• Aucun résultat trouvé

MehdiLhommeau,LaurentHardouin ,BertrandCottenceau,LucJaulin Intervalanalysisanddioid:applicationtorobustcontrollerdesignfortimedeventgraphs Briefpaper

N/A
N/A
Protected

Academic year: 2021

Partager "MehdiLhommeau,LaurentHardouin ,BertrandCottenceau,LucJaulin Intervalanalysisanddioid:applicationtorobustcontrollerdesignfortimedeventgraphs Briefpaper"

Copied!
8
0
0

Texte intégral

(1)

www.elsevier.com/locate/automatica

Brief paper

Interval analysis and dioid: application to robust controller design for timedevent graphs

Mehdi Lhommeau , Laurent Hardouin

, BertrandCottenceau , Luc Jaulin

Laboratoire d’Ingenierie des Systemes Automatises, 62, Avenue Notre Dame du Lac, 49000 Angers, France Received12 May 2003; receivedin revisedform 27 November 2003; accepted27 May 2004

Available online 29 July 2004

Abstract

This paper deals with feedback controller synthesis for timed event graphs, where the number of initial tokens and time delays are only known to belong to intervals. We discuss here the existence and the computation of a robust controller set for uncertain systems that can be described by parametric models, the unknown parameters of which are assumed to vary between known bounds. Each controller is computed in order to guarantee that the closed-loop system behavior is greater than the lower bound of a reference model set and is lower than the upper boundof this set. The synthesis presentedhere is mainly basedon dioid, interval analysis andresiduation theory.

?2004 Elsevier Ltd. All rights reserved.

Keywords:Discrete-event systems; Timed event graphs; Dioid; Interval analysis; Residuation theory; Feedback synthesis

1. Introduction

Discrete event systems (DES) appear in many appli- cations in manufacturing systems (Ayhan & Wortman, 1999), computer andcommunication systems (LeBoudec &

Thiran, 2002) andare often describedby the Petri net for- malism. Timed-event graphs (TEG) are Timed Petri nets in which all places have single upstream andsingle down- stream transitions andappropriately model DES character- izedby delay andsynchronization phenomena. TEG can be described by linear equations in the dioid algebra (Baccelli, Cohen, Olsder, & Quadrat, 1992;Cohen, Moller, Quadrat,

& Viot, 1989) andthis fact has permittedmany important achievements on the control of DES modelled by TEG (Cohen et al., 1989; Cottenceau, Hardouin, Boimond, &

Ferrier, 2001; Menguy, Boimond, Hardouin, & Ferrier, 2000; LAuders & Santos-Mendes, 2002). TEG control

This paper was not presentedat any IFAC meeting. This paper was recommendedfor publication in revisedform by Associate Editor Xiren Cao under the direction of Editor Ian Petersen.

Corresponding author. Tel.: +33-2-41-22-65-64;

fax: +33-2-41-22-65-61.

E-mail addresses:lhommeau@istia.univ-angers.fr(M. Lhommeau), laurent.hardouin@istia.univ-angers.fr(L. Hardouin),

cottence@istia.univ-angers.fr(B. Cottenceau), jaulin@univ-angers.fr(L. Jaulin).

problems are usually statedin a just-in-time context. The design goal is to achieve some performance while minimiz- ing internal stocks. In Baccelli et al. (1992) andMenguy et al. (2000)an optimal open-loop control law is given. In Cottenceau et al. (2001)linear closed-loop controllers syn- thesis are given in a model matching objective, i.e. the con- troller synthesis is done in order that the controlled system will behave as close as possible to a reference model and will delay as much as possible the token input in the sys- tem. The reference model is a priori known and depicts the desiredbehavior of the correctedsystem.

This paper aims at designing robust feedback controller when the system includes some parametric uncertainties which can be described by intervals. First, by using interval analysis, we give a model to depict TEG with number of tokens andtime delays which are assumedto vary between known bounds.1 Next, we consider a controller synthesis for these uncertain systems. The controller synthesis is done in order to maintain the controlled system in a set of admissi- ble behaviors. We assume that the upper andlower boundof

1In a manufacturing context, these systems can represent production systems in which the number of resources varies with time (e.g. due to some maintenance operations, or to some machines breakdowns, etc.) or in which the processing times are not well known but vary in known intervals.

