Skip to main content
Top

Open Access 27-04-2024 | Research Article-Computer Engineering and Computer Science

Control of Discrete Event Systems by Using Symbolic Transition Model: An Application to Power Grids

Author: Mete Özbaltan

Published in: Arabian Journal for Science and Engineering

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a new symbolic modeling framework is proposed for the control of discrete event systems (discrete controller synthesis). Reactive infinite-state systems are generally dynamic systems with inputs and outputs. Modeling the outputs in existing symbolic modeling methods for reactive infinite-state systems has not been extensively discussed in the literature. It is crucial to realistically model the outputs and obtain reliable controllers. One of the main contributions and innovations in this study is the ability to symbolically model their output. In this direction, symbolic transition models are offered, where events are defined as guarded symbolic transitions. The framework considers input/output reactive infinite-state systems to satisfy safety and optimization objectives. Effective algorithms and safety control policies are offered to solve the safety control problem (i.e., satisfy the safety objective) for input/output infinite-state systems. Another contribution in this work provides optimization targets within a given cost function based on state transitions, without specifying the target states. The framework is then applied to power grids to demonstrate the effectiveness of the symbolic transition models and experimentally evaluate the new control algorithms. The results showed that the approach is very effective compared to other approaches found in the literature. The computation times required to achieve both safety and optimization objectives are obtained relatively quickly compared to other deterministic methods found in the literature.

1 Introduction

The control theory of discrete event systems (DES) has been proposed by [1] as language theory, typically aimed at synthesizing a controller for a given system and control objectives. Subsequently, many modeling approaches have emerged, including automata [2], finite state machines [1], and Petri nets [3]. Despite the availability and study of several types of modeling formalisms for the control theory of discrete event systems, these models have suffered from the state explosion problem [4].
The computation of data flow models is specified by a directed graph whose nodes represent states and edges represent transitions. The use of data flow models (symbolic approach) addresses scalability issues, specifically the state explosion problem, where models of infinite discrete event systems can be composed of a finite set of symbolic transitions [4]. Similarly, in our case, events are defined as guarded symbolic transitions through our symbolic transition model. Thus, the model of an infinite-state system consists of a set of finite symbolic transitions. The specification of our models (plants) is considered using the concept of synchronous data flow languages, which extends the computation of data flow models with conditional statements. This implies that explicit automata (i.e., state transitions) are symbolically (i.e., implicitly) encoded using synchronous languages. Control theory is then applied to a data flow model to synthesize controllers satisfying safety and optimization control objectives.
The works [59] have applied the input/output symbolic approach for synthesizing a safety controller. All of them utilize the same synthesis algorithm constructed in [10]; however, they have considered handling only boolean variables. [11, 12] represent the most recent works on symbolic discrete controller synthesis algorithms for infinite-state systems; however, they have not considered the specification of outputs. On the other hand, the input/output approach has been considered in some papers; however, systems are defined as finite state machines or automata [13]. For example, an automata-based synchronous language approach has been explored in [14]; however, the state explosion problem prompts the use of symbolic approaches.
Reactive infinite-state systems typically involve both input and output variables. This case has not been taken into account in previous studies on the symbolic approach for the control of such systems, they have considered handling only input variables. Our contribution fills this gap by presenting a symbolic transition model for the control of input/output infinite-state systems, aiming to satisfy safety objectives. Our models better accommodate the modeling of discrete event systems as they consider both input and output variables.
Meanwhile, other studies on discrete controller synthesis (DCS) have considered optimization objectives [6, 7] and cost function [15], where these strategies are based on the dynamic programming algorithm [16]. The target state space should be defined in order to compute an optimal controller in these works mentioned. Our new symbolic limited optimal control algorithm presented in this paper considers cost functions based on state transitions instead of defining the target states in order to deal with the optimization objective. This algorithm offers a new solution in this sense for better handling of discrete event systems modeling.
Several studies have applied discrete controller synthesis techniques to various systems in the literature. For instance, [17] successfully applied discrete controller synthesis techniques to hardware circuits, achieving improved power efficiency. In addition, [18, 19] demonstrated the effectiveness of discrete controller synthesis in hardware circuits. However, limited research has been conducted on the application of discrete controller synthesis techniques to power grids. [20] proposed a methodology for surveillance and performance analysis of a micro-grid during a perturbation based on discrete event systems. The paper presents an energy management system for the effective operation of microgrids, including the use of battery energy storage systems to manage the integration of intermittent energy resources and reduce undesirable effects like power fluctuations. [21] proposed a DES framework based on model-diagnoser for fault section estimation in the power grid, considering the failure and false trips of devices such as protective relays and circuit breakers. [22] demonstrated the application of discrete event systems theory for modeling and analyzing power transmission networks, by using Petri nets and finite state machines. In their study, [23] utilized discrete controller synthesis techniques for safety control to prevent overloading of the power grid caused by additional load from conventional residential and industrial sources as well as electric vehicles. However, it should be noted that all of the aforementioned approaches were based on finite state machines (FSMs) and did not incorporate symbolic techniques. Additionally, none of these approaches considered optimization targets, which limits their effectiveness in real-world power grid applications. To bridge this gap, our study proposes a symbolic approach to apply discrete controller synthesis techniques to power grids.
In our extensive literature review, our motivation is to cultivate more effective management by establishing more reliable modeling environments within a framework utilizing discrete control synthesis methods for input/output reactive infinite-state systems. Thus, we aim to address this gap in the literature. Compared to studies in the literature such as [1719], our main contribution is that we offer a new modeling environment for input/output reactive infinite-state systems. While the outputs of the systems cannot be adequately modeled in these studies, we enable realistic modeling of outputs in our approach. Additionally, when comparing it with other existing optimization techniques such as [6, 7, 15], the novelties of this work provide optimization targets within a certain cost function based on state transitions without specifying the target states.
Besides the DCS approach, there are also many intelligent ANN models in the literature. In [24], a novel higher-order recurrent neural network (HORNN) is introduced for indirect adaptive control of complex nonlinear dynamical systems. The HORNN model, based on a higher-order Pi-Sigma neural network, exhibits superior performance in simulation experiments, achieving a significantly lower instantaneous mean square error of 0.058 compared to popular neural networks. In [25], the memory recurrent Elman neural network (MRENN) is introduced as an enhanced version of the classical Elman neural network (ENN), designed for identifying unknown dynamics in time-delayed nonlinear plants. MRENN exhibits stability through Lyapunov-stability criteria-based parameter updates and outperforms other well-known models in terms of identifying plant dynamics, as demonstrated in simulation results. In [26], radial basis function network (RBFN) is utilized for simultaneous online identification and indirect adaptive control of nonlinear dynamical systems, capitalizing on its simplicity and mathematical formulation compared to multilayer feed-forward neural networks. The proposed RBFN-based controller, applied in the absence of plant dynamics information, showcases adaptability to parameter variations and disturbances, surpassing multilayer feed-forward neural network (MLFFNN) in capturing and controlling system dynamics. In [27], a fully connected recurrent neural network (FCRNN) structure is presented for identifying unknown dynamics in nonlinear systems, incorporating internal feedback layers with adjustable weights to enhance memory properties. The FCRNN demonstrates superior performance in identification accuracy and robustness compared to other neural network models, as validated through experimental results and confirmed by comparative evaluations. In [28], the locally recurrent neural network with input feed-through (LRNNIFT) is introduced for controlling nonlinear dynamical systems, chosen for its simplicity and mathematical model compared to Elman neural networks (ENNs) and feed-forward neural networks (FFNNs). Simulation results underscore the LRNNIFT-based controller’s effectiveness in achieving adaptive control and mitigating disturbances, with comparative analyses revealing its superior performance over both FFNN and ENN controllers in adaptive control applications.
Many design criteria must be taken into consideration in the control of dynamic systems. For example, there are many studies in the literature that address stability issues for dynamic systems. [29] presents an adaptive dynamic programming-based control and identification scheme for nonlinear dynamical systems, guiding the plant’s output along a desired reference trajectory. Weight update equations using both gradient descent and Lyapunov stability methods ensure global stability, demonstrating superior accuracy in experimental results on three nonlinear dynamical systems. [30] presents a novel temporally local recurrent radial basis function network for modeling and adaptive control of nonlinear systems, featuring recurrent hidden neurons with weighted self-feedback loops and a weighted linear feed-through. The proposed network demonstrates superior efficacy in testing on five complex nonlinear systems, outperforming other neural network structures, and exhibits robust disturbance rejection capabilities. [31] proposes an adaptive control approach using a diagonal recurrent neural network (DRNN) derived from a fully connected recurrent neural network (FCRNN) for nonlinear dynamical systems. The DRNN, featuring self-recurrent neurons, effectively captures the dynamic behavior of the controlled nonlinear plant, demonstrating superior performance and robustness against parameter variations and disturbance signals compared to a multilayer feed-forward neural network (MLFFNN). [32] introduces a novel higher-order context-layered recurrent pi-sigma neural network (CLRPSNN) for nonlinear dynamical system identification, incorporating an additional context layer. The weight tuning procedure, combining back-propagation (BP) and the Lyapunov-stability method, results in superior performance compared to other models, as evidenced by comparative analysis in simulation studies for nonlinear dynamical system identification. [33] introduces a compound recurrent feed-forward neural network, merging the strengths of a feed-forward neural network (FFNN) and a locally recurrent neural network, for identifying nonlinear dynamic systems. The proposed model, combining FFNN and RNN, demonstrates superior prediction accuracy, robust performance against disturbance signals, and improved response to parameter variations compared to other state-of-the-art neural models, as evident from simulation results.
The optimization algorithm presented can be considered as a deterministic learning algorithm that handles all possible situations in the future. When compared to the methods preferred for dynamic systems in the literature, DCS, which is also a model checking tool, guarantees formal correctness, meeting the safety objectives strictly and allowing the application of various optimization techniques. Thus, its application becomes particularly crucial for systems of critical importance, accentuating its prominence in critical systems.
In summary, while discrete controller synthesis techniques have been widely applied in various domains, their application to power grids is still a relatively emerging research area. Our study contributes to the existing literature by proposing a symbolic approach to apply discrete controller synthesis techniques to power grids. We further detail and illustrate our approach through a realistic case study and experimentally evaluate both our safety and optimal (optimization) control algorithms. The comparison with previous works in the literature underscores the novelty and significance of our research. This section provides an overview of the relevant literature and highlights the contributions of our study in the context of discrete controller synthesis techniques for power grids.
Contributions:
  • Modeling: A modeling framework is offered for the control of input/output reactive infinite-state systems (including satisfying the safety objective);
  • Optimal control algorithm: It provides optimization targets on a given cost function based on state transitions without specifying target states; and
  • Implementation: An application to power grids.
The rest of this paper is organized as follows. Section 2 provides the details of the symbolic transition model. Safety control policies for input/output infinite-state systems are presented in Sect. 3, while Sect. 4 exhibits the new symbolic limited optimal control algorithm for such systems. Our approach is illustrated on a realistic case study in Sect. 5, and the experimental evaluation of our modeling framework is presented in Sect. 6. Finally, Sect. 7 concludes this paper.

