Failures in Discrete Event Systems and D
Failures in Discrete Event Systems and D
https://doi.org/10.1007/s40595-018-0110-3
REGULAR PAPER
Received: 13 July 2017 / Accepted: 10 May 2018 / Published online: 19 May 2018
© The Author(s) 2018
Abstract
An approach based on Petri nets pointing to the manner how to deal with failures in discrete-event systems is presented. It
uses the reachability tree and/or reachability graph of the Petri net-based model of the real system as well as the synthesis of
a supervisor to remove the possible deadlock(s). To illustrate the applicability of the approach to the detection and recovery
of failures in DES modelled by Petri nets the case study on a railroad crossing is introduced.
Keywords Detection · Discrete-event systems · Failure · Modelling · Petri nets · Reachability · Recovery
123
144 Vietnam Journal of Computer Science (2018) 5:143–155
Here, in this paper, failures in DES and their recovery (γtk1 , . . . , γtkm )T with entries γ pki ∈ {0, 1}, representing the
will be examined by means of utilizing Petri nets (PN). DES states of particular transitions (either enable—when 1, or
are systems discrete by nature. They persist in a steady state disable—when 0) is the control vector; F, GT are incidence
until the occurrence of a discrete event which will cause their matrices of arcs corresponding, respectively, to the sets F, G
transition into another state. Typical representatives of DES mentioned above.
are discrete manufacturing systems, transport systems, com- A firing sequence from the initial state x0 (i.e., from the
munication systems, etc. PN are frequently used for DES initial marking m 0 ) is a sequence of transition sets T =
modelling, analysing and control synthesizing. {τ1 τ2 . . . τk } such that x0 [ τ1 > x1 [ τ2 > x2 > · · · τk >
xk−1 [ τk > xk . The set may be also empty, of course. The
1.1 Preliminaries about Petri nets notation x0 [ T denotes that the sequence T can be fired at
x0 and the notation x0 [ T > xk denotes that the firing of T
Petri nets (PN) [8,18,20] are (as to their structure) bipar- yields xk .
tite directed graphs—i.e., graphs with two kinds of nodes More than one transition can be fired at any instant. Thus
(places and transitions) and two kinds of edges (arcs directed there are two possibilities (i) to fire more than one transition
from places to transitions and arcs directed contrary)— at any instant (concurrency assumption); (ii) to fire only one
P, T , F, G with P ∩ T = ∅ and P ∪ T = ∅ (∅ is the of them at any instant [no concurrency (NC) assumption].
empty set), where P, |P| = n, is a finite set of places and T , Under the NC assumption, each τi is a singleton set, and
|T | = m, is a finite set of transitions; F ⊆ P ×T , G ⊆ T × P T is a sequence of transitions. It can also be written that
are subsets of the directed arcs. The set B = F ∪ G con- x0 [ T > xk to denote that firing of T the state xk can be
tains all directed arcs. The so called preset (a set of input reached from x0 . In general, the state xk is reachable from x0
places) of a transition t is defined as ( p) t = { p|( p, t) ∈ B}, if there exists a firing sequence T such that x0 [ T > xk . For
while the so called postset (a set of output places) of t is PN the set of reachable state vectors is R(PN, x0 ). All these
defined as t ( p) = { p|(t, p) ∈ B}. On the contrary, the pre- vectors create columns of the matrix Xreach .
set of a place p (a set of input transitions) is defined as The PN reachability tree (RT) expresses all states reach-
(t) p = {t|(t, p) ∈ B} while the postset (a set of output able from x0 as well as how (by means of firing which
transitions) of p is defined as p (t) = {t|( p, t) ∈ B}. P/T transitions) they can be reached. Thus, the nodes of the RT
PN is said to be pure if no self-loops occur in it, i.e., if for are labelled with the actual PN marking (state vectors) and
p ∈ P, t ∈ T , {( p, t) ∈ B) ⇒ (t, p) ∈ / B}. the arcs are labelled with the transitions between the states.