0005-1098/$ - see front matter?2004 Elsevier Ltd. All rights reserved.

doi:10.1016/j.automatica.2004.05.013

(2)

this speciIcation set are a priori known, the synthesis yields a controller set2 which guarantees that the closed-loop sys- tem behavior is both greater than the lower boundof the speciIcation set andlower than the upper boundof this same set. Controller synthesis is obtained by considering residu- ation theory which allows the inversion of mapping deIned over orderedsets, andinterval analysis which is known to be eJcient to characterize set of robust controllers in a guar- anteedway (Jaulin, KieLer, Dirit, & Walter, 2001).

2. Dioids and residuation

Denition 1. A dioidDis a set endowed with two internal operations denoted by(addition) and(multiplication), both associative andboth having neutral elements denoted byande, respectively, such thatis also commutative and idempotent (i.e.aa=a). Theoperation is distributive with respect to⊕, and is absorbing for the product (i.e.

a=a=;∀a). When⊗is commutative, the dioid is saidto be commutative. The symbolis often omitted.

Dioids can be endowed with a natural order:a ¡b iL a=ab. Then they become sup-semilattices andab is the least upper boundofaandb. A dioid iscompleteif sums of inInite number of terms are always deIned, and if multiplication distributes over inInite sums too. In particu- lar, the sum of all elements of the dioidis deInedandde- notedby(for ‘top’). A complete dioid (sup-semilattice) becomes a lattice by constructing the greatest lower bound of a andb, denoted by ab, as the least upper boundof the (nonempty) subset of all elements which are less thana andb(seeBaccelli et al., 1992, Section4).

Denition 2(Subdioid). A subset Cof a dioidis calleda subdioid ofDif

CandeC;

Cis closedforand⊗, i.e.∀a; b∈C,abCand abC.

Theorem 3(Cottenceau et al., 2001). Over a complete dioidD,the implicit equationx=axbadmitsx=abas least solution,where a=i∈Nai (Kleene star operator) witha0=e.In the following this operator will sometimes be represented by the mapping K:D D; x x. Furthermore,lettingx; yD,we have

x(yx)= (xy)x; (1)

(x)=x: (2)

2It is a set of robust controllers which ensures that, for all the possible behaviors of the uncertain system, the controlledsystem is slower than a reference model (a speciIcation which is described as a TEG) and is faster than another one.

The residuation theory provides, under some assumptions, optimal solutions to inequalities such asf(x)4 b, where f is an isotone mapping (f s.t. a 4 b f(a) 4 f(b)) deIned over ordered sets.

Denition 4(Residual and residuated mapping). An iso- tone mappingf:DE, whereDandEare ordered sets, is a residuated mapping if for all yE, the least upper boundof the subset {x|f(x) 4 y} exists andbelongs to this subset. It is then denoted by f](y). Mapping f] is calledthe residual of f. When f is residuated, f] is the unique isotone mapping such that

ff]4IdE and f]f¡IdD; (3) whereIdis the identity mapping, respectively, onDandE.

Property 5. Letf:DEbe a residuated mapping,then yf(D)f(f](y)) =y:

Property 6(Baccelli et al., 1992, Theorem 4.56). Ifh:D C andf:C Bare residuated mappings,then fhis also residuated and

(fh)]=h]f]: (4)

Theorem 7(Baccelli et al., 1992, Section 4.4.2). Consider the mapping f:E F, where E and F are complete dioids. Their bottom elements are, respectively, denoted by E and F. Then, f is residuated i6 f(E) = F

and f(⊕x∈Gx) =x∈Gf(x) for each G E (i.e., f is lower-semicontinuous).

Corollary 8. The mappingsLa:xaxandRa:xxade- 7ned over a complete dioidDare both residuated.3 Their residuals are usually denoted,respectively,byL]a(x) =a x andR]a(x) =x ain(max;+)literature.4

Theorem 9 (Baccelli et al., 1992, Section 4.4.4;MaxPlus, 1991). The mappingsx a xandx x asatisfy the following properties:

ax=a (ax); xa= (xa) a; (5) (ab) x=b (a x); x (ba) = (x a) b; (6) a (xy) =a xa y; (xy) a=x ay a; (7)

a a= (a a); a a= (a a): (8)

The problem of mapping restriction andits connection with the residuation theory is now addressed.

3This property also concerns the matrix dioid, for instanceX AX where A; XDn×n. SeeBaccelli et al. (1992) for the computation of A BandB A.

