<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Pheromone of Ant Emulated by Petri Net Inserted Inversely in RFID Database for Swarm Robots</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Marco Vinícius Muniz Ferreira</string-name>
          <email>marcomuniz@outlook.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>José Jean-Paul Zanlucchi de Souza Tavares</string-name>
          <email>jean.tavares@ufu.br</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>José R</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>o Silv</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Mechanical Engineering Faculty, Federal University of Uberlândia</institution>
          ,
          <country country="BR">Brazil</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Mechatronics Engineering Faculty, University of São Paulo</institution>
          ,
          <country country="BR">Brazil</country>
        </aff>
      </contrib-group>
      <fpage>143</fpage>
      <lpage>162</lpage>
      <abstract>
        <p>Swarm robotics has several challenge options to provide control management of social behavior to achieve specific goals. Bio-inspired approaches are on the top of the solutions that do not use artificial intelligence, - specially versions based on ant colony algorithms - where local information spread in the application environment is used instead of local centralized database. Such approach is specially suited to applications in digital manufacturing because of the high flexibility of this production environment. In this work is presented an alternative proposal that emulates pheromone trough RFID tags spread in the manufacturing environment with enhanced memory capacity. Advances in cost and complexity of this implementation would come out from an integrated system were robots emulate an ant colony which use pheromone represented by Petri net inserted inversely in an RFID distributed database called iPNRD. In the iPNRD approach, the environment receives only RFID tags, which stores a PN trigger vector, while the robots have a RFID reader, which provides their own PN incidence matrix and marking. During tag data capture the robot updates its marking vector. This article will show how iPNRD emulates the pheromone of ants, assuming the environment possesses embedded readers. To avoid robots' collision, the iPNRD solution assist two red/green semaphores: one in the feed source and another in pheromone area. That solution has lower complexity and the implementation has a relative low cost. The interaction between robots and environment and the resulting behavior are also modeled using Unified Extended Petri Nets where pseudo-boxes are used to represent the flow of communication concerning robots and environment.</p>
      </abstract>
      <kwd-group>
        <kwd>Swarm robots pheromone of ant iPNRD Net</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>RFID</p>
      <p>
        Petri
nizing robot’s actions and exchanging information among them. A bio-inspired
approach is suitable to model this information exchange either based on
centralized or distributed architectures. Petri Nets (PN) have been applied in this
context [
        <xref ref-type="bibr" rid="ref2 ref3">2, 3</xref>
        ].
      </p>
      <p>
        The behavior of an ant colony and the interactions of robots in a swarm are
both based on behavioral rules that only exploits local information [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Therefore,
the decisions on a swarm must be defined by local interactions using pheromone.
Originally, the pheromone flow of information is based in the synthesis of a
chemical substance by a living being (an ant for instance) that causes a specific
reaction in a receiving individual of the same specie [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This reaction can be a
behavior modification or a determination of physiologic state.
      </p>
      <p>
        There are different ways to represent the pheromone, each one with its
peculiarities. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] developed a heating trail based on a 70W lamp and a pyroelectric
sensor. One problem is that the electrical generation of heat is not possible,
even in bigger mobile robots, because of constrains in battery power. [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] applied
ethanol and alcohol sensor to emulate the ant pheromone. Although this is a
very realistic imitation of the pheromone-based trails of ants, the chemical
sensors used in this setup and the combination of robotics and substances have been
shown to be very unreliable and not very practical. [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] presented an approach
which emits ultraviolet light onto phosphorescent ink, but collision avoidance
between robots is not reliable. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] showed a digital pheromone via the
interaction between agents and radio frequency identification (RFID) tags. Each robot
receives two RFID readers and identify the original pheromone sources insider
RFID tags. The pheromone calculus is centralized inside the mobile robot.
Therefore, thus the ant pheromone in swarm mobile robots requires collision avoidance,
battery power constrains, practical implementation and independency between
the environment pheromone and mobile robots.