Places model some particular activities or operations of a The RT root is represented by the initial state x0 and the RT
modelled DES being a real object (plant). This is expressed leafs are expressed by the states reachable from x0 . Connect-
by putting tokens inside the places. Such a marking m is a vec- ing the leafs with the same name the reachability graph (RG)
tor m : P → Z≥0 (Z≥0 represents positive integers including arises.
0). The marking enables a set of transitions τ ⊆ T . Namely, The PN T-invariants and P-invariants [9,13,18] are impor-
∀ p ∈ P, m( p) ≥ | p (t) ∩ τ | (i.e., m( p) is greater than the tant too, respectively, at diagnosability [16] and supervision
number of transitions in τ for which p is the input place [4] (and subsequently for deadlocks elimination). While T-
or equal to this number). The enabled transitions may be invariants restore an initial state, P-invariants ensure the
(but need not be) fired. After their firing the PN marking is token preservation. A T-invariant v is a solution of the equa-
changed. tion Bv = 0. A P-invariant y is a solution of the equation
As to the marking development (marking propagation can BT y = 0. For any state x reachable from x0 the relation
be understood to be PN dynamics), the PN can be formally yT · x = yT · x0 is valid. This fact was utilized at the super-
defined as X , U , δ, x0 , where X is a set of PN states, U is visor synthesis [4] based on P-invariants.
a set of discrete events; δ : X × U → X symbolizes the fact To express time, we can use timed Petri nets (TPN), where
that the new state of marking depends on existing state and an time is assigned to the transitions as their duration function
occurred discrete event; x0 ∈ X is the initial state of marking. D : T → Q≥0 , where Q≥0 symbolizes non-negative rational
The state equation (PN model of DES) is as follows: numbers.
To illustrate the PN-based approach to the detection and
xk+1 = xk + B · uk , k = 0, 1, . . . , N , (1) recovery of failures in DES modelled by PN let us introduce
F · uk ≤ xk , (2) the following case study.
This paper is an expanded version of the paper [5] pre-
where B = GT − F. It expresses the PN dynamics. Here, sented at the conference ACIIDS 2017. In comparison with
xk = (σ pk1 , . . . , σ pkn )T with entries σ pki ∈ {0, 1, . . . , ∞}, the conference paper, the part concerning the safety of tech-
representing the states of particular places, is the PN state nical systems in general was added. Because the introduced
vector in the k-th step of the dynamics development; uk = Case Study concerns the accident on a railroad crossing, cer-
123
Vietnam Journal of Computer Science (2018) 5:143–155 145
tain illustrations of formidable effects of such accidents were During last several years such collisions caused many
introduced. Also the passage concerning the supervisor syn- casualties—130 human lives and huge material damages.
thesis was modified, to be more comprehensible to readers. Consequently, it is necessary to be concerned with such prob-
lems and to find possibilities how to improve security in
that area. Also PN can help along this line. Of course, it
is impossible to anticipate failures caused by people them-
selves. The failures due to the human behaviour like the
2 Safety of technical systems
absent-mindedness, willful and wanton acts of law breaking,
infringement of traffic regulations, etc., cannot be removed
The safety of different kind of technical systems is very
simply. To prevent the bad habits the education or training, in
important. Especially, in case of the systems where the human
extreme cases a punishment, are necessary. Only right way
life is endangered. From this point of view the transport sys-
to the improvement of the safety of systems is to increase
tems belong to the systems where the human life is often
the reliability of the software and equipment. The following
endangered. At present, man is directly endangered at the
simple case study on railroad crossing offers the approach
contact with the transport systems during whole day. The
how to do this in such a case.