4a bis the greatest solution ofax4b.

(3)

Proposition 10(Blyth & Janowitz, 1972). LetId|Dsub:Dsub

D, x x be the canonical injection from a complete subdioid into a complete dioid. The injectionId|Dsubis resid- uated and its residual is a projector which will be denoted byPrsub,therefore,

Prsub= (Id|Dsub)]=PrsubPrsub:

Denition 11(Restrictedmapping). Let f:E F be a mapping andAE. We will denote5 f|A:AFthe mapping deIned byf|A=fId|A whereId|A:A E.

Identically, letBFwithImfB. MappingB|f:E Bis deIned byf=Id|BB|f, whereId|B:BF.

Proposition 12. Let f:D Ebe a residuated mapping andDsub(resp.Esub)be a complete subdiod ofD(resp.E).

1. Mappingf|Dsub is residuated and its residual is given by

(f|Dsub)]= (fId|Dsub)]=Prsubf]:

2. IfImf Esubthen mappingEsub|f is residuated and its residual is given by

(Esub|f)]=f]Id|Esub= (f])|Esub:

Proof. Statement 1 follows directly from Property 6 and Proposition10. Statement 2 is obvious sincefis residuated andImfEsubE.

Denition 13 (Closure mapping). An isotone mapping f:EEdeIned on an ordered setEis a closure mapping iff¡IdEandff=f.

Proposition 14(Cottenceau et al., 2001). Let f:E E be a closure mapping. A closure mapping restricted to its imageImf|fis a residuated mapping whose residual is the canonical injectionId|Imf:ImfE,xx.

Corollary 15. The mapping ImK|K is a residuated map- ping whose residual is(ImK|K)]=Id|ImK.This means that x=a is the greatest solution to inequalityx 4a.Ac- tually,the greatest solution achieves equality.

Proposition 16. Let MA:x (ax)a, be a mapping de- 7ned over a complete dioid. ConsidergDanddD.Let us consider the following sets:

G1={g| ∃ds:t: g=da}

and G2={g| ∃ds:t: g=ad}: (9) The mappingsG1|Maand G2|Ma are both residuated. Their residuals are such that(G1|Ma)](x) = (G2|Ma)](x) =a x a.

Furthermore,ImMa(G1G2).

5These notations are borrowedfrom classical linear system theory see Wonham (1985).

Proof. According to DeInition4, since the mappingLa is residuated (cf. Corollary8) andaccording to (1), we have (ax)a=a(xa)4da(xa)4a (da):

According to (5) and(6), we can rewrite a (da) = a (d (da)) = (da) (da). According to (8), this last expression shows thata (da) belongs to the image ofK.

SinceImK|Kis residuated (cf. Corollary15), there is also the following equivalence:

(xa)4a (da)xa4a (da):

Finally, sinceRais also residuated (cf. Corollary8), we ver- ify thatx=a (da) ais the greatest solution of (ax)a4 da, ∀d∈D. That amounts to saying thatG1|Ma is residu- ated. Similarly, one can show thatG2|Mais residuated, then ifg(G1G2),Ma(x)4gadmits a greatest solution.

Moreover, Eq. (1) leads to (ax)a=a(xa), by choosing d=axord=xa, it comesImMa(G1G2).

Corollary 17. IfgImMa,thenx=a g ais the greatest solution to the equation(ax)a=g.

Proof. FirstImMa(G1G2), thusImMa|Mais residuated.

Furthermore, ∀y∈ImMa,Ma(x) =yadmits a solution, i.e.

ImMa|Mais surjective, then (ImMa|Ma)]provides the greatest solution (see Property 5).

3. Dioid of pairs

The set of pairs (x; x) withxDandxDendowed with two coordinate-wise algebraic operations

(x; x)(y; y) = (xy; xy) and(x; x)(y; y) = (xy; xy);

is a dioid denoted by C(D) with (; ) as the zero element and(e; e) as the identity element (see DeInition1).

Remark 18. The operationgenerates the corresponding canonical partial order 4C inC(D): (x; x)(y; y) = (y; y) (x; x) 4C (y; y) x 4D y andx 4D ywhere4Dis the order relation inD.

Proposition 19(Litvinov & Sobolevski, 2001). If the dioid Dis complete,then the dioidC(D)is complete and its top element is given by(;).

