Pub Date : 2024-09-12DOI: 10.1007/s10626-024-00403-4
Sander Thuijsman, Dennis Hendriks, Michel Reniers
Supervisor synthesis is a means to algorithmically derive a supervisory controller from a discrete-event model of a system and a requirements specification. For large systems, synthesis suffers from state space explosion. To mitigate this, synthesis can be applied to a symbolic representation of the models by using Binary Decision Diagrams (BDDs). Peak used BDD nodes and BDD operation count are introduced as deterministic and platform independent metrics to express the computational effort of a symbolic synthesis. These BDD-based metrics are useful to analyze the efficiency of the synthesis algorithm. From this analysis, modifications can be made to how BDDs are handled during synthesis, improving synthesis efficiency. We demonstrate this approach by introducing and analyzing: DCSH, a variable ordering heuristic; several edge ordering heuristics; and an approach to efficiently enforce state exclusion requirements in synthesis. These methods were recently implemented in our open source supervisory control tool: Eclipse ESCET. The analysis is based on large scale experiments of performing synthesis on a variety of models from literature. We show that: (1) by using DCSH, synthesis with high computational effort can be avoided, and generally low computational effort is required, relative to the variable ordering heuristics that were used prior to this work; (2) applying reverse-model edge order realizes relatively low synthesis effort; and (3) state exclusion requirements can efficiently be enforced by restricting edge guards prior to synthesis. While these methods reduce computational effort in practice, it should be noted that they do not affect the theoretical (worst-case) complexity of synthesis.
{"title":"Reducing the computational effort of symbolic supervisor synthesis","authors":"Sander Thuijsman, Dennis Hendriks, Michel Reniers","doi":"10.1007/s10626-024-00403-4","DOIUrl":"https://doi.org/10.1007/s10626-024-00403-4","url":null,"abstract":"<p>Supervisor synthesis is a means to algorithmically derive a supervisory controller from a discrete-event model of a system and a requirements specification. For large systems, synthesis suffers from state space explosion. To mitigate this, synthesis can be applied to a symbolic representation of the models by using Binary Decision Diagrams (BDDs). Peak used BDD nodes and BDD operation count are introduced as deterministic and platform independent metrics to express the computational effort of a symbolic synthesis. These BDD-based metrics are useful to analyze the efficiency of the synthesis algorithm. From this analysis, modifications can be made to how BDDs are handled during synthesis, improving synthesis efficiency. We demonstrate this approach by introducing and analyzing: DCSH, a variable ordering heuristic; several edge ordering heuristics; and an approach to efficiently enforce state exclusion requirements in synthesis. These methods were recently implemented in our open source supervisory control tool: Eclipse ESCET. The analysis is based on large scale experiments of performing synthesis on a variety of models from literature. We show that: (1) by using DCSH, synthesis with high computational effort can be avoided, and generally low computational effort is required, relative to the variable ordering heuristics that were used prior to this work; (2) applying reverse-model edge order realizes relatively low synthesis effort; and (3) state exclusion requirements can efficiently be enforced by restricting edge guards prior to synthesis. While these methods reduce computational effort in practice, it should be noted that they do not affect the theoretical (worst-case) complexity of synthesis.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142213891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-05DOI: 10.1007/s10626-024-00402-5
Jiazhong Zhou, Dimitri Lefebvre, Zhiwu Li
In this paper, a type of graph, called an extremum timed extended reachability graph, is designed to abstract the temporal specifications and represent the feasible trajectories of time Petri nets. This graph improves the timed extended reachability graph recently proposed for time Petri nets (Lefebvre. Discrete Event Dynamic Systems 29(1):31–56. (2019); Zhou et al. IEEE Trans Autom Control 67(7):3693–3698. (2022)) by replacing the earliest-firing policy with a more general policy. In detail, when a transition is preselected for the next firing, the firing can be delayed for a certain period after its minimal residual time has elapsed, rather than immediately firing once its minimal residual time has elapsed. Then, a sampled timed extended reachability graph is designed, wherein, for a transition preselected to fire next, a finite number of time points within a time interval, starting at minimal residual time and ending at maximal residual time, are selected as the firing time instants for the preselected transition. Furthermore, a special case of the sampled timed extended reachability graph, called an extremum timed extended reachability graph that details only the minimal and maximal residual times of the transitions, is also proposed. For a feasible sequence, the corresponding feasible trajectories with minimal and maximal durations are easy to compute with this graph. Thus, an end-to-end delay of a feasible sequence can be obtained by directly searching the graph. Finally, the scheduling of a typical flexible manufacturing system illustrates the advantages and applications of the proposed approach.