2 Symbolic Transition Model

In this section, our symbolic transition model for the control of discrete event systems is introduced. Our models for infinite discrete event systems consist of finite sets of symbolic transitions (\( \delta \)), states (\( Q \)), inputs (\( I \)), and outputs (\( O \)). Transitions are guarded actions (where guard \(g \in I \) and action \(a \in O \)) on the state variables whose domains are (in)finite and they are synchronously fired to update system variables. First, the symbolic modeling of a given uncontrolled system (i.e., plant) is defined. Subsequently, the supervisory control for these systems is addressed to fulfill specified objectives in the form of a set of logical expressions that will be constrained by the system.

2.1 Uncontrolled System

Assuming that the given discrete event system \(\mathcal {P}\) is modeled by our symbolic transition model \(\textsf{STM}_{\mathcal {P}} \) described by a 5-tuple.
Definition (\(\textsf{STM}_{\mathcal {P}}\)). A \(\textsf{STM}_{\mathcal {P}}\) is a tuple, \(\textsf{STM}_{\mathcal {P}} =( Q , I , O , \theta _\texttt {0}, \delta )\), where:
  • \( Q =\{ q _{1},\dots , q _{n} \}\) is the finite state vector set of the system, where \(n \in \mathbb {N^+}\);
  • \( I =\{ i _{1},\dots , i _{n} \}\) is the finite input vector set of the system, where \(n \in \mathbb {N^+}\);
  • \( O =\{ o _{1},\dots , o _{n} \}\) is the finite output vector set of the system, where \(n \in \mathbb {N^+}\);
  • \( \theta _\texttt {0}\) is the initial value set of \( Q \);
  • \( \delta \) is the guarded state transition function and determines the evolution of the state variable \( q _{} \in Q \).
The model of an uncontrolled system consists of a set of states with their initial value, a set of transitions, and a set of guarded actions. Each transition determines the next valuation of a state from the current states, inputs, and outputs (denoted by \( q _{} \xrightarrow { i _{}/ o _{}} q _{} '\), where \( q _{}, q _{} ' \in Q , i _{} \in I ,\) and \( o _{} \in O \)). Each action also determines the output \( o _{} \in O \) as a placeholder expressed using variables in \( Q \cup I \cup O \).
In our symbolic system, all variables (states, inputs, and outputs) are considered as symbols, and our models are built upon a finite set of vector symbols \( S \) ranging over (in)finite domains, where a domain \(\mathbb {D} \in \mathbb {B},\mathbb {Z},\mathbb {Q}\). Any corresponding \(\mathbb {D}\)-valued symbolic expressions can be assigned to \( S \) within the specified grammar rules. To clarify, state transitions in our models are encoded as data flow equations using synchronous languages, adhering to their rules (e.g., in the form of conditional boolean algebra). Output symbols \( O \) can be seen as a placeholder for corresponding expressions; however, a vector state symbol \( q _{i}\) memorizes a value and takes a new value in its domain based on the current system variables \( S \) when transitions are fired, which are the atomic actions.

