torun, Poland</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016-06">June 2016</date>
			<biblScope unit="page" from="153" to="167" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