本文设计了一种称为极值定时扩展可达性图的图,用于抽象时间规范和表示时间 Petri 网的可行轨迹。这种图改进了最近针对时间 Petri 网提出的定时扩展可达性图(Lefebvre.离散事件动态系统 29(1):31-56.(2019); Zhou et al. IEEE Trans Autom Control 67(7):3693-3698.(2022)),用一种更通用的策略取代了最早触发策略。具体来说,当一个过渡被预选为下一次发射时,发射可以在其最小剩余时间过后延迟一段时间,而不是在其最小剩余时间过后立即发射。然后,设计出一种采样定时扩展可达性图,其中,对于预选为下一次触发的过渡,在一个时间间隔内选择有限个时间点,从最小剩余时间开始,到最大剩余时间结束,作为预选过渡的触发时间点。此外,还提出了采样定时扩展可达性图的一种特例,称为极值定时扩展可达性图,它只详细说明了过渡的最小和最大残差时间。对于一个可行的序列,利用该图很容易计算出具有最小和最大持续时间的相应可行轨迹。因此,直接搜索该图就能得到可行序列的端到端延迟。最后,一个典型的柔性制造系统的调度说明了所提方法的优势和应用。
{"title":"An extremum timed extended reachability graph for temporal analysis of time Petri nets","authors":"Jiazhong Zhou, Dimitri Lefebvre, Zhiwu Li","doi":"10.1007/s10626-024-00402-5","DOIUrl":"https://doi.org/10.1007/s10626-024-00402-5","url":null,"abstract":"<p>In this paper, a type of graph, called an extremum timed extended reachability graph, is designed to abstract the temporal specifications and represent the feasible trajectories of time Petri nets. This graph improves the timed extended reachability graph recently proposed for time Petri nets (Lefebvre. Discrete Event Dynamic Systems 29(1):31–56. (2019); Zhou et al. IEEE Trans Autom Control 67(7):3693–3698. (2022)) by replacing the earliest-firing policy with a more general policy. In detail, when a transition is preselected for the next firing, the firing can be delayed for a certain period after its minimal residual time has elapsed, rather than immediately firing once its minimal residual time has elapsed. Then, a sampled timed extended reachability graph is designed, wherein, for a transition preselected to fire next, a finite number of time points within a time interval, starting at minimal residual time and ending at maximal residual time, are selected as the firing time instants for the preselected transition. Furthermore, a special case of the sampled timed extended reachability graph, called an extremum timed extended reachability graph that details only the minimal and maximal residual times of the transitions, is also proposed. For a feasible sequence, the corresponding feasible trajectories with minimal and maximal durations are easy to compute with this graph. Thus, an end-to-end delay of a feasible sequence can be obtained by directly searching the graph. Finally, the scheduling of a typical flexible manufacturing system illustrates the advantages and applications of the proposed approach.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"96 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142214133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-12DOI: 10.1007/s10626-024-00401-6
Feng Lin, Stéphane Lafortune, Caisheng Wang
This paper extends the theory of diagnosability by investigating fault diagnosis in discrete event systems under sensor attacks using finite-state automata as models. It assumes that an attacker has compromised the communication channel between the system’s sensors and the diagnostic engine. While the general attack model utilized by the attacker has been previously studied in the context of supervisory control, its application to fault diagnosis remains unexplored. The attacker possesses the capability to substitute each compromised observable event with a string from an attack language. The attack model incorporates event insertion and deletion, as well as static and dynamic attacks. To formally capture the diagnostic engine’s ability to identify faults in the presence of the attacker, a novel concept called CA-diagnosability is introduced. This extends the existing notions of CA-controllability and CA-observability. A testing procedure for CA-diagnosability is developed, and its correctness is proven. Some sufficient conditions for CA-diagnosability that can be easily checked are also proposed and proved. The paper then investigates conditions under which the role of an attacker can be reverted from malicious to benevolent, that is, to help the diagnoser to diagnose faults. The paper further applies diagnosability theory to investigate conditions under which the presence of the attacker can be detected.