2.2 Feedback Supervisory Control

Considering that the uncontrolled system behavior is unsatisfactory and must be controlled by restricting the system behavior, we need to have a supervisor (controller) that satisfies the desired system behaviors to alter the behavior of the system. The uncontrolled system (plant) and the supervisor are separated from each other, and our goal is to synthesize this controller to fulfill the desired system behaviors. In a sense, controlled system \(\textsf{STM}_{\mathcal {P}} '\) always satisfies desired objectives \({\Phi } \) (which are in the form of a set of logical expressions). The fulfilled system behavior is denoted by \(\textsf{STM}_{\mathcal {P}} ' \models \Phi \) and \( C _{{\Phi }} \) denotes the supervisor that satisfies desired behaviors of the system. To enable the supervisor to restrict system behavior, the finite input vector set of the system \( I \) , is partitioned into two disjoint subsets as a set of controllable inputs \( I _\texttt {c}\) and a set of uncontrollable inputs \( I _\texttt {uc}\). Thus, the controlled system can be defined as a 7-tuple:
$$\begin{aligned} \textsf{STM}_{\mathcal {P}} '=( Q , I _\texttt {c}, I _\texttt {uc}, O , \theta _\texttt {0}, \delta , C _{{\Phi }}) \models \Phi . \end{aligned}$$
(1)
Solving the 7-tuple above by means of some restriction on controllable inputs \( I _\texttt {c}\) synthesizes the controller \( C _{{\Phi }}\) in the form of a predicate using variables in \( Q \cup I \cup O \), that satisfies the desired properties.
In this paper, the safety and optimization objectives in the discrete controller synthesis problem mentioned above are considered. Our algorithms are introduced in order to synthesize the controller that satisfies these objectives, separately in the following 2 sections.

3 Safety Controller Synthesis

As aforementioned, our models, described as a tuple, are encoded as a synchronous program, and any component of a synchronous program can be expressed in the form of a finite Mealy machine, where a transition is taken at each reaction. In this section, first, a simple case is taken to illustrate the principle of discrete controller synthesis; for this, the result of the basic controller synthesis algorithm directly applied on Mealy machines is described. Then, this principle is adopted to our safety discrete controller synthesis algorithm.

3.1 Principle of Controller Synthesis

The encapsulation operator and the synchronous parallel composition of Mealy machines are presented, which will be used in the following sections to detail the contribution of this paper.
Assume that the given discrete event system \(\mathcal {P}\) is modeled as a Mealy machine.
Definition (\(M_{\mathcal {P}}\)). A Mealy machine is a tuple \(M_{\mathcal {P}}=( Q , I , O , \theta _\texttt {0}, \delta )\), where:
  • \( Q \) is a finite set of states;
  • \( I \) is a finite set of inputs;;
  • \( O \) is a finite set of outputs;
  • \( \theta _\texttt {0} \in Q \) is the initial value set of \( Q \);
  • \( \delta \) is the guarded state transition function: \( Q \times I \times O \xrightarrow {} Q \); each transition denoted by \( q _{} \xrightarrow {i/o} q _{} '\), where states \( q _{}, q _{} ' \in Q ,\) guard \(i \in I ,\) and action \(o \in O \).
The synchronous product composition of Mealy machines is denoted by \(\times \). Given two Mealy machines \(M_{a}\) and \(M_{b}\), the composition defined as follows:
$$\begin{aligned} M_{a} \times M_{b}=(Q_{a} \times Q_{b},I_{a} \cup I_{b},O_{a} \cup O_{b},(\theta _{a0},\theta _{b0}), \delta '),\nonumber \\ \end{aligned}$$
(2)
where: \( \delta '\) is defined by:
$$\begin{aligned}{} & {} (q_{a}\xrightarrow {i_{a}/o_{a}} q_{a}' \in \delta _{a}) \bigwedge (q_{b}\xrightarrow {i_{b}/o_{b}} q_{b}' \in \delta _{b}) \nonumber \\{} & {} \quad \Rightarrow q_{a}.q_{b}\xrightarrow {i_{a} \cap i_{b}/o_{a} \cup o_{b}} q_{a}'.q_{b}' \in \delta '. \end{aligned}$$
(3)
Thus, the behavior of a controlled system can be supported by:
$$\begin{aligned} M_{a} \times M_{b} \times C_{a,b}, \end{aligned}$$
(4)
where \(C_{a,b}\) is a Mealy machine that represents the assumed controller that satisfies the desired objective.
Usually, the control theory of discrete event systems considers synthesizing a controller for a given system and objectives. In this direction, the encapsulation operator is exploited, which is used to enforce the synchronous parallel composition of Mealy machines by means of restriction of a given variable. The synchronous parallel composition of Mealy machines is denoted by \( \vert \vert \). Given two Mealy machines \(M_{a}\) and \(M_{b}\), the composition defined as follows:
$$\begin{aligned}{} & {} M_{a \vert \vert b}=M_{a} \vert \vert M_{b}=(Q_{a} \times Q_{b},I_{a} \cup I_{b},\nonumber \\{} & {} \quad O_{a} \cup O_{b},(\theta _{a0},\theta _{b0}), \delta '). \end{aligned}$$
(5)
Considering \(M_{a \vert \vert b}\) is encapsulated via variable \( \gamma \subseteq I \cup O\), the encapsulated new Mealy machine is defined as follows:
$$\begin{aligned}{} & {} M_{a \vert \vert b}\setminus \gamma =(Q_{a} \times Q_{b},(I_{a} \cup I_{b})\setminus \gamma ,\nonumber \\{} & {} \quad (O_{a} \cup O_{b})\setminus \gamma ,(\theta _{a0},\theta _{b0}), \delta ''), \end{aligned}$$
(6)
where: \( \delta ''\) is defined by:
$$\begin{aligned}{} & {} (q\xrightarrow {i/o} q' \in \delta ') \bigwedge (i^{+} \cap \gamma \subseteq O) \bigwedge (i^{-} \cap \gamma \cap O=\emptyset ) \nonumber \\{} & {} \quad \Longleftrightarrow q\xrightarrow { \exists \gamma .i/o\setminus \gamma } q' \in \delta '', \end{aligned}$$
(7)
where \(i^{+}=\{\chi \in I \vert (\chi \bigwedge i)=i\}\) and \(i^{-}=\{\chi \in I \vert (\lnot \chi \bigwedge i)=i\}\).
Figure 1 is depicted as an example of the background computation above, where \(M_{a \vert \vert b}\) is encapsulated via variable \(c\).