      </p>
      <p>
        Since the initial RFID application with the Walmart, in early 2000’s, much
attention has been pointed out to this technology. Current RFID market still
shows a lot of optimism and maybe overestimation in the success of this
technology. However, RFID implementation is below its potential because of the lack
of process information embedded together with automatic data gathering and
process [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. Indeed a RFID system also can be used as an internal position
system (RFID IPS) [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]
      </p>
      <p>
        Another application of RFID systems is in manufacturing and logistic
process where a Petri Net can model the product behavior. Elementary Petri Net
stored in RFID database (PNRD) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] provides a formal data structure to tagged
objects, which defines and introduces the process activity into a RFID disperse
database. In this way, the tag stores a Petri net (incident matrix and object
actual state), and readers have the control (marking) vector associated with the
reading activity and a conditioning sentence allowing the calculation of the The
tag updates its own state vector after the calculation.
      </p>
      <p>
        Since each tag refers to a single object, the PNRD must be a safe Petri net,
and the calculation of the next state must be a unimodular vector. There are also
some variants of PNRD: i) he PNRD extended to distance integrates PNRD with
RFID IPS to control mobile robots [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]; ii) the inverted PNRD (iPNRD) changes
what kind of information each RFID component stores, that is, the tag stores
the control vector and additional historical data and readers have the incident
matrix and object current state [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. The PNRD and variants approaches are able
to work offline and are able to determinate whether a process has been reaching
desirable state. Figure 1 presents Petri net and RFID integration through PNRD
or iPNRD. In both Petri net is able to model, control, deals with concurrency, and
provide several formal properties to support verification such as model checking
and invariant analysis. The RFID tag support automatic data capture returning
a unique identification, and can work as a position sensor. It is possible to read
up to 1000 tags per second, depending on RFID frequency. Whereas RFID can be
a dynamic distributed database is pointed out as a smart product cornerstone.
PNRD and iPNRD are Petri net and RFID intermediate, it means, as PNRD
is a formal data structure based on Petri net, it is able to distribute Petri net
components in order to update automatically Petri net state and to identify in
real time process exception in a net-work independent manner.
      </p>
      <p>
        Figure 1 presents Petri net and RFID integration through PNRD or iPNRD.
On one hand Petri net can model, control, deals with concurrency, process and
it has several formal properties as model checking and invariant analysis. RFID,
on the other hand is an automatic data capture tools with a unique
identification, and it can become a position sensor. It is possible to read up to 1000 tags
per second, depending on RFID frequency. Whereas RFID can be a dynamic
database it is pointed out as a smart product cornerstone [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. PNRD and
iPNRD are Petri net and RFID intermediate, it means, as PNRD is a formal data
structure based on Petri net, it can distribute Petri net components onto RFID
components in a distributed logic approach. The PN formal structure allows the
automatically state update, and the real-time process exception discovery.
      </p>
      <p>This paper aims to bring up how Petri net (PN) and RFID can be integrated
to emulate ant pheromone applied to robot swarms. To achieve this goal, it
is necessary to reach the requirements related to the ant pheromone in swarm
mobile robots, so the need of smarter environment is mandatory.</p>
      <p>In the next section additional related works on swarm robotics are presented
and the iPNRD is presented in section 3. The fourth section shows the system
proposal. Lastly, section 5 presents conclusions, followed by the acknowledgement
and the references.
2</p>
      <p>Related works in swarm robots and ant pheromone
One of the great challenges related to the swarm of robots lies in the control
algorithm and in the strategies of cooperation between them, without any
collision. There is a search for new models of behavior and innovations/enlargements
to those already studied.</p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], passive RFID tags spread out onto the floor can be used as
storage of the field information and the agents communicate with other agents
by updating a pheromone trail through the tags. In this approach the robot
stores information in the tags but this information is static and only the robot
manipulates it. In this paper the pheromone is logically independent of the robot
although the robot processes all pheromone calculus.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] treated the autonomous exploration of unknown environments with one
or multiple robots. The proposal was to evaluate robots’ ability to avoid obstacle
(labyrinth’s wall) and to avoid paths already covered by other robots. For this
18 laser distance sensors were installed to each robot to map the environment.
[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] simulated such a problem of robot displacement such that when an obstacle
was perceived a potential rotational field was applied to avoid collision between
the robots and the obstacle.
      </p>
      <p>
        In relation to the ant pheromone, RFID tags arranged in the environment
can works as pheromone carriers [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], and the pheromone map can be used to
guide robots’ motion without any localization system. In addition, the inverted
pheromone [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] works as a repulsive force between robots. In this scenario, the
inverted pheromone is used to spread the robots in the environment.