(4)

Notation 20. Let us consider the following mappings overC(D):

L(a;a): (x; x)(a; a)(x; x);

R(a;a) : (x; x)(x; x)(a; a):

Proposition 21. The mappingsL(a;a) andR(a;a)de7ned overC(D)are both residuated. Their residuals are equal toL](a;a)(b; b) = (a; a) (b; b) = (a b; a b)and R](a;a)(b; b) = (b; b) (a; a) = (b a; b a).

Proof. Observe thatL(a;a)(⊕(x;x)∈X(x; x))=⊕(x;x)∈X L(a;a)(x; x), (for every subset X of C(D)), moreover L(a;a)(; ) = (a; a) = (; ). ThenL(a;a) is residuated (follows from Theorem7). Therefore, we have to Ind, for given (b; b) and(a; a), the greatest solution (x; x) for inequality (a; a)(x; x)4C (b; b) (ax; a x)4C (b; b), moreover according to Remark18on the order relation induced byonC(D) we have,

ax4Db and ax4Db:

Since the mappings x a x and x a x are residuated over D (cf. Corollary 8), we have x 4D

a bandx4Da b. Then, we obtainL](a;a)(b; b) = (a b; a b).

Notation 22. The set of pairs (x;x) s.t.x4xis denoted byCO(D).

Proposition 23. LetDbe a complete dioid. The setCO(D) is a complete subdioid ofC(D).

Proof. ClearlyCO(D)C(D) andit is closedforand since:xy 4xyandxy 4xywheneverx4 xandy4y. Moreover, zero element (; ), unit element (e; e) andtop element (;) ofC(D) are inCO(D).

Proposition 24. The canonical injectionId|CO(D):CO(D) C(D) is residuated. Its residual(Id|CO(D))] is a projector denoted byPrCO(D).Its practical computation is given by PrCO(D)((x; x)) = (xx; x) = (x;x): (10) Proof. It is a direct application of Proposition 10, since CO(D) is a subdioid of C(D). Practically, let (x; x)C(D), we havePrCO(D)((x; x)) = (x;x) = (x x; x), which is the greatest pair such that:

x4x; x4x and x4x:

Denition 25. An isotone mapping f deIned over D admits a natural extension over CO(D), which is de- Inedas f(x;x) = (f(x); f(x)). For example, the Kleene star mapping inCO(D) is deIned byK(x;x) = (K(x);K(x)) = (x;x).

Proposition 26. Let (a;a)CO(D), mapping

CO(D)|L(a;a)|CO(D):CO(D) CO(D) is residuated. Its residual is given by

(CO(D)|L(a;a)|C

O(D))]=PrCO(D)(L(a;a))]I|CO(D): Proof. Since (a;a)CO(D)C(D), it follows directly from Proposition21that mappingL(a;a)deIned overC(D) is residuated. Furthermore, CO(D) being closedfor we have ImL(a;a)|C

O(D) CO(D), it follows from DeInition 11andProposition12that

(CO(D)|L(a;a)|C

O(D))]= (L(a;a)I|CO(D))]I|CO(D)

=PrCO(D)(L(a;a))]I|CO(D): Then, by considering (b;b)CO(D)C(D), the greatest solution inCO(D) ofL(a;a)((x;x))=(a;a)⊗(x;x)4 (b;b) isL](a;a)((b;b)) = (x;x) = (a;a) (b;b) = PrCO(D)((a b;a b)) = (a ba b;a b).

4. Dioid and intervalmathematics

Interval mathematics was pioneeredby R.E. Moore as a tool for bounding and rounding errors in computer pro- grams. Since then, interval mathematics hadbeen developed into a general methodology for investigating numerical un- certainty in numerous problems andalgorithms, andis a powerful numerical tool for calculating guaranteedbounds on functions using computers.

In Litvinov andSobolevski (2001)the problem of inter- val mathematics in dioids is addressed. The authors give a weak interval extensions of dioids and show that idempotent interval mathematics appears to be remarkably simpler than its traditional analog. For example, in the traditional inter- val arithmetic, multiplication of intervals is not distributive with respect to addition of intervals, while idempotent in- terval arithmetic keeps this distributivity. Below, we state that residuation theory has a natural extension in dioid of intervals.

Denition 27. A (closed) interval in dioidDis a set of the formx=[x;x]=Q {t∈D|x4t4x}, where (x;Q x)Q CO(D), x(respectively, Qx) is saidto be lower (respectively, upper) boundof the intervalx.