3.2 Synthesis Algorithm

The safety objective, which is an invariant described using state, input, and output variables, represents the desired behavior of an initially uncontrolled system. The controller restricts the valuation of controllable variables by enforcing the invariant so that the controlled system always guarantees the specified behaviors. In the mathematical sense, based on the encapsulation operation on the synchronous composition of Mealy machines above, this technique is adopted for discrete controller synthesis. Similarly, this approach has been applied in labeled transition system [9] and arithmetic symbolic transition system [11] for safety controller synthesis. In our case, input/output reactive infinite-state systems are considered, and the safety controller synthesis algorithm for such systems is presented below.
Considering that the given system \(\mathcal {P}\) and the safety objective \({\Phi }\) on \(\mathcal {P}\) are modeled as \(\textsf{STM}_{\mathcal {P}} '=( Q , I _\texttt {c}, I _\texttt {uc}, O , \theta _\texttt {0}, \delta , C _{{\Phi }})\), our aim is to synthesize the controller \( C _{{\Phi }}\) by means of the restriction on the valuation of controllable input variables \( I _\texttt {c}\) in order for the controlled system to satisfy the desired behavior (i.e., \(\textsf{STM}_{\mathcal {P}} ' \models {\Phi } \)). We sketch the computation of the safety controller synthesis problem in Fig. 2 by means of the state space of \(\mathcal {P}\) in order to illustrate the principle of the restriction. State transitions must always occur within the subset of the state space where the desired properties of the system are fulfilled. These state transitions and this state space are marked as legal, and the legal (resp. illegal) state transitions are shown by the color green (resp. red) in the figure. To capture the legal state transitions in the subset of the state space that satisfies the desired properties of the system, the state space \( Q \) is partitioned into three disjoint subsets separated by arcs:
$$\begin{aligned} Q = Q _{L}\cup Q _{EI}\cup Q _{I}; \end{aligned}$$
(8)
where: \( Q _{L}\) is the legal state space that can always remain within itself by means of controllable variables, \( Q _{I}\) is the illegal state space in which the desired objectives are not satisfied, and \( Q _{EI}\) is the extended illegal state space that can transition into the illegal state space by means of uncontrollable variables. As for the computational part of these state spaces, it comprises the following steps:
  • The safety objective \({\Phi }\) is a predicate using variables in \( Q \cup I \cup O \) hence the illegal state space \(Q_{I}\) can be expressed as \(\lnot {\Phi } \);
  • Then, the computation of \(Q_{EI}\) is based on a least fix-point computation of the predicate \(Q_{I}\), where \(Q_{EI}\) is the extended illegal state space that can reach the illegal state space by means of any uncontrollable variable, regardless of the valuations of controllable variables;
  • Ultimately, the remainder of the state space gives the legal state space, i.e., \( Q _{L}= Q {\setminus } ( Q _{I} \cup Q _{EI} )\).
Thus, a set of valuations is obtained for the controllable variables, where each valuation is admissible for legal state transitions according to the valuation of the state, input, and output variables. Since there can be more than one valuation for a controllable variable in each transition, the resulting controller is not a singleton. Therefore, the set of valuation for a controllable variable is reduced to a singleton by means of the default valuation in order to synthesize the deterministic controller. Finally, the resulting controllers always guarantee the correct behavior and are least restrictive (maximally permissive).

4 An Algorithm for Symbolic Limited Optimal Controller Synthesis

The synthesis algorithm aforementioned is a base strategy. In this section, a novel algorithm is proposed for refining the base strategy \(\sigma \) toward satisfying a given optimization objective. The optimization objective is to minimize a cost function \(\zeta \) summed over \(k \in \mathbb {N}^+\) ticks, in the form of guarded numerical expressions, where each tick is actually associated with the cost function \(\zeta \) for each transition. Our algorithm operates on these guarded numerical expressions that are symbolically represented using cascading conditional constructs where condition predicates are expressed using state, input, and output symbols, and leaves are Rational constants. Especially due to the finiteness of the domains of definitions for all symbols, the set of all guarded numerical expressions as described above is closed under basic arithmetic operations such as addition, composition with conditional constructs, as well as existential symbol elimination and substitution of symbols in the predicate conditions of said constructs.
A preliminary requirement of the symbolic technique presented in this paper is to operate on a set of expressions (\(e\)) that is closed under various operations such as the substitution of symbols by expressions, and parametric optimization. As this is not the case of the guarded linear arithmetic expressions (\(\mathcal {L}_{\mathbb {Q}}\)) involved in our models, our algorithm operates on the (strictly greater) set \(\mathcal {L}_{\mathbb {X}}\) where the domain of coefficients and linear expressions take their values in \(\mathbb {X} = \mathbb {Q} \cup \big \{-\infty ,\infty ,\textsf{NaN}\big \}\). Note that \(\mathcal {L}_{\mathbb {X}} \supset \mathcal {L}_{\mathbb {Q}}\). Therefore, our algorithm operates on linear expressions where coefficients. Note this is a strict super-set of the guarded linear arithmetic expressions of our models. As controllable input symbols may only appear in guards, the symbolic optimization operator \({Min}_V\) (resp. \({Max}_V\)) lifts the elimination of finite symbols (variables \(V\)) as:
$$\begin{aligned}&{Min}_V(\mathsf {if~}c\mathsf {~then~}e_1\mathsf {~else~}e_2) = \mathsf {if~}\exists _V c\mathsf {~then~}\nonumber \mathsf {~else~}\\&\qquad {{Min}_V(e_1)}{{Min}_V(e_2)}\end{aligned}$$
(9)
$$\begin{aligned}&{Max}_V(\mathsf {if~}c\mathsf {~then~}e_1\mathsf {~else~}e_2) = \mathsf {if~}\forall _V c\mathsf {~then~}\nonumber \mathsf {~else~}\\&\qquad {{Max}_V(e_1)}{{Max}_V(e_2)} \end{aligned}$$
(10)
where \(\exists _V c\) (resp. \(\forall _V c\)) existentially (resp. universally) eliminates all symbols in controllable input variables \(C\) from predicate \(c \in C\).
In the algorithm, the optimization objective enforces the minimization of a cost function \(\zeta \in \mathcal {L}_\mathbb {X}\) using variables in \( Q \cup I \cup O \), summed over \(k \in \mathbb {N}^+\) ticks. The algorithm considers the pessimistic scenario and aims to escape from the highest cost. The best outcome \(\eta _k\) is recursively computed as:
$$\begin{aligned} \eta _1~{\mathop {=}\limits ^{\text {\tiny def}}}~&\mathsf {if~}\sigma \mathsf {~then~}\zeta \mathsf {~else~}\infty \end{aligned}$$
(11)
$$\begin{aligned} \eta _{i+1}~{\mathop {=}\limits ^{\text {\tiny def}}}~&\mathsf {if~}\sigma \mathsf {~then~}{\big ({Max}_U \circ {Min}_C(\eta _i)\big )\big [T\big ]} + \zeta \mathsf {~else~}\infty \end{aligned}$$
(12)
where:
  • \(\big [T\big ]\) represents the substitution of symbols in the predicate conditions of the previous item;
  • Lastly, the cost \(\zeta \) of each tick is summed to obtain the best-expected outcome \(\eta _k\). In other words, this is a pessimistic scenario, it corresponds to the worst choice of uncontrollable variables \(U\) against the best choice of controllable variables \(C\).
Finally, our revised strategy \(\sigma {'}\) satisfies the objective by the valuation of variables \(C\) for the given \(\eta _k\). The computation of our strategy is as follows:
$$\begin{aligned} \sigma {'}~{\mathop {=}\limits ^{\text {\tiny def}}}~\big (\not \exists _{C'}(\eta _k \big [C \mapsto C'\big ] < \eta _k)\big ) \wedge \sigma \end{aligned}$$
(13)
where \(C'\) is primed version of \(C\); \((\eta _k \big [C \mapsto C'\big ] < \eta _k)\) denotes that the valuation of variables in \(C\) outperforms the valuation of variables in \(C'\); and \(\sigma {'}\) still holds our base strategy.