3
      </p>
      <p>
        iPNRD
According to [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] the PNRD is a RFID data structure based on the elementary
Petri Net formalism or Low-Level Petri Net (LLPN) and it can be described as
a five-tuple (P, T, A, w, M0). As PNRD has a 1:1 relation with each tag, and
PNRD must be a safe Petri net with at most one token in each place.
      </p>
      <p>In this approach each tag stores its own incidence matrix and state vector of
a Petri net referring to the process part to which the tagged object in question
participates; and each reader stores the corresponding control vector list and
the triggering conditions. The PNRD operation is based on the capture of the
tagId followed by the AT or incidence matrix, and the tag state vector MK . The
software responsible for calculating the next state finds the corresponding uK
(control vector) related to the conditioning set composed by tagId, tag state,
antennaId, readerId, and other optional additional data, such as time interval,
the distance among other. The calculation of the next tag state MK+1 follows
Eq. 1.</p>
      <p>MK+1 = MK + AT :uK ; k = 1::n
(1)</p>
      <p>
        The next tag state result must be evaluated. If the result is a unitary vector,
this means that the Petri net remains elementary and safe, which is consistent
with the fact that each tag has a 1: 1 relation with Petri Nets. This result is
supposed in agreement with the expected process flow, allowing the record of the
MK+1 in the tag memory as new tag state. Otherwise, the Petri net is no longer
safe, indicating an abnormality in the expected follow-up of the process, which
can generate a real-time warning signal. It can monitor the process of each tag
individually. Even flexible processes can be stored, giving to the tagged object
the ability to follow different paths if properly planned and modeled previously.
One of the possible problems during the execution is the appearance of conflicts.
Conflicts occur when the same antenna/reader is associated with more than one
transition relative to the same tagId, tag state, and additional data. A decision
algorithm can be applied to choose what transition should be triggered to solve
the conflict. Hence, PNRD is based on a previously modeled system, and it
can check whether the desirable model is followed or not. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] present a PNRD
didactic example.
      </p>
      <p>
        [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] show iPNRD approach as PNRD which each tag stores the control vector
and additional historical data and readers have the incident matrix and object
actual state; and it is applied on outlander search and rescue robots. It’s
important to highlight that the PNRD and iPNRD are the Petri net data structure
on RFID elements, that is, the insertion of places, arcs, transitions and marking
into readers and RFID tags.
      </p>
      <p>It is possible to point out that in both approaches there are a strong
connection between RFID and Petri Net, which reduces the need for queries in external
databases although there is a need to predefine the PN process in advance.
After this process modeling, an operational management system must attribute a
specific PN process and part (incident matrix, state vector or trigger vector) to
each tagged object and RFID reader.</p>
      <p>To summarize theses definitions, Tab. 1 presents the original PNRD and
iPNRD approaches with its variants. There are three different ways to distribute
Petri net elements between RFID reader and tag. This paper uses the original
iPNRD where the robot carries the RFID reader and the environment has the
passive tag.</p>
      <p>The approach of this work is the environment (world) with passive RFID
tags strategically spread in it and mobile robots have a RFID reader that reads
tag data when it passes through the tag, the tag information can change mobile
robots’ behavior, and the mobile robots can write new information inside the
tag. In this paper, tags represent the pheromone of ants, the energy source, and
semaphores to avoid collision during pheromone data capture. The iPNRD is
applied in this scenario, so the robots carry the incidence matrix and its own
marking while the tag carries the trigger vector. Since the ants (robots) are
homogeneous, the robots modeling and characteristics are the same for every
robot.
4</p>
    </sec>
    <sec id="sec-2">
      <title>System proposal</title>
      <p>
        The system’s bench (see Fig. 2) is based on [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] where there are two trails between
the source and the nest: trail A (shorter path) and trail B (longer path). It’s
expected that over time the robots choose the shorter trail and for this to be
possible, the pheromone tag must receive information from the robots and inform
the best trail. The source tag simulates an energy source and the robot consumes
energy stored in the tag to return to the nest.
      </p>
      <p>The robot moves in the bench following the Petri net presented in Fig. 3.