Proposition 28. The set of intervals,denoted byI(D),en- dowed with two coordinate-wise algebraic operations

x⊕yQ = [xy;xQy]Q

and x⊗yQ = [xy;xQy]Q (11)

is a dioid,where the interval=[; ] (respectively,e=[e; e]) is zero(respectively,unit)element ofI(D).Moreover,the dioidI(D)is isomorphic toCO(D).

(5)

Proof. First,xy4xQyQ andxy4xQyQ whenever x 4 xQ and y 4 y, then I(D) is closedwith respect toQ the operations Q⊕;⊗. From DeInitionQ 1, it follows directly that it is a dioid. Obviously, it is isomorphic toCO(D) (see Proposition23).

Remark 29. Let D be a complete dioid and {x} be an inInite subset of I(D), the inInite sum of elements of this subset is

x=

x;

xQ

:

Remark 30. IfDis a complete dioid then I(D) is a complete dioid by considering DeInition 29. Its top element is given by= [;].

Note that ifxandyare intervals in I(D), thenxyiL y4 x4xQ4y. In particular,Q x=y iLx=yandQx= Qy.

An interval for whichx= Qxis calleddegenerate. Degenerate intervals allow to represent numbers without uncertainty. In this case we identifyxwith its element by writingxx.

Proposition 31. Mapping La: I(D)I(D);x a⊗xQ is residuated. Its residual is equal toL]a(b) =a b= [a b Q

a b;QaQ b].Q

Proof. Let :CO(D) I(D);(x;x) [x;x] = [Q x;x] be the mapping which maps an interval to an ordered pair.

This mapping deInes an isomorphism, since it is suJcient to handle the bounds to handle an interval. Then the result follows directly from Proposition26.

Remark 32. We wouldshow in the same manner that map- pingRa: I(D)I(D);xx⊗aQ is residuated.

Remark 33. It is possible to extendthe Kleene star operator over I(D) (see Example 25). ThenImK|Kis also a residuated mapping (see Corollary 15) whose residual is (ImK|K)]= Id|ImK. This means thatx=a is the greatest solution to inequalityx= [x;xQ]4a= [a;aQ].

5. Intervalarithmetic and TEG

It is well known that the behavior of a TEG can be ex- pressed by linear state equations over some dioids, e.g. over dioid of formal power series with coeJcients inZmax and exponents inZnamelyZmax<=.

X =AX BU; (12)

Y =CX; (13)

where X(Zmax<=)n represents the internal transitions behavior, U(Zmax<=)p represents the input transitions behavior, Y(Zmax<=)q represents the output transitions behavior, and A(Zmax<=)n×n, B(Zmax<=)n×p and

C(Zmax<=)q×nrepresent the link between transitions.

Fig. 1. An uncertain TEG with a controller (bolddottedlines).

Remark 34. A; B; C entries are periodic and causal series (i.e., rational andrealizable series seeBaccelli et al., 1992), andthen are in subdioidZ+max<=, which is the subset of causal element inZ+max<=(We refer the reader toCohen et al. (1989)andCottenceau et al. (2001)for a complete pre- sentation). According to Proposition10, the canonical injec- tion Id|Z+

max<=:Z+max<= Zmax<= is residuated. Its residual

is denoted byPr+ andits computation for allsZmax<=is given by

Pr+

k∈Z s(k)k

=

k∈Zs+(k)k where

s+(k) =

s(k) if (k; s(k))¿(0;0);

otherwise:

The uncertain systems, which will be considered, are TEG where the number of tokens andtime delays are only known to belong to intervals. Therefore, uncertain- ties can be described by intervals with known lower and upper bounds and the matrices of Eqs. (12) and(13) are such that AAI(Z+max<=)n×n,BBI(Z+max<=)n×p

and CCI(Z+max<=)q×n, each entry of matrices A, B,

C are intervals with bounds in dioid Z+max<= with only non-negative exponents andinteger coeJcients. By The- orem 3, Eq. (12) has the minimum solution X =ABU.

Therefore, Y =CABU andthe transfer function of the system is H=CABH=CABI(Z+max<=)q×p, where Hrepresents the interval in which the transfer function will lie for all the variations of the parameters.