5 Implementation: An Application to Power Grids

This section describes how our proposed approach, which comprises \(\textsf{STM}_{}\) and synthesis algorithms, can be applied for modeling, control, and analysis of in/output reactive infinite-state systems. In this direction, the approach is illustrated with a realistic case study, and a systematic modeling framework is proposed to prevent the overloading of a power transmission network.
In the past, every discrete event that occurred in centralized small-scale power systems was manually monitored and operated when necessary changes were required in system operations. However, today, the size and operation of power systems have increased considerably. With the deregulation of these decentralized systems, it has become very difficult to observe and control the process using traditional methods. In addition, the uncontrolled charging of electric vehicles with increasing usage has brought a great burden to the network, and this rate of increase continues. Adding this load to conventional residential and industrial loads causes power grids to become overloaded, which therefore, the negative impact on the grid has become inevitable without an effective energy management system.
The energy management of power grids is considered a feedback discrete controller synthesis problem, which is a proper technique for such safety-critical systems since it always guarantees desired objectives. In this regard, this work elaborates in a detailed and systematic manner on how to model the energy manager using the approach for an energy-efficient and robust power grid management system, taking into account optimization targets by leveraging user statistics.

5.1 Overview of the Modeling Technique

A modeling framework for power transmission networks is presented to prevent overloading in power grids with optimization using the \(\textsf{STM}_{}\) and the algorithms outlined in this paper. The model is described in Fig. 3. In Fig. 3, the model of power transmission networks applies the family of data flow process networks. Actors represent power stations, power transformers, power distribution stations, and consumers, while transmission lines are represented with edges. Each actor fires, producing or consuming some number of data tokens (power/energy) on each edge. Subsequently, the data flow process is encoded using our approach of parallel synchronous composition through \(\textsf{STM}_{}\), enriched with conditional expressions. The data flow equations are formulated as encoding representations, elaborating on the modeling intricacies. Both uncontrolled system behaviors and the alignment with safety and optimization objectives are detailed within this framework.

5.2 Problem Statement

Consider a power transmission network represented by a directed graph \(G=(V,E)\), where \(V\) is the set of vertices representing actors in the network (e.g., power stations, transformers, distribution stations, consumers) and \(E\) is the set of edges representing transmission lines. Each actor \(v_{i} \in V\) corresponds to a component in the power grid, and data tokens (representing power or energy) are transmitted along the edges \(v_{i},v_{j} \in E\).
The objective is to develop a feedback discrete controller synthesis approach for energy management in the power grid, aiming to prevent overloading while optimizing system performance. This involves:
  • Modeling the energy management system using symbolic transition models (\(\textsf{STM}_{}\)) and synthesis algorithms.
  • Ensuring safety and optimization objectives are met.
  • Managing the flow of data tokens to avoid overloading the power grid.
  • Considering dynamic factors such as the uncontrolled charging of electric vehicles and increasing power demand from residential and industrial sectors.
The problem can be mathematically formulated for uncontrolled system behavior and desired specification as follows:
  • \(G=(V,E)\), a directed graph representing the power transmission network.
  • A set of actors \(V\), each representing a component in the power grid.
  • A set of edges \(E\), representing connections between actors and transmission lines.
  • Data tokens transmitted on each edge during actor firings.
  • Security alert states for power stations (\(q_{ PS _{}}\)) to indicate the level of security risk.
  • Incorporates controllable variables (\(p_{ PS _{}}\)) for priority ranking of power stations.
  • Priority constraints for power stations (\(\Phi _\textrm{pri}^{ PS _{}}\)) to manage power allocation based on priority rankings.
  • Security alert states for consumers (\(q_{ C _{}}\)) to indicate the level of security risk.
  • Priority constraints for consumers (\(p_{ C _{}}\)) to manage power allocation based on priority rankings.
  • Fairness constraints for consumers (\(\Phi _\textrm{fair}^{ C _{}}\)) to ensure equitable power distribution.
  • Models the energy management system (\(\Phi _{ PD _{}}\)) to avoid overloading and ensure fairness.
  • Manages power allocation to consumers (\(\Phi _{ PD _{}}\)) based on priority and fairness constraints.
  • Satisfies safety objectives (\(\Phi _{\mathcal {P}}\)) to prevent power stations from entering dangerous states.
  • Security constraints for power stations (\(\mathcal {P}_{ PS _{}}\)) to prevent dangerous states.
  • Optimizes system performance by minimizing a cost function over a sliding window of time ticks.
The solution should provide:
  • Effective algorithms and control policies to achieve safety and optimization objectives.
  • Detailed modeling framework explanations for encoding data flow processes and addressing modeling intricacies.
  • Demonstrable effectiveness through a realistic case study illustrating the application of the proposed approach to power transmission networks.