It can be noticed that each tag, spread in the environment, is considered as a
mobile robot transition and each place defines a set of actions that the mobile
robot must execute, such as place p2 (Robot waits green light ). In this specific
place the robot must stop on the tag, write its presence inside the tag, wait for
the environment reader to change the semaphore color from red to green, then
continuous to move to the next tag. As well as for the place p2 all places in the
mobile robots’ PN are considered as macro places where each place has a set of
specific actions.</p>
      <p>The transition pheromone tag, on the other hand, stores the more attractive
trail, following the ant pheromone algorithm which are going to be presented in
4.1 subsection, defining the trail to be followed.</p>
      <p>This mobile robots’ PN could be defined as finite automata, or as finite
state machine, or as sequential function chart (Grafcet), but since environmental
and pheromone modeling uses Petri Net the authors decided to standardize the
modeling. Also, as shown, the places modeled for the mobile robots indicate that
the actions of the robots, while the transitions are represented by the capture of
the tags. Thus, iPNRD can be applied to this case.
from pheromone area to source area following trail A. The tag S1 (transition
t4) indicates that the robot achieved the source area. Looking for trail B the
respective place and transition for the same situation are p10 and t11 (tag S2).</p>
      <p>It is possible to verify that if the mobile robot reads the tag N5, it means that
the pheromone calculus chose trail A. Otherwise, the mobile robot is going to
read the tag N6. During the source capture, another semaphore related with S1
and S2 tags works similarly to the nest one. After the source capture, the mobile
robot returns to the nest semaphore (N2 and N3 tags), it stores information to
next pheromone calculus and it enters in the nest when read N4 tag.</p>
      <p>Three important points must to be considered:
– How to avoid collision between the robots;
– How to synchronize the robot and the environment readers to read and write
the same tag and;
– How to define the direction to be taken from the robot to the source.</p>
      <p>To avoid collision the robots are going to follow a line tracking with sensors
and it must sense walls around itself. In each path there are two lines, so the
robot moves to the source in one line and returns to the nest in another one.
When the robot moves along trail A, it follows from the nest to a source close to
the outer wall and returns close to the inner wall, while at trail B is the opposite.
In the nest there is no collision between the robots as it follows a unique path
in the counterclockwise direction forming a FIFO (First In, First Out) queue.</p>
      <p>Even so, there are two points of concurrency that is necessary to be aware,
it means, during the reading of the source tag and the pheromone one. The
source tag can be reached from trail A and trail B, and the pheromone tag
can be reached when the robot wants to leave the nest and when it wants to
return from both trails. To avoid collision in these cases, there are two red/green
semaphores, which is detailed in section 4.2.
4.1</p>
      <sec id="sec-2-1">
        <title>Pheromone of ant</title>
        <p>
          Pheromone function as chemical messengers among individuals [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. In this paper,
the pheromone is emulated by iPNRD based on the interaction of environment
and mobile robots. A passive RFID tag stores information that the robot uses
to determinate its behavior, and the environment can change the RFID tag
information as required.
        </p>
        <p>As mobile robot and the environment can change the tag’s information, there
is a concurrency in communication if the robot RFID reader and the environment
RFID reader try to write or read the tag at the same time. Figure 4 presents
an example of RFID reading collision between the mobile robot and the
environment in the pheromone tag. There is a need of synchronization between the
robot RFID reader and the world RFID reader. This synchronization can be
implemented applying a time lag between the mobile robot clock the
environment clock. These clocks are activated on the rising edge and deactivated on
the falling edge. For this synchronization, the robot clock and the environment’s
clock are 180 degrees out of phase.</p>
        <p>Since the pheromone is a volatile substance and its concentration decreases in
time, the world can decrease pheromone value according to Eq. 2, where c_value
is the concentration value stored on the tag. This equation is proposed because
the pheromone value decreases inversely proportional to the concentration. Low
concentration takes lesser time to evaporate than high concentration.
(2)</p>
        <p>Figure 5 shows how the pheromone tag is going to work over time. Every
time a robot comes back from source tag, it increases the pheromone
concentration stored at pheromone tag with the power removed from the source. The
world’s reader decreases the pheromone concentration according to the Eq. 2,
and every time the pheromone tag is updated by the robot, the world’s reader
starts the equation from t = 0. This function is applied to both trails, and the
environmental reader stores the comparison of them to assist the mobile robot
trail definition.</p>
        <p>According to the amount of pheromone in each track a specific value will be
saved in the pheromone tag (00, 01 or 10). It is observed that until the time
T1 the amount of pheromone in the two trails are identical since no robot has
returned to the nest with food. In this case the value saved in the tag is 00 and
when a robot reads this information it decides at random which path to follow.