Fig. 1 shows a TEG with 2 inputs and1 output, which may represent a manufacturing system with 3 machines. Ma- chinesM1andM2produce parts assembled on machineM3. The token in dotted line means that the resource may or may not be available to manufacture parts (e.g. a machine may be disabled for maintenance operations: : :). Durations

(6)

in brackets give the interval in which the temporization of the place may evolve. This may represent an operation with a processing time which is not well known (e.g. a task ex- ecutedby a human, etc.). For instance, machine M1 can manufacture 1 or 2 parts andeach processing time will last between 2 and5 time units, this leads to a parameter which evolves in intervalA1;1=[22;5]. The exponent indenotes resource number, andthe coeJcient depicts the processing time. Therefore, we obtain the following interval matrices:

A=



[22;5] [; ] [; ] [; ] [33;32] [; ] [3;4] [2;6] [23;3]



;

B=



[e; e] [; ] [; ] [e; e]

[; ] [; ]



C= ([; ] [; ] [e; e]): (14)

It follows from Theorem3that the transfer functionH be- longs to the interval matrixHgiven below. It characterizes the whole transfer functions arising from (14)

H=CAB= ([3(22);4(5)] [2(33);6(3)]):

Remark 35. We can easily check that I(Z+max<=) is a subdioid of I(Zmax<=) andthat the residual of the canon- ical injection Id|I(Z+

max<=) is given by IPr+: I(Zmax<=)

I(Z+max<=);xIPr+(x) = [Pr+(x);Pr+( Qx)].

6. Robust feedback controller synthesis

We consider the behavior of ap-inputq-output TEG by a state representation such as (12) and(13). We focus here on output feedback controller synthesis denoted byF, added between the output Y andthe input U of the system (see Fig.2). Therefore, the process input satisIesU=V FY, andthe output is describedbyY =H(VFY). According to Theorem3, the closed-loop transfer relation (depending onF) is then equal toY = (HF)HV, whereHH is the uncertain system transfer.

The objective of the robust feedback synthesis is to com- pute a controllerFwhich is realizable (i.e.,Fis periodic and causal) andwhich imposes a desiredbehavior (a speciIca- tion) to the uncertain system. The Irst problem addressed here, consists in computing the greatest interval (in the sense of the order relation 4I(Z+

max<=)p×q), denoted by ˆF , which

guarantees that the behavior of the closed-loop system is lower thanGrefI(Z+max<=)q×p(a speciIcation which is de- Inedas an interval of causal andperiodic elements) for all HH. Formally the problem consists in computing the up- per boundof the following set:

{F∈I(Z+max<=)p×q|(HF)H4Gref}: (15)

Fig. 2. An uncertain system with a feedback controller.

Proposition36shows that this problem admits a solution for some reference models.

Proposition 36. Let MH: I(Z+max<=)p×q I(Z+max<=)q×p; F(HF)Hbe a mapping. Let us consider the following sets:

G1={G∈I(Z+max<=)q×p | ∃D∈I(Z+max<=)q×q

such thatG=DH};

G2={G∈I(Z+max<=)q×p | ∃D∈I(Z+max<=)p×p

such thatG=HD};

IfGrefG1G2,there exists a greatestFI(Z+max<=)p×q such thatMH(F)4Gref,and it is given by

Fˆ=⊕{F∈I(Z+max<=)p×q|(HF)H4Gref}

=H Gref H: (16)

Proof. Follows directly from Proposition16.

Below, we consider the robust controllers set, denoted by F, such that the transfer of the closed-loop system be in Gref for allHH

F={F∈Z+max<=p×q|(HF)HGref}:

Proposition 37. IfGrefImMH,thenFˆF.

Proof. IfGrefImMH, thenMH( ˆF)=Grefdue to Corollary 17, thus (HF)ˆ H Gref. Obviously, this is equivalent to

∀F∈F;ˆ (HF)HGref, which leads to the result.

Proposition37shows that ifGrefImMHeach feedback controllerFFˆis also inF. From a practical point of view this means that for all number of tokens andholding time belonging to the given intervals the closed-loop system will be in the speciIcation interval.