5.3 Modeling Process Implementation Behaviors

First, the power grid network’s power stations are modeled, where the total number of stations is denoted by \(\vert PS _{} \vert \). Each power station \( PS _{i}\) (where \(i \in \vert PS _{} \vert \)) is associated with a controller \(c_{ PS _{i}}\) to ensure control over the supplied power. A \( PS _{i}\) produces some data tokens when consumers request them (i.e., when fired), within the endurance limit of a station. Additionally, each power station has security alerts within the domain of \(\{secure,alert,danger\}\). To achieve this, the set of state components within the model is expanded by introducing a bounded security counter.
$$\begin{aligned} q_{ PS _{i}}:= {\left\{ \begin{array}{ll} q_{ PS _{i}}+1 &{} \text{ if } PS _{i}==\text{ secure } \\ q_{ PS _{i}} &{} \text{ if } PS _{i}==\text{ alert } \\ 0 &{} \text{ if } PS _{i}==\text{ danger } \end{array}\right. } \end{aligned}$$
(14)
Additionally, a priority list is established by incorporating an extra set of symbols \(p_{ PS _{i}}\), where \(i\) belongs to the cardinality of the set of power stations \(\vert PS _{} \vert \). The symbols \(p_{ PS _{i}}\) are subject to constraints outlined by the invariant \(\Phi _\textrm{pri}^{ PS _{}}\) as defined below:
$$\begin{aligned} \Phi _\textrm{pri}^{ PS _{}} ~=~\bigwedge _{i \in \{1,\dots ,\vert PS _{} \vert -1\}} {p_{ PS _{i}} \ge p_{ PS _{i+1}}} \wedge \\ \end{aligned}$$
([pri-sorted])
$$\begin{aligned} ~\bigwedge _{i \in \{1,\dots ,\vert PS _{} \vert \}} \bigvee _{i \in \vert PS _{} \vert } {p_{ PS _{i}} = q_{ PS _{i}}} \wedge \sum _{i \in \{1,\dots ,\vert PS _{} \vert \}}{p_{ PS _{i}}} = \sum _{i \in \vert PS _{} \vert }{q_{ PS _{i}}} \text{. } \end{aligned}$$
([pri-values])
The constraint mentioned above essentially indicates that the values assigned to the sequence \((p_{ PS _{i}})_{i \in \{1,\dots ,\vert PS _{} \vert \}}\) must be in a decreasing order [pri-sorted], and these values should exclusively come from the set of all security counters \(q_{ PS _{i}}\)’s [pri-values]. The \(p_{ PS _{i}}\) symbols are part of the controllable input space of the model. This implies that the actual computation of the priority list represented by these symbols (i.e., sorting the values of all security counters) is included as a component of the target control strategy. As a result, these symbols will eventually operate as managers over the power transmissions.
The activity of a station is determined based on the status of the security counter, as encoded below:
$$\begin{aligned} activity_{ PS _{i}} = if\; (q_{ PS _{i}}==\text{ danger})\; then\; 0\; else\; c_{ PS _{i}}\nonumber \\ \end{aligned}$$
(15)
\( C _{}\) represents consumers/customers and requests and consumes some fixed number of data-tokens via power distribution stations \( PD _{}\) and transmission lines \( TL _{}\). It is also adorned with state transitions, representing the consumed amount of states (which can be obtained as stochastic data such as inferred from consumer statistical traces):
$$\begin{aligned} q_{ C _{i}}:= {\left\{ \begin{array}{ll} q_{ C _{i}}+1 &{} \text{ if } C _{i}==S_{1} \\ q_{ C _{i}} &{} \text{ if } C _{i}==S_{2} \\ q_{ C _{i}}-1 &{} \text{ if } C _{i}==S_{3}\\ q_{ C _{i}}\pm \Delta &{} \text{ if } C _{i}==S_{j}, \end{array}\right. } \end{aligned}$$
(16)
where \(\Delta \in \mathbb {N}\) depends on the state activity.
We establish a fairness constraint for consumers as defined below:
$$\begin{aligned} \Phi _\textrm{fair}^{ C _{}} ~=~\bigwedge _{i \in \{1,\dots ,\vert C _{} \vert -1\}} {p_{ C _{i}} \ge p_{ C _{i+1}}} \wedge \end{aligned}$$
([fair-sorted])
$$\begin{aligned} ~\bigwedge _{i \in \{1,\dots ,\vert C _{} \vert \}} \bigvee _{i \in \vert C _{} \vert } {p_{ C _{i}} = q_{ C _{i}}} \wedge \sum _{i \in \{1,\dots ,\vert C _{} \vert \}}{p_{ C _{i}}} = \sum _{i \in \vert C _{} \vert }{q_{ C _{i}}} . \end{aligned}$$
([fair-values])
The \(p_{ C _{i}}\) symbols are part of the controllable input space of the model. This implies that the actual computation of the priority list represented by these symbols is included as a component of the target control strategy. Eventually, fairness constraints among customers are ensured.
\( PD _{}\) is a model representing a power distribution station, which oversees the system’s operation, particularly in determining the allocation of power from various producers to consumers. It accomplishes this by calculating how much power each consumer will receive, taking into account fairness constraints for customers and priority rankings for power stations. The management of our system is guided by a set of controllable variables linked to power stations, which are represented through dataflow equations, as outlined below:
$$\begin{aligned} \Phi _{ PD _{i}} ~=&~ \Phi _\textrm{pri}^{ PS _{}} \wedge \Phi _\textrm{fair}^{ C _{}} \wedge \bigwedge _{j \in \vert PS _{} \vert } activity_{ PS _{j}} \Rightarrow \nonumber \\&q_{ PS _{j}} \in \{p_{ PS _{1}},\dots , p_{\vert PS _{}\vert }\} \end{aligned}$$
(17)

5.4 Energy Management System by Control

While striving for energy minimization, our primary objective is to prevent power stations from entering a dangerous state (via a given upper-bound \(\mathcal {P}_{_{ PS _{i}==danger}}\)). To achieve this, the safety objective \(\Phi _{\mathcal {P}}\) is established, relying on an invariant related to the endurance limit of a power plant (peak power):
$$\begin{aligned} \Phi _{\mathcal {P}} ~=&~ \mathcal {P}_{ PS _{i}} \ge \mathcal {P}_{_{ PS _{i}==danger}} \end{aligned}$$
(18)
Satisfying optimization control objectives involves minimizing a cost function (summed) over a sliding window of a given number of ticks. Typically, a cost function maps states and inputs to some (partially)ordered sets such as the Rationals. In our case, the optimization objective is to maintain the security status of the stations in the safest possible condition. Hence, the constructed cost function consists of the aggregated power values over a time window.
Furthermore, fixed values are established to determine the alert and secure states of power stations. Additionally, an optional peak power constraint is defined to ensure both the power stations within the network remain in the most secure possible condition and to facilitate equitable power distribution among customers in situations where power supply becomes insufficient:
$$\begin{aligned} \mathcal {P}_{ PS _{i}} = \sum _{i \in \vert PS _{} \vert } \mathcal {P}_{ PS _{i}} \end{aligned}$$
(19)