In the present case, a mobile robot has returned to trail A with which the value
of the pheromone concentration has increased and until the instant T2 this value
is higher than the pheromone concentration in the trail B, so the value saved in
the tag is 10 indicates that the robot must take this path when leaving the nest.
From T2 to T3 the saved value is 01 and indicates that the mobile robot must
follow the path B. From T3 to T4 the concentration of pheromone in track A is
higher than the concentration of pheromone in track B, then the value saved in
the tag is again 10. It is observed that at instants T2, T3 and T4 the amount of
pheromone in the two tracks is the same. With this the value saved in the tag
is 00 which indicates that the robot can follow any of the paths. In this work
when this situation happens the robot chooses to follow at random.</p>
        <p>Figure 5 presents 7 robots in the bench over timer. Robot 1 to 4 are
arriving the nest and robots 5 to 7 are leaving the nest. When the robot 1
reaches the pheromone tag it stores the information that it came from trail
A, so the pheromone concentration in trail A increases, and when robot 6 reads
the pheromone tag, it reads the value 01 and moves to source area following
trail A. Robots 2 and 3 reaches the pheromone tag and now the trail B has
more pheromone concentration. So, when robot 7 leaves the nest, it reads 10
and moves to source area following trail B.</p>
        <p>
          As presented in [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], pseudo-boxes are an observable condition that is not
controlled by the modeled system and could stand for control information
external to the hierarchical components. Thus, pseudo-boxes must be considered
in the structure of the net but should not affect its properties or the rank of
the incidence matrix. The pseudo-box is a form of messages’ exchange between
the agents in the system. Fig. 6 shows the environment RFID reader at the
pheromone tag PN, where this reader can perform three different readings (reads
empty, reads trail A and reads trail B transitions) or store three distinct
information (stores 00, stores 01, and stores 10 ). The reading occurs periodically (the
reads empty transition means that no robot stored any new information), and
when the robot is returning from the source, the robot stores the information
of what path was used (trail A or trail B) generating a pseudo-box (psPhe1 or
psPhe2 ) during the environment RFID reader data capture, depending on the
trail. These pseudo-boxes are sent to the pheromone algorithm function, which
calculates which trail is the most appropriate. If both trail have no pheromone,
the pheromone algorithm function sends 00 as message (psPhe3 ). If the trail A
has more pheromone than trail B the pheromone algorithm function sends the
message 01 (psPhe4 ), otherwise it sends 10 (psPhe5 ). In case of both trails have
the same value of pheromone, the message is 00 (psPhe3 ). The environment
RFID reader at pheromone tag recording occurs when it receives one of this 3
pseudo-boxes (psPhe3 to psPhe5 ). The Reader ready place has no conflict based
on the information it stores or reads on the pheromone RFID tag.
        </p>
        <p>Similarly, the robot RFID reader at the pheromone tag (see Fig. 7) can
perform three different readings (trail A; trail B; and without pheromone or
same amount on both trails) or store two distinct information (returned by trail
A or returned by trail B). Clearly the pheromone RFID tag stores the trigger
vector of both RFID readers.</p>
        <p>
          As can be seen, both PN have inhibitor arcs. These arcs mean that storage
has priority over reading. [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] has defined how to use a PN with inhibitor arcs
as a Logic Petri Net (LPN) and in this work, the inhibitor arcs are treated in
the microcontroller code. When the inhibitor arc is able, the transition can not
be triggered. So the inhibitor arc is a precondition to the transitions.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>Red/green semaphore</title>
        <p>To avoid collision over source and pheromone tags there are two semaphores in
this scenario, one in source area and the other one in pheromone area. The robot
can reach the source tag from two paths, so the source semaphore avoids robot
collisions using four tags. Two of these tags are the red/green semaphores and
makes the robot wait (if the source semaphore RFID tag store red as information)
or move (if the source semaphore RFID tag holds green as information), and the
other two tags just indicates when the robot has left the source area enabling
another robot to pass through the sourcing area.</p>
        <p>For the pheromone semaphore (semaphore 2) there are three paths (one to
leave the nest and two to reach the nest from each trail), so there is a need of
six tags. Three of these tags indicates when the robot has left the pheromone
area (N4 to N6) and the other three are the red/green semaphores (N1 to N3).