本文以有限状态自动机为模型,通过研究传感器攻击下离散事件系统的故障诊断,扩展了可诊断性理论。本文假设攻击者破坏了系统传感器与诊断引擎之间的通信通道。虽然攻击者使用的一般攻击模型以前在监督控制方面进行过研究,但其在故障诊断方面的应用仍有待探索。攻击者有能力用攻击语言中的字符串替代每个被破坏的可观测事件。攻击模型包括事件插入和删除,以及静态和动态攻击。为了正式捕捉诊断引擎在攻击者存在的情况下识别故障的能力,引入了一个名为 CA 可诊断性的新概念。这扩展了现有的 CA 可控性和 CA 可观察性概念。我们开发了 CA 可诊断性的测试程序,并证明了其正确性。本文还提出并证明了一些易于检查的 CA 可诊断性充分条件。然后,本文研究了攻击者的角色可以从恶意转为善意(即帮助诊断者诊断故障)的条件。论文进一步应用可诊断性理论,研究在哪些条件下可以检测到攻击者的存在。
{"title":"Diagnosability and attack detection for discrete event systems under sensor attacks","authors":"Feng Lin, Stéphane Lafortune, Caisheng Wang","doi":"10.1007/s10626-024-00401-6","DOIUrl":"https://doi.org/10.1007/s10626-024-00401-6","url":null,"abstract":"<p>This paper extends the theory of diagnosability by investigating fault diagnosis in discrete event systems under sensor attacks using finite-state automata as models. It assumes that an attacker has compromised the communication channel between the system’s sensors and the diagnostic engine. While the general attack model utilized by the attacker has been previously studied in the context of supervisory control, its application to fault diagnosis remains unexplored. The attacker possesses the capability to substitute each compromised observable event with a string from an attack language. The attack model incorporates event insertion and deletion, as well as static and dynamic attacks. To formally capture the diagnostic engine’s ability to identify faults in the presence of the attacker, a novel concept called CA-diagnosability is introduced. This extends the existing notions of CA-controllability and CA-observability. A testing procedure for CA-diagnosability is developed, and its correctness is proven. Some sufficient conditions for CA-diagnosability that can be easily checked are also proposed and proved. The paper then investigates conditions under which the role of an attacker can be reverted from malicious to benevolent, that is, to help the diagnoser to diagnose faults. The paper further applies diagnosability theory to investigate conditions under which the presence of the attacker can be detected.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141612728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper studies a scenario in which the occurrence of one or more events in a discrete event system is subject to external restrictions which may change unexpectedly during run-time. The system is modeled as a timed event graph (TEG) and, in this context, the presence of the aforementioned external restrictions has become known as partial synchronization (PS). This phenomenon arises naturally in several applications, from manufacturing to transportation systems. We develop a formal and systematic method to compute optimal control signals for TEGs in the presence of PS, where the control objective is tracking a given output reference as closely as possible and optimality is understood in the widely-adopted just-in-time sense. The approach is based on the formalism of tropical semirings — in particular, the min-plus algebra and derived semiring of counters. We claim that our method expands modeling and control capabilities with respect to previously existing ones by tackling the case of time-varying PS restrictions, which, to the best of our knowledge, has not been dealt with before in this context.