mass transport is dangerous not only for the road user(s) who
are crossing a road as pedestrian(s) but also for car drivers and
their travel companion. For example the car collisions occur 2.1 Case study on simple railroad crossing
very frequently. Likewise, collisions on railroad crossings are
not unusual. Only in such small country like Slovakia, tragic Consider the simple railroad crossing where the railroad
collisions between cars and/or trucks with trains occur prac- crossing gate prevents a direct contact of vehicles on the
tically every month—see e.g., Fig. 1. The train having a many road with trains. The PN model of such system consists of
times bigger mass, speed and consequently, also dynamics, three cooperating sub-models expressing in Fig. 2(left) the
destroys not only human lives (being inside of the road vehi- behaviour of the train, crossing gate and control system. Here,
cles and the train) but also the vehicles and some times also the sense of the places in the failure-free case is the following:
the train itself ends completely destroyed. (i) the train has the states: p1 = approaching to the cross-
123
146 Vietnam Journal of Computer Science (2018) 5:143–155
Fig. 2 The PN model of the failure-free case together with its RT (left) and the PN model with three potential failures (right)
ing, p2 = being before the crossing, p3 = being within the gate is mechanically damaged), and t f5 represents a control
crossing, p4 = being after the crossing; (ii) the barrier of the system failure (when an illegitimate signal occurs).
crossing gate has the states: p11 = it is up, p12 = it is down. It is practically impossible to recover the human fail-
The transitions t6 and t7 model, respectively, the events of ure of the engine-driver. Likewise, the technical problem in
raising and lowering the barrier; (iii) the control system has the crossing gate caused by a wrong function of the bar-
the states: p5 , p6 , p7 , p8 , p9 , p10 ; (iv) the place p13 repre- rier raising/lowering can be hardly recovered. However, the
sents the interlock giving the warning signal for the train that erroneous function of the control system can be detected and
the barrier is still up. The reachable states xi , i = 0, . . . , 7 recovered. Consequently, let us consider in Fig. 2(right) only
(RT/RG nodes Ni+1 ), of the failure-free system are expressed the failure represented by t f5 and neglect the failures repre-
as the rows of the following matrix sented by the transitions t f2 and t f6 . Then the coverability
tree and graph are given in Fig. 3. The reachable states of
1 0 0 0 0 1 0 00 0 1 0 0
this model (nodes of the RT/RG) are given as the columns of
0 1 0 0 1 1 0 00 0 1 0 0 the following matrix, where
0 1 0 0 0 0 1 01 0 1 0 0
T
0 1 0 0 0 0 1 00 0 0 1 1
Xreach =
0
(3)
1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 1 0 0 0 1 00 0 0 1 0
0
0 1 0 1 1 1 1 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0
0 0 1 0 0 1 10 0 0 1 0
0
0
0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 1 0 0 0 0
0 0 1 0 1 0 00 1 0 1 0
0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 1 0 1 1 1 1
0 0 0 1 0 1 0 00 0 1 0 0
0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 0 1
The RT is displayed just by the failure-free PN model in
Xreach 0
= 0 0 1 0 1 1 1 1 1 1 1 1 1 0 1 1 1 0 0 1 0
Fig. 2. It is simple, without any branching. 0
0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 1 0 0 0 1 0
However, there can occur three potential failures, one in 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 ω 1 ω 1 ω 1 0 ω 1 0 ω ω 2 0 ω ω 1 ω ω ω
each subsystem. They are expressed by means of the failure
1 1 1 1 1 0 1 0 1 0 0 1 0 1 0 1 0 1 1 0 1 1
transitions t f2 , t f5 , t f6 given in Fig. 2 (right). The transition
0
0 0 0 0 1 0 1 0 1 1 0 1 0 1 0 1 0 0 1 0 0
t f2 takes a token from p2 and puts a token into p3 out of
0 0 0 0 0 1 0 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0
the correct sequence, t f6 does the same for p12 and p11 ,
(4)
and t f5 involves an erroneous generation of a token in pl0
which directly influences the position of the barrier. Thus,
t f2 represents a human failure (when the engine-driver omits It can be seen that at the infinity number of t f5 occurrences,
or ignores the warning signal), t f6 expresses the failure of the one half of the 22 states have the self-loops (see Fig. 3 right)
crossing gate (when a premature gate raising occurs or the which are expressed by the symbol ω.