Fig. 8 presents how semaphore 2 is implemented physically.</p>
        <p>Table 3 presents the action sequence in the pheromone area during leaving
and arriving nest. Both are similar, except during stage 5 when the pheromone is
read (for the mobile robot leaving the nest) or the pheromone is stored (for the
mobile robot returning from a trail). The mobile robot and environment change
information through tag data capture and storage and tags are the media to
exchange this information.</p>
        <sec id="sec-2-2-1">
          <title>Action</title>
        </sec>
        <sec id="sec-2-2-2">
          <title>Robot</title>
          <p>When the mobile robot is leaving the nest, it reaches the semaphore tag N1
(Fig. 9), it stops, and stores it presence in the tag. Next, the environment RFID
reader at the N1 RFID tag perceives the robot presence, and it informs other
semaphore entrance readers (through Robot Leaving Nest pseudo-box) and if the
semaphore is free, it changes the semaphore color to green. After that, the robot
reads the green signal and moves to the pheromone tag. The environment sends
messages to other semaphore entrance readers indicating that the semaphore is
busy and changes the semaphore color to red.</p>
          <p>When the robot reaches the pheromone tag, it reads the trigger vector stored
at the tag (psPhe3 to psPhe5 ) which defines what trail must be followed. If
psPhe3 is read, it means that the pheromone in trail A has the same weight of
the pheromone in trail B, and then the mobile robot controller chooses randomly
what trail to follow. The psPhe4 and psPhe5 defines the trail. The robot moves
through the tag N5 if the pheromone indicated the trail A or through the tag N6
if the pheromone indicates the trail B. At this point, the robot stores its presence,
so the environment reader at the tag N5 or N6 can read this information and
inform other pheromone entrance RFID readers that the semaphore is free.</p>
          <p>The higher priority is at tag N2, since that tag indicates a robot returning
to nest from the shorter trail. The robot leaves the nest (tag N1) has the lowest
priority. Note that a token changes between SemaphoreFree and SemaphoreBusy,
so the mobile robot returning from source disable the semaphore and it’s kept
as red. The semaphore only turns free if a robot pass tags N4, N5 or N6, which
means, it has left the pheromone area, and other robot can pass through. The
places GreenN1, RedN1 and RobotLeavingNest are also pseudo-boxes since this
information must be exchanged with other pheromone RFID readers entrance.</p>
          <p>Fig. 9. Petri net for tag N1 in semaphore 2.</p>
          <p>The inhibitor arcs at WriteGreenN1 indicates that if there is a robot
returning to the nest, the robot leaving the nest must wait until that robot pass
through tag N4. Theses inhibitor arcs are defined at microcontroller code.</p>
          <p>The Petri net for tag N6 in semaphore 2 (see Fig. 10) has connection to
the Petri net for tag N1 through the pseudo-box RobotInTrailB. Since tag N6 is
only a tag that indicates the mobile robot has left the pheromone are, its net
just reads the tag and send a pseudo-box every time it senses the robot at this
position.
The paper presented how to integrate PN and RFID to emulate pheromone of
ants. The iPNRD approach was used to reach the ant pheromone in swarm
mobile robots requirements, it means, the iPNRD approach meets collision
avoidance, it doesn’t demand high battery power consumption, it has practical
implementation and, introducing smart environment with embedded RFID readers,
this approach generates independence between the environment pheromone and
mobile robots. This solution requires clock synchronization between smart
environment RFID readers and mobile robot readers.</p>
          <p>RFID Tag data capture and RFID tag storing as viewed as pseudo-box means
that they are message exchanging between both readers from environment and
mobile robots.</p>
          <p>The semaphore is a low-cost implementation due the cost of each reader being
under U$ 2.25 (price quoted on ebay). The system can use only one controller for
the entire semaphore, or each reader can have one controller attached. For this
to be possible, the controller must have a master-slave communication protocol.</p>
          <p>This approach shows that the pheromone is independent of the mobile robot,
since its concentration only depends on the value stored in the tag. But the robot
only can choose a path to follow if there is an information (trigger vector) stored
on pheromone’s tag.</p>
          <p>For further works an analysis of the hardware must be considered just like
the system implementation.</p>
          <p>Changes can be proposed on pheromone algorithm and source algorithm to
evaluate the robots’ behavior when there is a lack of energy stored in the source,
when the energy carried by the robot is variable, and when the pheromone
concentration decreases according to different equations.</p>
          <p>Also, it is possible to analyze the swarm behavior collectively or individually.