Remark 38. From a computational point of view we have Fˆ=H Gref H= [H;HQ] [Gref;GQref] [H;H]Q

= [Pr+(H Gref)Pr+( QH GQref);Pr+( QH GQref)] [H;H]Q

= [Pr+(H GrefHQ GQref);Pr+( QH GQref)] [H;H]Q

(7)

= [Pr+((Pr+(H GrefHQ GQref)) H)Pr+( QH Pr+

( QGref H));Q Pr+( QH Pr+( QGref HQ))]

= [Pr+(H Gref HHQ GQref HHQ GQref HQ)

;Pr+( QH GQref HQ)] follows from (7):

The last equation may be simpliIedsince ( QH GQref) H ¡ ( QH GQref) QHdue to the antitony of mappinga x(i.e.,x1¡ x2 a x1 4 a x2), then QH GQref H HQ GQref HQ = HQ GQref H. Therefore,Q

Fˆ= [ ˆF;F] =ˆ H Gref H

=IPr+([H Gref HHQ GQref H;Q HQ GQref HQ]):

Corollary 39. IfGrefImMH,then the upper bound of the intervalF,ˆ denoted byFˆ,is the upper bound of the setF.

Proof. Proposition37yields (HF)ˆ H=Gref, i.e., [(HFˆ)H;

( QHFˆ)H] = [GQ ref;GQref]. Furthermore, GrefImMH im- plies that there exists F such that QGref = ( QHF)HQ, i.e., GQrefImMH then, due to Corollary17, ˆF= QH GQref HQ is the greatest feedback such that QGref = ( QHFˆ)H, thus theQ greatest inF.

7. Example: output feedback synthesis

We describe a complete synthesis of a controller for the uncertain TEG depictedwith solidblack lines in Fig.1. The reference model chosen is

Gref=

H

2

2

H

=

[353(1);4(5)]

[2(42)(1);69122153184215256(5)] t

: This speciIcation means that no more than two tokens can

input in the TEG at the same moment. We refer the reader to Cottenceau et al. (2001),Cottenceau, Lhommeau, Hardouin, andBoimond(2003)andMaia, Hardouin, Santos-Mendes, andCottenceau (2003) for a discussion about reference model choice. We aim at computing the greatest interval of robust controllers which keep the same objective.

According to Proposition36andsolution (16), the con- troller is obtainedby computingH Gref H. Therefore, we obtain (see (38))

Fˆ=

[2(1); 2(5)]

[2(1); 2336495136(5)]

:

All controllers in this interval allow to achieve the objec- tive given in Proposition 37. For the realization, it is nec- essary to choose one feedback in the interval ˆF. Its up- per bound, ˆF, leads to a closed-loop behavior which is in [(HF)ˆ H;( QHF)ˆ HQ], i.e. an interval which have the same upper boundthan Gref. The lower bound, ˆF, leads to a closed-loop behavior which is in [(HF)ˆ H;( QHF)ˆ HQ], i.e.

an interval which have the same lower boundthan Gref. Consequently the choice of the controller may be done by considering the desired location in Gref of the interval de- picting the closed-loop system. Here we choose ˆF which allows to delaying as much as possible the input of tokens while preserving the possibility to match the lower boundof Gref, i.e. the fastest behavior allowedby the speciIcation.

Fig.1shows one realization of this controller (bolddotted lines), which is equal to

Fˆ= (2(1)2(1))t:

Remark 40. The reader can Ind Scilab andC+ + toolbox in order to handle periodic series (seeSW2001, 2001). The script allowing to compute the controller of the illustration are also available.

8. Conclusion

In this paper we assumedthat the TEG includes some parametric uncertainties in a bounded context. We have given a robust feedback controller synthesis which ensures that the closed-loop system transfer is in a given interval for all feasible values for the parameters. The next step is to extendthis work to other control structures such as the one given inMaia et al. (2003). The traditional interval theory is very eLective for parameter estimation, it wouldbe interest- ing to apply the results of this paper to the TEG parameter estimation such as the one studied in Jaulin, Boimond, and Hardouin (1999).

References

Ayhan, A., & Wortman, M. A. (1999). Job Tow control in assembly operations. IEEE Transactions on Automatic Control,44(4), 864–

868.

Baccelli, F., Cohen, G., Olsder, G. J., & Quadrat, J. P. (1992).

Synchronization and linearity : An algebra for discrete event systems.

New York: Wiley.

Blyth, T. S., & Janowitz, M. F. (1972). Residuation theory. Oxford:

Pergamon Press.

Cohen, G., Moller, P., Quadrat, J. P., & Viot, M. (1989). Algebraic tools for the performance evaluation of discrete event systems.IEEE proceedings: Special issue on Discrete Event Systems,77(1), 39–58.