123
Vietnam Journal of Computer Science (2018) 5:143–155 147
Fig. 3 The coverability tree (left) and coverability graph (right) of the PN model with t f5 at the infinite number of possible occurrences of the
failure
1 0 0 0 0 0 0 0 00
0 1 0 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0
0 0 0 0 1 0 0 0 0 1
F= ;
0 0 0 0 1 0 0 0 0 0
0 0 0 0 0 0 1 0 0 0
0 0 0 0 0 1 0 0 1 0
Fig. 4 The PN model of the system with the failure represented by t f5
0 0 0 0 0 0 1 0 1 1
0 0 0 0 0 1 0 0 0 0
0 1 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 1 00
123
148 Vietnam Journal of Computer Science (2018) 5:143–155
0 0 0 0 0 0 0 0 00 1
1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0000
0 0 0 0 0 0 0 0 0 0
0
0
1 0 1 1 1 1 0 1 0 0 1 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0
0
0
0 0 0 0 0 0 1 0 0 1 0 0 0 1 0 0 0 0
0 1 0 0 0 0 0 0 0
0
0
1
0 0 0 0 0 0 0 0 1 0 0 1 1 0 1 1 1 1
0 0 0 0 0 0 0 0 0 0
0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 1 0 0 0 0 0
1
1 1 1 0 1 0 0 0 0 0 0 0 1 0 0 1 1 0 1
0 0 0 1 0 0 0 0 0 1 0
T
G = ; x0 = . (5) 0 0 0 1 0 1 1 1 1 1 1 1 0 1 1 0 0 1 0
0 0 1 0 0 0 0 0 0 0 0 Xr each = (6)
0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 1 0
0 0 0 1 0 0 0 0 0 0 0
0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 1 0 0 1 0 0 0
0 0 1 0 1 0 1 0 1 0 1 0 1 1 0 0 2 0 1
0 0 0 0 0 1 0 0 1 0 1
1 1 1 1 1 0 1 0 0 0 0 1 0 0 1 1 0 1 1
0 0 0 0 0 0 1 0 0 1 0
0 0 0 0 0 1 0 1 1 1 1 0 1 1 0 0 1 0 0
0 0 0 0 0 0 1 0 00 0
0 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 00 1
1 1 0 1 0 1 0 1 0 1 0 0 1 0 0 1000
Then, RT and RG of the failed system are given in Fig. 5.
The RT has 19 nodes. However, with the accruing number
It can be seen that the number of states as well as the RT/RG
of occurrences of the failure, the RT/RG dimensionality and
structure are completely different in comparison with RT
complexity escalate. When σ p14 = 2 RT has 30 nodes, when
of the failure-free system in Fig. 2. Namely, the branching
σ p14 = 5 RT has 63 nodes, when σ p14 = 10 RT has 118
occurs here. The states (nodes of the RT/RG) are the columns
nodes, etc. Although the procedure of RT computation is the
of the matrix Xreach .
same, computational time correspondingly increases.
To detect and recover the failure(s) we have to distinguish
whether the barrier is down or up. When the train is approach-
ing, in the standard situation (without any failure) the barrier
is down. However, in the non-standard situation (when the
failure t f5 occurs) the barrier is going up. This is very dan-
123
Vietnam Journal of Computer Science (2018) 5:143–155 149
1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 1 0 1 1 0 1 1 1 1 0 1 1 1 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 1 0 0 1 1 1 1 1 1 1
0 1 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
1 1 1 0 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 1 1 1
0 0 0 1 0 0 1 1 1 0 1 1 1 1 1 1 1 1 1 0 1 1 1 0 0 1 1 0 0 0
Xreach =
0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 1 1 0 0 0
0 0 0 1 0 0 0 1 1 0 0 0 1 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0
0 0 1 0 1 0 0 1 0 0 0 1 1 0 0 1 0 0 0 1 1 0 0 0 2 0 0 1 1 0
1 1 1 1 1 1 0 1 0 1 0 0 0 1 0 0 1 0 0 0 0 1 0 1 0 1 0 1 0 1
0 0 0 0 0 0 1 0 1 0 1 1 1 0 1 1 0 1 1 1 1 0 1 0 1 0 1 0 1 0
0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0
1 1 0 1 0 0 1 0 1 0 1 0 0 0 1 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0
(7)
123
150 Vietnam Journal of Computer Science (2018) 5:143–155
Fig. 7 The RT of the recovered system (left) and the corresponding RG (right)
Fig. 8 The PN model of the system with the recovered failure and the
deadlock removed by means of the supervisor
123
Vietnam Journal of Computer Science (2018) 5:143–155 151
Fig. 9 The RT of the recovered system with removed deadlock by means of the supervisor (left) and the corresponding RG (right)
1 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
th parameter concerns tr1 . Simulation in Matlab by means of
0
1 0 1 1 0 1 1 1 0 1 1 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 the tool HYPENS [24] brings the results given in Figs. 10,