When the nest is a FIFO queue if one robot stops, all the system is going to fail,
but if the nest has an area to park each robot, when this robot stops the system
continuous to work with any problem.</p>
          <p>Lastly, a Petri net analyses must be considered regarding deadlocks, model
checking and invariants.
6</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgement</title>
      <p>CAPES, UNA and UFU supported this research.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Chaimowicz</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Campos</surname>
            ,
            <given-names>M.F.M.:</given-names>
          </string-name>
          <article-title>A paradigm for dynamic coordination of multiple robots</article-title>
          .
          <source>Autonomous Robots</source>
          .
          <volume>17</volume>
          (
          <issue>1</issue>
          ), pp.
          <fpage>7</fpage>
          -
          <lpage>21</lpage>
          (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Leng</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            ,
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <surname>W.</surname>
          </string-name>
          :
          <article-title>Task-oriented hierarchical control architecture for swarm robotic system</article-title>
          .
          <source>Natural Computing</source>
          ,
          <volume>16</volume>
          (
          <issue>4</issue>
          ), pp.
          <fpage>579</fpage>
          -
          <lpage>596</lpage>
          . (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bartkevicius</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fiodorova</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Knys</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Derviniene</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dersims</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raudonis</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lipnickas</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baranauskas</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sarkauskas</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Balasevivius</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Mobile Robots Navigation Modeling in Known 2D Environment Based on Petri Nets</article-title>
          .
          <source>Intelligent Automation &amp; Software Computing</source>
          . (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Brutschy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Scheidler</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ferrante</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dorigo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Birattari</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>: “Can ants inspire robots?” Self-organized decision making in robotic swarm</article-title>
          .
          <source>In: IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)</source>
          , IEEE, Vilamoura. (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Karlson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Butenandt</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Pheromone (ectohormones) in insects</article-title>
          .
          <source>Annual Review of Entomology. 4</source>
          , pp.
          <fpage>39</fpage>
          -
          <lpage>58</lpage>
          (
          <year>1959</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Russel</surname>
            ,
            <given-names>R. A.</given-names>
          </string-name>
          :
          <article-title>Heat trails as short-lived navigational makers for mobile robots</article-title>
          ,
          <source>in Proceedings of IEEE International Conference on Robotics and Automation (ICRA</source>
          <year>1997</year>
          ). Piscataway, NJ: IEEE Press, pp.
          <fpage>3534</fpage>
          -
          <lpage>3539</lpage>
          , (
          <year>1997</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Fujisawa</surname>
            , R.; Dobata,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kubota</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ; Imamura,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>and</article-title>
          <string-name>
            <surname>Matsuno</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Dependency by concentration of pheromone trail for multiple robots</article-title>
          ,
          <source>in LNCS 5217. Proceedings of the International Conference on Ant Colony Optimization and Swarm Intelligence (ANTS</source>
          <year>2008</year>
          ). Berlin, Germany: Springer, pp.
          <fpage>283</fpage>
          -
          <lpage>290</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Mayet</surname>
            , R.; Roberz,
            <given-names>J.</given-names>
          </string-name>
          ; Schmickl,
          <string-name>
            <given-names>T.</given-names>
            and
            <surname>Crailsheim</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.</surname>
          </string-name>
          :
          <article-title>Antbots: a feasible visual emulation of pheromone trails for swarm robots</article-title>
          ,
          <source>in Proceedings of the 7th International Conference on Swarm Intelligence, ser. LNCS 6234</source>
          . Berlin, Heidelberg: Springer-Verlag, pp.
          <fpage>84</fpage>
          -
          <lpage>94</lpage>
          , (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kurabayashi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Stable filtering for artificial pheromone potential field constructed by mobile robots and passive RFID tags</article-title>
          .
          <source>International Journal of Computer Science &amp; Information Technology (IJCSIT)</source>
          ,
          <volume>3</volume>
          (
          <issue>5</issue>
          ) (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Tavares</surname>
            ,
            <given-names>J. J. P. Z. S Murofushi</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>R. H.</given-names>
            ,
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. H.</given-names>
            ,
            <surname>Silva</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. R.</surname>
          </string-name>
          :
          <article-title>Petri Net Inside RFID Database Integrated with RFID Indoor Positioning System for Mobile Robots Position Control</article-title>
          .