{"title":"A tropical-algebraic method for the control of timed event graphs with partial synchronization","authors":"Germano Schafaschek, Laurent Hardouin, Jörg Raisch","doi":"10.1007/s10626-024-00400-7","DOIUrl":"https://doi.org/10.1007/s10626-024-00400-7","url":null,"abstract":"<p>This paper studies a scenario in which the occurrence of one or more events in a discrete event system is subject to external restrictions which may change unexpectedly during run-time. The system is modeled as a timed event graph (TEG) and, in this context, the presence of the aforementioned external restrictions has become known as <i>partial synchronization</i> (PS). This phenomenon arises naturally in several applications, from manufacturing to transportation systems. We develop a formal and systematic method to compute optimal control signals for TEGs in the presence of PS, where the control objective is tracking a given output reference as closely as possible and optimality is understood in the widely-adopted just-in-time sense. The approach is based on the formalism of tropical semirings — in particular, the min-plus algebra and derived semiring of counters. We claim that our method expands modeling and control capabilities with respect to previously existing ones by tackling the case of time-varying PS restrictions, which, to the best of our knowledge, has not been dealt with before in this context.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141547628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-08DOI: 10.1007/s10626-024-00399-x
Anne Bouillard
Stochastic Network Calculus is a probabilistic method to compute performance bounds in networks, such as end-to-end delays. It relies on the analysis of stochastic processes using formalism of (Deterministic) Network Calculus. However, unlike the deterministic theory, the computed bounds are usually very loose compared to the simulation. This is mainly due to the intensive use of the Boole’s inequality. On the other hand, analyses based on martingales can achieve tight bounds, but until now, they have not been applied to sequences of servers. In this paper, we improve the accuracy of Stochastic Network Calculus by combining this martingale analysis with a recent Stochastic Network Calculus results based on the Pay-Multiplexing-Only-Once property, well-known from the Deterministic Network calculus. We exhibit a non-trivial class of networks that can benefit from this analysis and compare our bounds with simulation.
{"title":"MGF-based SNC for stationary independent Markovian processes with localized application of martingales","authors":"Anne Bouillard","doi":"10.1007/s10626-024-00399-x","DOIUrl":"https://doi.org/10.1007/s10626-024-00399-x","url":null,"abstract":"<p>Stochastic Network Calculus is a probabilistic method to compute performance bounds in networks, such as end-to-end delays. It relies on the analysis of stochastic processes using formalism of (Deterministic) Network Calculus. However, unlike the deterministic theory, the computed bounds are usually very loose compared to the simulation. This is mainly due to the intensive use of the Boole’s inequality. On the other hand, analyses based on martingales can achieve tight bounds, but until now, they have not been applied to sequences of servers. In this paper, we improve the accuracy of Stochastic Network Calculus by combining this martingale analysis with a recent Stochastic Network Calculus results based on the Pay-Multiplexing-Only-Once property, well-known from the Deterministic Network calculus. We exhibit a non-trivial class of networks that can benefit from this analysis and compare our bounds with simulation.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140939209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-10DOI: 10.1007/s10626-024-00396-0
P. Declerck
The aim of this paper is the analysis of the property of the relaxed structurally boundedness of the unobservable subnet of the Petri net which brings a condition guaranteeing the finitude of all possible sequence lengths in the context of an on-line estimation in Partially Observable Petri Nets relevant to a sliding horizon or a receding horizon starting from the initial marking. Based on specific invariants defined over the real numbers, the approach focuses on an offline structural analysis, that is, the determination of the parts of the unobservable subnet where an online estimation for any criterion can be made. The decomposition-composition technique is based on a block triangular form obtained with any technique. The composition of the substructures leads to a propagation of the relaxed structurally boundedness property through the structure. The study of a large-scale manufacturing system shows that the direct treatment of the large system system can be avoided and that the triangular form brings a sequential treatment allowing a computation based on smaller systems independently of the resolution of the complete system.