0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 1 1 0 0 0 0 0 0 0
11 and 12. Till now the deterministic timing of all transitions
0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 1 1 1 1 1 1 1
0
was used, including t f5 . To make sure that non-deterministic
1 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
timing of t f5 does not affect the results, consider for t f5 the
1 1 1 0 1 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 1 1 1
discrete uniform probability distribution of timing: u f x =
0 0 0 1 0 0 1 1 0 1 1 1 1 1 1 1 0 1 1 1 0 0 1 1 0 0 0
s
Xreach = 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 1 0 0 0 1/(b − a) if x ∈ (a, b), otherwise x = 0. Test two cases: (i)
0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
a = 0.1, b = 1.2; (ii) a = 0.3, b = 0.7. The results are
0 0 1 0 1 0 0 1 0 0 1 0 0 1 0 0 1 1 0 0 0 2 0 0 1 1 0
1 1 1 1 1 1 0 1 1 0 0 1 0 0 1 0 0 0 1 0 1 0 1 0 1 0 1
introduced in Fig.13.
0 0 0 0 0 0 1 0 0 1 1 0 1 1 0 1 1 1 0 1 0 1 0 1 0 1 0
As it can be seen, only the time instant of the failure
0
0 0 0 0 0 1 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 incidence represented by t f5 manifests itself in marking of
1 1 0 1 0 0 1 0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 p10 —compare both pictures in Fig.13 each other and both
3 2 3 0 2 3 0 0 2 1 0 0 1 1 1 0 2 1 2 1 3 2 2 1 3 2 3
of them with the corresponding part Fig.11 containing p10 .
(15) Courses of marking of all other places stay unchanged.
To give an image about time relations let us use TPN with time 3 Conclusion
parameters of the transitions (delays in a time unit) defined
by D = 0.2 × (1, 1, 1, 1, 1, 2, 2, 0.1, 0.05, 0.05), where The PN-based approach to dealing with failures in DES was
first 7 parameters concerns transitions t1 − t7 , 8-th parameter presented. It is based on utilizing RT/RG of the PN-based
is assigned to t f5 , 9-th parameter concerns tr2 and finally 10- model of DES. Moreover, the elimination of deadlock(s) by
123
152 Vietnam Journal of Computer Science (2018) 5:143–155
Fig. 10 The courses of marking the places p1 − p4 wrt. (with respect to) time
means of supervision (synthesizing of the suitable super- the model recovering process is individual. As to the compu-
visor) based on P-invariants of PN, introduced in [4], was tational complexity of the approach, it corresponds especially
utilized. to that of computing RT, that depends on the structure of the
The presented approach consists of the following steps: (i) PN model in question.
creating the PN model of the investigated kind of DES; (ii) To illustrate the soundness of the procedure, the case study
finding its behaviour in the standard (failure-free) situation; on the simple railroad crossing was introduced. Finally, the
(iii) analysing the model with respect to possible failures deadlock-free recovery model was found. It is necessary to
(in general, each system has its specificity and it is practi- emphasize that there are also the failures in DES which can-
cally impossible to find a unified approach for all systems); not be recovered by means of the procedure. They depend on
(iv) selecting the failures which can be successfully recov- human failures, bad properties and mistakes and/or on bad
ered (because there are different kinds of failures and some technical state of devices. They must be precluded either by
of them cannot be recovered—e.g., human failures of the means of the better preparation of human operators and/or
engine-driver or a mechanical problem in the crossing gate); by means of better executing maintenance of devices, their
(v) finding the structure of the recovered PN model; (vi) test- routine testing and/or checking, early replacing their compo-
ing its behaviour with respect to deadlocks; (vii) removing nents, etc.
deadlocks and finding the deadlock-free PN model. In future a possibility of generalization of the recovery
PN were used in all of the steps. They make possible to process by means of PN will be investigated.
create the uniform model of a system and compute its RT/RG.