6 Experimental Evaluation

The implementation aims to model the power grids and synthesize a manager, especially to avoid overloading. Furthermore, our proposed model and new control algorithms are experimentally evaluated. In this regard, simple artificial designs of power transmission networks are created in this implementation, based on the description provided in Fig. 3 (i.e., several power stations, consumers, and power distribution stations).
The safety algorithm aims to maintain a power station in a more secure state by utilizing the data provided in the current state space. Conversely, the optimization algorithm considers future states (i.e., given \(k\) ticks) to prevent worst-case scenarios.
The implementation begins by modeling and encoding the objectives as \(\textsf{STM}_{}\), similar to the previous section. Following this, a controller synthesis is performed using the control algorithms presented. Subsequently, this controller is transformed into a suitable script language or environment, allowing it to be employed as a manager within the power grid system.
In the power grid implementation, various random scenarios have been created using an artificial simulation environment in Python. The results for Designs 1, 2, and 3 have been documented in the table. Controllers derived from the \(\textsf{STM}_{}\) s models and objectives corresponding to each design are then translated back into the Python environment. Subsequently, simulations have been executed, and the outcomes have been reported for both the controlled and randomly executed scenarios, as presented in Table 1.
Table 1 illustrates the extent to which the power at the station with the highest rate of exceeding the given maximum power (\(\mathcal {P}_{\max }\)) in that design surpasses the maximum power. In the \(\textsf{STM}_{}\)-based designs, no station exceeds the power limit, while in the same designs, for the random-based controller, some stations have exceeded the limit by 11%, 13%, and 9%, respectively. \(\mathcal {P}_\mathrm{avg.}\) represents the average power at stations that exceeded the limit. In \(\textsf{STM}_{}\) designs, since no station exceeded the limit, the average values are 0. However, as seen in the random controllers, multiple stations exceeded the limit. \(C_\mathrm{star.}\) indicates the starvation condition, which represents situations where consumers cannot be adequately supplied by the grid. In this case, the \(\textsf{STM}_{}\) technique and control algorithms have prevented such starvation conditions.
Table 1
Evaluation results for the random and power-aware designs
Design objective
\(\mathcal {P}_{\max }\) (%)
\(\mathcal {P}_\mathrm{avg.}\) (%)
\(C_\mathrm{star.}\) (amount)
STM
Design-1
0
0
0
Design-2
0
0
0
Design-3
0
0
0
Rand.
Design-1
11
3
0
Design-2
13
2
1
Design-3
9
2
0
Table 2
Performance of the strategy computation tool for power-aware designs
Design objective
Time (s)
Max memory (MB)
\(\mathcal {P}_{_{ PS _{i}==danger}}\)
Feasibility
Design-1
0.23
44,464
183
   
182
Design-2
0.65
51,740
147
   
146
Design-3
22.93
214,728
175
   
174
Table 2 presents the performance metrics of our \(\textsf{STM}_{}\) control synthesis tool in various designs. The time and memory required to synthesize a controller are provided in the columns, demonstrating its efficiency in terms of cost. Additionally, it’s worth noting that there is a specific condition where a controller cannot be generated. This condition arises when the value that leads to the danger state, modeled as a fixed value, falls below a certain threshold. This is because safety-oriented DCS algorithms always ensure that at least one station’s peak power exceeds a certain threshold to meet the customers’ needs securely.
To provide a clearer explanation of our results and performance criteria, the experimental simulation graphs in Fig. 4 are presented, where (a) displays the peak powers of the power stations, each represented by a different color; (b) illustrates the power demands of consumers, each also depicted in distinct colors; (c) and (d) depict the power consumption by the consumers in (b) from the power stations in (a), using DCS and random manager, respectively. For instance, in the 10th time period, the peak power of the station represented by the green color is 50 units. The power consumption from this station is 22 units for DCS and 53 units for random. Therefore, our performance criterion \(\mathcal {P}_{\max }\) in Table 1 is 0% for DCS and 6% for random. Similarly, \(\mathcal {P}_\mathrm{avg.}\) is calculated by dividing the sum of \(\mathcal {P}_{\max }\)s by the number of stations. The term "starvation" (\(C_\mathrm{star.}\)) indicates cases where the demands of consumers cannot be met by the stations. For example, in time period 20, the powers demanded by consumers are 54, 68, 51, 22, 40, and 64 units, totaling 299 units. In (b), the powers provided by the stations at the same time period are 35, 53, 49, 57, 48, and 57 units, also totaling 299 units. Thus, in this case, starvation does not occur. This situation cannot be prevented by the random manager, but the approach we present always guarantees that this situation does not occur by means of the safety objective. As indicated in Table 2, it is stated whether such a situation is feasible or not.
The hyper-parameter settings used to achieve the desired system behavior are automatically adjusted. These settings correspond to our controllable variables (\(q_{ PS _{}}\) in Eq. 14 and \(q_{ C _{}}\) in Eq. 16). The valuation of these controllable variables (i.e., hyperparameter) is updated in each atomic action based on the desired system behavior (i.e., observers), as outlined in Sect. 5. This valuation is performed in accordance with an invariant (i.e., always true) along with the system behavior, as described in Sect. 3.2.
The use of controllers that provide formal correctness is crucial in safety-critical systems. Therefore, we focus on a deterministic strategy. Foundations of DCS and program synthesis resemble principles of model checking, ensuring system satisfaction with specifications. Common temporal logics for model checking, such as linear-time temporal logic (LTL) [34] and computation tree logic (CTL) [35], exhibit exponential and doubly exponential synthesis time complexity, respectively. The complexity of the control synthesis algorithm used by both Sigali [10] and ReaX [11], DCS tools classifiable under model checking, is exponential; however, the approach we propose is quadratic. Although it seems to have higher complexity compared to heuristic methods, it demonstrates superior performance in a deterministic manner with its formal correctness. It is also noteworthy that computation is only performed once during synthesis; afterward, the obtained controller runs dynamically at runtime. Additionally, as depicted in Table 2, even in artificial scenarios requiring a large number of states, the experimental feasibility assessment for synthesis time is compiled in a relatively short time.
It is possible to model the STM approach for power grids presented in Sect. 5 with some modifications, akin to the approaches in the works by [10, 11]. When comparing performance tests, our approach revealed that in various scenarios, the synthesis time was found to be shorter by 15% to 25% compared to the work by [11], while yielding faster results ranging from 20% to 40% compared to the work by [10]. As a note, since the approaches in these studies are also deterministic, they ensure safety conditions precisely like our approach. However, considering the optimization objectives, our approach has consistently prevailed in maintaining power stations in a more secure state. On the other hand, non-symbolic traditional approaches such as those proposed by [20, 23] suffer from state explosion problems in terms of performance. That is, they cannot consider very distant future situations over a time window as done in our approach, in order to optimize their targets.
As a result, power stations do not enter the danger state in most of the designs, and no power station ever reaches its peak power. In contrast, in the random control group, some power stations disregarded the power peak, as well as the alert systems. Meanwhile, the limited optimal control algorithm ensures that it always avoids the worst power consumption among the possible scenarios, by leveraging the traces of consumer behavior and utilizing controllable inputs.

7 Conclusion

In this paper, a new modeling framework for controlling input/output reactive infinite-state systems using symbolic discrete controller synthesis techniques is proposed. The presented symbolic transition models enhance the modeling of discrete event systems by considering both input and output aspects. Safety objectives are specified and fulfilled, with the safety control policies ensuring the desired properties of the system modeled by the symbolic transition model. Additionally, a novel optimal control algorithm is introduced, which minimizes a cost function directly defined on transitions, allowing computation without specified target states to address optimization objectives. Experimental application of the framework to power grids demonstrates promising results for such systems. Lastly, the framework holds potential for applications in various systems, including the energy efficiency of hardware circuits.

Declaration

Conflict of interest

Not applicable.