本文的目的是分析 Petri 网不可观测子网的松弛结构有界性属性,该属性为部分可观测 Petri 网中与滑动视界或从初始标记开始的后退视界相关的在线估计提供了保证所有可能序列长度有限性的条件。基于实数上定义的特定不变式,该方法侧重于离线结构分析,即确定不可观测子网的哪些部分可以针对任何准则进行在线估计。分解-组合技术基于通过任何技术获得的块三角形形式。子结构的组成会导致松弛结构约束性属性在整个结构中的传播。对大型制造系统的研究表明,可以避免对大型系统进行直接处理,三角形式带来了一种顺序处理方法,允许根据较小的系统进行计算,而与完整系统的分辨率无关。
{"title":"Offline analysis of the relaxed upper boundedness for online estimation ofoptimal event sequences in Partially Observable Petri Nets","authors":"P. Declerck","doi":"10.1007/s10626-024-00396-0","DOIUrl":"https://doi.org/10.1007/s10626-024-00396-0","url":null,"abstract":"<p>The aim of this paper is the analysis of the property of the relaxed structurally boundedness of the unobservable subnet of the Petri net which brings a condition guaranteeing the finitude of all possible sequence lengths in the context of an on-line estimation in Partially Observable Petri Nets relevant to a sliding horizon or a receding horizon starting from the initial marking. Based on specific invariants defined over the real numbers, the approach focuses on an offline structural analysis, that is, the determination of the parts of the unobservable subnet where an online estimation for any criterion can be made. The decomposition-composition technique is based on a block triangular form obtained with any technique. The composition of the substructures leads to a propagation of the relaxed structurally boundedness property through the structure. The study of a large-scale manufacturing system shows that the direct treatment of the large system system can be avoided and that the triangular form brings a sequential treatment allowing a computation based on smaller systems independently of the resolution of the complete system.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140574506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-08DOI: 10.1007/s10626-024-00398-y
Jihene Rajah, Said Amari, Maher Barkallah, Mohamed Haddar
This work deals with the control problem of Discrete Event Systems (DESs) modelled by Timed Event Graphs (TEGs) and subject to Generalized Marking Constraints (GMCs). The aim of this paper is to propose an algebraic methodology for the determination of control laws in the form of state feedback, guaranteeing the satisfaction of marking specifications expressed by weighted inequalities in the Min-Plus algebra. The resultant controller can be represented by marked and timed control places, connected to the initial TEG model. The role of the established feedback is to limit the number of tokens in weighted paths for partially observable TEGs. In order to illustrate and show the interest of these current studies, we applied the suggested control method to a machine of filling bottles with liquid.
{"title":"An algebraic control method to guarantee generalized marking constraints for partially observable timed event graphs","authors":"Jihene Rajah, Said Amari, Maher Barkallah, Mohamed Haddar","doi":"10.1007/s10626-024-00398-y","DOIUrl":"https://doi.org/10.1007/s10626-024-00398-y","url":null,"abstract":"<p>This work deals with the control problem of Discrete Event Systems (DESs) modelled by Timed Event Graphs (TEGs) and subject to Generalized Marking Constraints (GMCs). The aim of this paper is to propose an algebraic methodology for the determination of control laws in the form of state feedback, guaranteeing the satisfaction of marking specifications expressed by weighted inequalities in the Min-Plus algebra. The resultant controller can be represented by marked and timed control places, connected to the initial TEG model. The role of the established feedback is to limit the number of tokens in weighted paths for partially observable TEGs. In order to illustrate and show the interest of these current studies, we applied the suggested control method to a machine of filling bottles with liquid.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140574132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The min-plus algebra is a commutative semiring with two operations: addition (varvec{a} oplus varvec{b := min (a,b)}) and multiplication (varvec{a} otimes varvec{b := a + b}). In this paper, we discuss a min-plus algebraic counterpart of matrix diagonalization in conventional linear algebra. Due to the absence of subtraction in the min-plus algebra, few matrices admit such a canonical form. Instead, we consider triangulation of min-plus matrices in terms of algebraic eigenvectors, which is an extended concept of usual eigenvectors. We deal with two types of min-plus matrices: strongly diagonally dominant (SDD) and nearly diagonally dominant (NDD) matrices. For an SDD matrix, the roots of the characteristic polynomial coincide with its diagonal entries. On the other hand, for an NDD matrix, the roots except for the maximum one appear in diagonal entries. We show that SDD matrices admit upper triangulation whose diagonal entries are algebraic eigenvalues, while NDD matrices admit block upper triangulation. We exhibit applications of triangulation of min-plus matrices to traffic flow models.