However, in different systems different states can fail. Hence,
123
Vietnam Journal of Computer Science (2018) 5:143–155 153
Fig. 11 The courses of marking the places p5 − p12 wrt. time. The marking of p10 is directly influenced by t f5 (i.e., by a failure)
123
154 Vietnam Journal of Computer Science (2018) 5:143–155
Fig. 12 The courses of marking the places p13 − p15 wrt. time. The place p15 expresses the state (marking) of the supervisor
Fig. 13 The courses of marking the place p10 in the case (i) the left picture, and in the case (ii) the right picture
Acknowledgements The research was partially supported by the Slo- to the original author(s) and the source, provide a link to the Creative
vak Grant Agency for Science VEGA under Grant # 2/0029/17. The Commons license, and indicate if changes were made.
author thanks VEGA for the support.
Open Access This article is distributed under the terms of the Creative
Commons Attribution 4.0 International License (http://creativecomm
ons.org/licenses/by/4.0/), which permits unrestricted use, distribution,
and reproduction in any medium, provided you give appropriate credit
123
Vietnam Journal of Computer Science (2018) 5:143–155 155
References 15. Leveson, N.G., Stolzy, J.L.: Safety analysis using Petri nets. IEEE
Trans. Softw. Eng. SE–13(3), 386–397 (1987)
1. Bernardi, S. et al.: Model-driven availability evaluation of railway 16. Li, B., Khlif-Bouassida, M., Toguyéni, A.: On-the-Fly Diag-
control systems. In: Proceedings of 30th International Conference nosability Analysis of Labeled Petri Nets Using T-invariants.
on Computer Safety, Reliability and Security—SAFECOMP 2011, IFAC-Papers OnLine 48-7, pp. 064–070. Elsevier, Amsterdam
Naples, Italy. LNCS vol. 6894, pp. 15–28, Springer (2011) (2015)
2. Cabasino, M.P., Giua, A., Pocci, M., Seatzu, C.: Discrete event 17. Liu, B.: An Efficient Approach for Diagnosability and Diagnosis of
diagnosis using labeled Petri nets. An application to manufacturing DES Based on Labeled Petri Nets—Untimed and Timed Contexts.
systems. Control Eng. Pract. 19(9), 989–1001 (2011) Ph.D. Thesis, Laboratoire d’ Automatique, Génie Informatique et
3. Cabasino, M.P., Giua, A., Lafortune, S., Seatzu, C.: New approach Signal, École Centrale de Lille, Lille (2014)
for diagnosability analysis of Petri nets using verifier nets. IEEE 18. Murata, T.: Petri nets: properties, analysis and applications. Proc.
Trans. Autom. Control 57(12), 3104–3117 (2012) IEEE 77, 541–580 (1989)
4. Čapkovič, F.: Petri net-based synthesis of agent cooperation by 19. Odrey, N.G.: Error recovery in production systems: a Petri net based
means of modularity and supervision principles. In: Dimirovski, intelligent system approach. In: Kordic, V. (ed.) Petri Net,Theory
G.M. (ed.) Complex Systems. Relationships Between Control, and Applications, pp. 302–336. I-Tech Education and Publishing,
Communications and Computing, Chapter 20, Springer Series: Vienna (2008)
Studies in Systems, Decision and Control, pp. 429–450. Springer, 20. Peterson, J.L.: Petri Net Theory and the Modeling of Systems.