          <source>In: Proceedings of the International Workshop on Petri Nets and Software Engineering (PNSE'17)</source>
          , pp
          <fpage>157</fpage>
          -
          <lpage>176</lpage>
          , CEUR-WS.org,
          <string-name>
            <surname>Zaragoza</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Murofushi</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tavares</surname>
            ,
            <given-names>J.J.P.Z.S.</given-names>
          </string-name>
          : “
          <article-title>Towards Fourth Industrial Revolution Impact: Smart Product Based on RFID Technology”</article-title>
          .
          <source>IEEE Instrumentation and Measurement Magazine</source>
          .
          <volume>20</volume>
          (
          <issue>2</issue>
          ), pp.
          <fpage>51</fpage>
          -
          <lpage>56</lpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Tavares</surname>
            ,
            <given-names>J.J.P.Z.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saraiva</surname>
            ,
            <given-names>T.A.</given-names>
          </string-name>
          :
          <article-title>Elementary Petri net inside RFID distributed database (PNRD)</article-title>
          .
          <source>International Journal of Production Research</source>
          .
          <volume>48</volume>
          (
          <issue>9</issue>
          ), pp.
          <fpage>2563</fpage>
          -
          <lpage>2582</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Fonseca</surname>
            ,
            <given-names>J. P. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>C. E. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sousa</surname>
            ,
            <given-names>A. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tavares</surname>
            ,
            <given-names>J. J. P. Z. S.</given-names>
          </string-name>
          :
          <article-title>Strategies for search and rescue multirobot system based on place/transition Petri nets and RFID distributed data-base</article-title>
          .
          <source>In: 2017 Latin American Robotics Symposium (LARS) and 2017 Brazilian Symposium on Robotics (SBR)</source>
          , IEEE, Curitiba. (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Cepeda</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chaimowicz</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Soto</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gordillo</surname>
            ,
            <given-names>J. L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alanís-Reyes</surname>
            ,
            <given-names>E. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carrilo-Arce</surname>
            ,
            <given-names>L. C.</given-names>
          </string-name>
          :
          <article-title>A behavior-based strategy for single and multi-robot autonomous exploration</article-title>
          .
          <source>Sensor</source>
          , vol.
          <volume>12</volume>
          , p.
          <fpage>12772</fpage>
          -
          <lpage>12797</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Rezaee</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdollahi</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <string-name>
            <given-names>A Decentralized</given-names>
            <surname>Cooperative</surname>
          </string-name>
          <article-title>Control Scheme With Obstacle Avoidance for a Team of Mobile Robots</article-title>
          .
          <source>IEEE Transactions on Industrial Electronics</source>
          ,
          <volume>6</volume>
          (
          <issue>1</issue>
          )
          <fpage>347</fpage>
          -
          <lpage>354</lpage>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Tang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ding</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eberhard</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A stigmergy based search method for swarm robots</article-title>
          . In: Tan Y.,
          <string-name>
            <surname>Takagi</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shi</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Niu</surname>
            <given-names>B</given-names>
          </string-name>
          . (eds)
          <article-title>Advances in Swarm Intelligence</article-title>
          .
          <source>ICSI 2017. Lecture Notes in Computer Science</source>
          , vol
          <volume>10386</volume>
          . Springer, Cham (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lima</surname>
            ,
            <given-names>D. A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oliveira</surname>
            ,
            <given-names>G. M. B.</given-names>
          </string-name>
          :
          <article-title>A cellular automata ant memory model of foraging in a swarm of robots</article-title>
          .
          <source>Applied Mathematical Modelling</source>
          .
          <volume>47</volume>
          , pp.
          <fpage>551</fpage>
          -
          <lpage>572</lpage>
          , (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Silva</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>del Foyo</surname>
          </string-name>
          , P.M.G.:
          <article-title>“Timed Petri Nets”</article-title>
          . Pawel Pawlewski (Ed.), Petri Nets: Manufacturing and Computer Science, InTech, pp.
          <fpage>359</fpage>
          -
          <lpage>378</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Du</surname>
            ,
            <given-names>Y.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Guo</surname>
            ,
            <given-names>B.Q.</given-names>
          </string-name>
          :
          <article-title>Logic Petri Nets and Equivalency</article-title>
          .
          <source>Information Technology Journal</source>
          ,
          <volume>8</volume>
          , pp.
          <fpage>95</fpage>
          -
          <lpage>100</lpage>
          . (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>