{"title":"Triangulation of diagonally dominant min-plus matrices","authors":"Yuki Nishida, Sennosuke Watanabe, Yoshihide Watanabe","doi":"10.1007/s10626-024-00397-z","DOIUrl":"https://doi.org/10.1007/s10626-024-00397-z","url":null,"abstract":"<p>The min-plus algebra is a commutative semiring with two operations: addition <span>(varvec{a} oplus varvec{b := min (a,b)})</span> and multiplication <span>(varvec{a} otimes varvec{b := a + b})</span>. In this paper, we discuss a min-plus algebraic counterpart of matrix diagonalization in conventional linear algebra. Due to the absence of subtraction in the min-plus algebra, few matrices admit such a canonical form. Instead, we consider triangulation of min-plus matrices in terms of algebraic eigenvectors, which is an extended concept of usual eigenvectors. We deal with two types of min-plus matrices: strongly diagonally dominant (SDD) and nearly diagonally dominant (NDD) matrices. For an SDD matrix, the roots of the characteristic polynomial coincide with its diagonal entries. On the other hand, for an NDD matrix, the roots except for the maximum one appear in diagonal entries. We show that SDD matrices admit upper triangulation whose diagonal entries are algebraic eigenvalues, while NDD matrices admit block upper triangulation. We exhibit applications of triangulation of min-plus matrices to traffic flow models.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140316916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-02DOI: 10.1007/s10626-024-00395-1
Miroslav Ćirić, Ivana Micić, Jelena Matejić, Aleksandar Stamenković
Two types of simulations and four types of bisimulations for weighted finite automata over the complete max-plus semiring we define as solutions of particular systems of matrix inequations. We provide a procedure that either decides that there is a simulation or bisimulation of a given type between two automata, and outputs the greatest one, or decides that no simulation or bisimulation of that type exists. The procedure is iterative and does not have to end in a finite number of steps. Certain conditions under which this procedure must terminate in a finite number of steps are described in a slightly more general context in Stamenković et al. (Discrete Event Dynamic Systems, 32:1–25, 2022). We also propose a modification of this procedure which, in case there is no simulation or bisimulation of a given type between two max-plus automata, detects this in finitely many steps and faster than the original procedure. In the same case, that modification also finds a natural number such that containment or equivalence is valid for all input words of length less than that number. For max-plus automata with non-negative weights, we point out the differences that occur when the above mentioned procedure is applied over the complete max-plus semiring, and when it is applied over its non-negative part with minus infinity added.
{"title":"Simulations and bisimulations for max-plus automata","authors":"Miroslav Ćirić, Ivana Micić, Jelena Matejić, Aleksandar Stamenković","doi":"10.1007/s10626-024-00395-1","DOIUrl":"https://doi.org/10.1007/s10626-024-00395-1","url":null,"abstract":"<p>Two types of simulations and four types of bisimulations for weighted finite automata over the complete max-plus semiring we define as solutions of particular systems of matrix inequations. We provide a procedure that either decides that there is a simulation or bisimulation of a given type between two automata, and outputs the greatest one, or decides that no simulation or bisimulation of that type exists. The procedure is iterative and does not have to end in a finite number of steps. Certain conditions under which this procedure must terminate in a finite number of steps are described in a slightly more general context in Stamenković et al. (Discrete Event Dynamic Systems, 32:1–25, 2022). We also propose a modification of this procedure which, in case there is no simulation or bisimulation of a given type between two max-plus automata, detects this in finitely many steps and faster than the original procedure. In the same case, that modification also finds a natural number such that containment or equivalence is valid for all input words of length less than that number. For max-plus automata with non-negative weights, we point out the differences that occur when the above mentioned procedure is applied over the complete max-plus semiring, and when it is applied over its non-negative part with minus infinity added.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140018715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-03DOI: 10.1007/s10626-023-00392-w
Lonnie Turpin, Morgan Turpin
In this work, we consider D/D/S series queues characterized by deterministic interarrival and service times, with a single multi-server bottleneck stage. When the arrival rate is greater than the bottleneck capacity—for a temporary window of time—the derivation of cycle time is not immediately clear, and warrants a formal proof.
{"title":"Cycle times in D/D/S series queues with single multi-server bottlenecks","authors":"Lonnie Turpin, Morgan Turpin","doi":"10.1007/s10626-023-00392-w","DOIUrl":"https://doi.org/10.1007/s10626-023-00392-w","url":null,"abstract":"<p>In this work, we consider D/D/<i>S</i> series queues characterized by deterministic interarrival and service times, with a single multi-server bottleneck stage. When the arrival rate is greater than the bottleneck capacity—for a temporary window of time—the derivation of cycle time is not immediately clear, and warrants a formal proof.</p>","PeriodicalId":92890,"journal":{"name":"Discrete event dynamic systems","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139664079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}