Cham (2016) Prentice-Hall Inc., Englewood Cliffs (1981)
5. Čapkovič, F.: Failures in discrete event systems and dealing with 21. Ramaswamy, S., Valavanis, K.P.: Modeling, analysis and simula-
them by means of Petri nets. In: Nguyen, N.T., et al. (eds.) ACIIDS tion of failures in a materials handling system with extended Petri
2017, Part I, LNAI 10191, pp. 379–391. Springer, Cham (2017) nets. IEEE Trans. Syst. Man Cybern. 24(9), 1358–1373 (1994)
6. Chang, S.J., DiCesare, F., Goldbogen, G.: Failure propagation trees 22. Ramírez-Treviño, A., Ruiz-Beltrán, A.E., Rivera-Rangel, I.,
for diagnosis in manufacturing systems. IEEE Trans. SMC 21(4), López-Mellado, E.: Online fault diagnosis of discrete event sys-
767–776 (1991) tems. A Petri net-based approach. IEEE Trans. Autom. Sci. Eng.
7. Chung, S., Wu, C., Jeng, M.: Failure diagnosis: a case study on 4(1), 31–39 (2007)
modeling and analysis by Petri nets. In: Proceedings of IEEE Inter- 23. Ramírez-Treviño, A., Ruiz-Beltrán, A.E., Arámburo-Lizárraga, J.,
national Conference on Systems, Man & Cybernetics, Washington, López-Mellado, E.: Structural diagnosability of DES and design
DC, 5–8 October 2003, pp. 2727–2732 (2003) of reduced Petri net diagnosers. IEEE Trans. Syst. Man Cybern. A
8. Desel, J., Reisig, W.: Place/transition Petri nets. In: Reisig, W., 42(2), 416–429 (2012)
Rozenberg, G. (eds.) Lectures on Petri Nets I: Basic Models. 24. Sessego, F., Giua, A., Seatzu, C.: HYPENS: a matlab tool for timed
Advances in Petri Nets, LNCS, vol. 1491, pp. 122–173. Springer, discrete, continuous and hybrid petri nets. In: van Hee, K.M., Valk,
Heidelberg (1998) R. (eds.) Applications and Theory of Petri Nets, LNCS, vol. 5062,
9. Desel, J., Esparza, J.: Free Choice Petri Nets. Cambridge Tracts pp. 419–428. Springer, New York (2008)
in Theoretical Computer Science, vol. 40. Cambridge University 25. Urban, S.D. et al.: The assurance point model for consistency and
Press, Cambridge (1995) recovery in service composition. In: Innovations, Standards and
10. Fanni, A., Giua, A., Sanna, N.: Control and error recovery of Petri Practices of Web Services: Emerging Research Topics, Chapter
net models with event observers. In: Proceeding of Second Inter- 12, pp. 250–287, IGI Global (2012)
national Workshop on Manufacturing and Petri Nets, Toulouse, 26. Wen, Y., Jeng, M.: Diagnosability analysis based on T-invariants of
France, pp. 53–68 (1997) Petri nets. In: Proceedings of 2005 IEEE International Conference
11. Giua, A.: State estimation and fault detection using Petri nets. on Networking, Sensing and Control, March 2005, pp. 371–376
In: Kristensen, L.M. and Petrucci, L. (Eds.): Proceedings of 32nd (2005)
International Conference on Applications and Theory of Petri Nets 27. Zaytoon, J., Lafortune, S.: Overview of fault diagnosis methods for
2011, Newcastle, UK, June 20–24, 2011. Lecture Notes in Com- discrete event systems. Annu. Rev. Control 37, 308–320 (2013)
puter Science, vol. 6709, pp. 419–428, Springer, New York (2011)
12. Guo, Z. et al: Failure recovery: when the cure is worse than the dis-
ease. In: Proceedings of 14th Workshop on Hot Topics in Operating Publisher’s Note Springer Nature remains neutral with regard to juris-
Systems, Santa Ana Pueblo, New Mexico, USA, May 13–15 2013, dictional claims in published maps and institutional affiliations.
USENIX, Berkeley. https://www.usenix.org/conference/hotos13/
failure-recovery-when-cure-worse-disease (2013)
13. Haar, S.: Types of Asynchronous Diagnosability and the Reveals-
Relation in Occurrence Nets. Research Report RR-6902. INRIA,
Rennes (2009)
14. Huang, Z., Chandra, V., Jiang, S., Kumar, R.: Modeling discrete
event systems with faults using a rules based modeling formalism.
Math. Comput. Model. Dyn. Syst. 9(3), 233–254 (2003)
123