(8)

Cottenceau, B., Hardouin, L., Boimond, J.-L., & Ferrier, J.-L. (2001).

Model reference control for timed event graphs in dioids.Automatica, 37, 1451–1458.

Cottenceau, B., Lhommeau, M., Hardouin, L., & Boimond, J.-L. (2003).

On timed event graph stabilization by output feedback in dioid.

Kybernetika,39(2), 165–176.

Jaulin, L., Boimond, J.-L., & Hardouin, L. (1999). Estimation of discrete event systems using interval computation.Reliable Computing,5(2), 165–173.

Jaulin, L., KieLer, M., Dirit, O., & Walter, E. (2001).Applied interval analysis with examples in parameter and state estimation, robust control and robotic. London: Springer.

LeBoudec, J.-Y., & Thiran, P. (2002).Network calculus. Berlin: Springer.

Litvinov, G. L., & Sobolevski, A. N. (2001). Idempotent interval analysis andoptimization problems.Kluwer, Reliable Computing,7(5), 353–

LAuders, R., & Santos-Mendes, R. (2002). Generalized multivariable377.

control of discrete event systems in dioid. Workshop on Discrete Event Systems,WODES’02, Zaragoza.

Maia, C. A., Hardouin, L., Santos-Mendes, R., & Cottenceau, B. (2003).

Optimal closed-loop control of timed event graphs in dioid. IEEE Transactions on Automatic Control,48(2), 2284–2287.

MaxPlus, (1991). Secondorder theory of min-linear systems andits application to discrete event systems. InProceedings of the 30th CDC, Brighton, England, December 1991.

Menguy, E., Boimond, J.-L., Hardouin, L., & Ferrier, J.-L. (2000). Just in time control of timedevent graphs: Update of reference input, presence of uncontrollable input.IEEE Transactions on Automatic Control,45(11), 2155–2159.

SW2001 (2001). Software tools for manipulating periodic series.

http://www.istia-angers.fr/hardouin/outils.html, http://amadeus.inria.fr/gaubert/PAPERS/MAX.html.

Wonham, W. (1985). Linear multivariable control: A geometric approach(3rded.). Berlin: Springer.

Bertrand Cottenceauwas born in France, in 1973. He receivedthe Ph.D. degree from the University of Angers, France, in 1999. His research interest is the control of discrete event systems.

Laurent Hardouinwas born in France, in 1967. He receivedthe Ph.D. degree from the University of Poitiers, France, in 1993.

He is currently Assistant Professor at the University of Angers andthe Headof the Departement of Automatic Control and Computing of the Institut des Sciences et Techniques de l’IngXenieur d’Angers. His research interests are in modeling and con- trol of discrete event systems and in active control of acoustic devices.

Luc Jaulinreceivedthe Ph.D. degree in au- tomatic control from the University of Or- say, France in 1993. He is currently Assis- tant Professor of Physics at the University of Angers, France since 1993. He does his research at the Laboratoire d’IngXenierie des SystYemes AutomatisXes (LISA) on robust es- timation andcontrol using interval methods.

Mehdi Lhommeau was born in France, in 1975. He receivedthe Ph.D. degree from the University of Angers, France in 2003.

He does his research at the Laboratoire d’IngXenierie des SystYemes AutomatisXes (LISA) on control of discrete event systems.

Références

Documents relatifs

Humerical computation comes clown to a particular kind of correspon- dence analysis... en une

In this paper, we adopt a global (in space) point of view, and aim at obtaining uniform estimates, with respect to initial data and to the blow-up points, which improve the results

Example results are (i) the mean and variance of the number of (possibly overlapping) ordered labeled subgraphs of a labeled graph as a function of its randomness deficiency (how far

For instance, a collaborative location-aware filtering approach to recommend POIs to mobile users was proposed in [16], which exploits the location as a relevant element for

Nicolas Delanoue, Luc Jaulin, Bertrand Cottenceau Stabilility analysis of a nonlinear system using interval analysis.... Tools Lyapunov theory Algorithm to prove stability

From the point of view of this workshop, the most important balance is be- tween giving freedom of action to the learner, which recognises the importance of students’ autonomy

In addition to per- formance considerations, ontology learning tools need to be fully integrated into the knowledge engineering life-cycle, working in the background and providing

In [8] linear closed-loop controllers synthesis are given in a model matching objective, i.e., a given reference model describes the desired performance lim- its, then the goal is