Ethics approval

Not applicable.
Yes.
Yes.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.
Literature
2.
go back to reference Christos, G.: Cassandras and Stephane Lafortune. Springer, Introduction to Discrete Event Systems (2007) Christos, G.: Cassandras and Stephane Lafortune. Springer, Introduction to Discrete Event Systems (2007)
4.
go back to reference Tripakis, S.; Limaye, R.; Ravindran, K.; Wang, G.; Andrade, H.; Ghosal, A.: Tokens vs signals: on conformance between formal models of dataflow and hardware. J. Signal Process. Syst. 85, 23–43 (2016)CrossRef Tripakis, S.; Limaye, R.; Ravindran, K.; Wang, G.; Andrade, H.; Ghosal, A.: Tokens vs signals: on conformance between formal models of dataflow and hardware. J. Signal Process. Syst. 85, 23–43 (2016)CrossRef
6.
go back to reference Marchand, H.; Borgne, M. L.: On the optimal control of polynomial dynamical systems over z/pz. In: 4th International Workshop on Discrete Event Systems, pp. 385–390 (1998) Marchand, H.; Borgne, M. L.: On the optimal control of polynomial dynamical systems over z/pz. In: 4th International Workshop on Discrete Event Systems, pp. 385–390 (1998)
9.
go back to reference Altisen, K.; Clodic, A.; Maraninchi, F.; Rutten, E.: Using controller-synthesis techniques to build property-enforcing layers. In: Programming Languages and Systems, pp. 174–188. Springer (2003) Altisen, K.; Clodic, A.; Maraninchi, F.; Rutten, E.: Using controller-synthesis techniques to build property-enforcing layers. In: Programming Languages and Systems, pp. 174–188. Springer (2003)
10.
go back to reference Dutertre, B.: Spécification et Preuve de Systemes Dynamiques. PhD thesis, Rennes 1, (1992) Dutertre, B.: Spécification et Preuve de Systemes Dynamiques. PhD thesis, Rennes 1, (1992)
20.
go back to reference Fellah, K.; Abbou, R.; Khiat, M.: Energy management system for surveillance and performance analysis of a micro-grid based on discrete event systems. Int. J. Green Energy 18(11), 1104–1116 (2021)CrossRef Fellah, K.; Abbou, R.; Khiat, M.: Energy management system for surveillance and performance analysis of a micro-grid based on discrete event systems. Int. J. Green Energy 18(11), 1104–1116 (2021)CrossRef
21.
go back to reference Hu, H.-X.; Li, H.-H.; Jiang, Y.; Zheng, Y.-Q.: Shi-ping Huang, and Yi-Fei Sheng. Fault diagnosis based on discrete event system for power grid. In: The 27th Chinese control and decision conference (2015 CCDC), pp. 2668–2672. IEEE (2015) Hu, H.-X.; Li, H.-H.; Jiang, Y.; Zheng, Y.-Q.: Shi-ping Huang, and Yi-Fei Sheng. Fault diagnosis based on discrete event system for power grid. In: The 27th Chinese control and decision conference (2015 CCDC), pp. 2668–2672. IEEE (2015)
22.
go back to reference Biswas, T.; Davari, A.; Feliachi, A.: Application of discrete event systems theory for modeling and analysis of a power transmission network. In: IEEE PES Power Systems Conference and Exposition, 2004., pp. 1024–1029. IEEE (2004) Biswas, T.; Davari, A.; Feliachi, A.: Application of discrete event systems theory for modeling and analysis of a power transmission network. In: IEEE PES Power Systems Conference and Exposition, 2004., pp. 1024–1029. IEEE (2004)
24.
go back to reference Kumar, R.: Double internal loop higher-order recurrent neural network-based adaptive control of the nonlinear dynamical system. Soft Comput., pp. 1–19 (2023) Kumar, R.: Double internal loop higher-order recurrent neural network-based adaptive control of the nonlinear dynamical system. Soft Comput., pp. 1–19 (2023)
25.
go back to reference Kumar, R.: Memory recurrent elman neural network-based identification of time-delayed nonlinear dynamical system. IEEE Trans. Syst. Man Cybernet. Syst. 53(2), 753–762 (2022)MathSciNetCrossRef Kumar, R.: Memory recurrent elman neural network-based identification of time-delayed nonlinear dynamical system. IEEE Trans. Syst. Man Cybernet. Syst. 53(2), 753–762 (2022)MathSciNetCrossRef
26.
go back to reference Kumar, R.; Srivastava, S.; Gupta, J.R.P.: Modeling and adaptive control of nonlinear dynamical systems using radial basis function network. Soft Comput. 21, 4447–4463 (2017)CrossRef Kumar, R.; Srivastava, S.; Gupta, J.R.P.: Modeling and adaptive control of nonlinear dynamical systems using radial basis function network. Soft Comput. 21, 4447–4463 (2017)CrossRef
27.
go back to reference Shobana, R.; Jaint, B.; Kumar, R.: Design of a novel robust recurrent neural network for the identification of complex nonlinear dynamical systems. Soft Comput., pp. 1–15 (2023a) Shobana, R.; Jaint, B.; Kumar, R.: Design of a novel robust recurrent neural network for the identification of complex nonlinear dynamical systems. Soft Comput., pp. 1–15 (2023a)
28.
go back to reference Srivastava, P.; Kumar, R.: Indirect adaptive control of nonlinear system using recurrent neural network. In: International Conference on Signals, Machines, and Automation, pp. 317–325. Springer, (2022) Srivastava, P.; Kumar, R.: Indirect adaptive control of nonlinear system using recurrent neural network. In: International Conference on Signals, Machines, and Automation, pp. 317–325. Springer, (2022)
29.
go back to reference Kumar, R.; Srivastava, S.; Gupta, J.R.P.; Lyapunov stability-based control and identification of nonlinear dynamical systems using adaptive dynamic programming. Soft Comput., 21: 4465–4480 (2017b) Kumar, R.; Srivastava, S.; Gupta, J.R.P.; Lyapunov stability-based control and identification of nonlinear dynamical systems using adaptive dynamic programming. Soft Comput., 21: 4465–4480 (2017b)
30.
go back to reference Kumar, R.; Srivastava, S.; Gupta, J.R.P.; Mohindru, A.: Temporally local recurrent radial basis function network for modeling and adaptive control of nonlinear systems. ISA Trans. 87, 88–115 (2019)CrossRef Kumar, R.; Srivastava, S.; Gupta, J.R.P.; Mohindru, A.: Temporally local recurrent radial basis function network for modeling and adaptive control of nonlinear systems. ISA Trans. 87, 88–115 (2019)CrossRef
31.
go back to reference Kumar, R.; Srivastava, S.; Gupta, J.R.P.: Diagonal recurrent neural network based adaptive control of nonlinear dynamical systems using lyapunov stability criterion. ISA Trans., 67: 407–427 (2017c) Kumar, R.; Srivastava, S.; Gupta, J.R.P.: Diagonal recurrent neural network based adaptive control of nonlinear dynamical systems using lyapunov stability criterion. ISA Trans., 67: 407–427 (2017c)
32.
go back to reference Kumar, R.: A lyapunov-stability-based context-layered recurrent pi-sigma neural network for the identification of nonlinear systems. Appl. Soft Comput. 122, 108836 (2022)CrossRef Kumar, R.: A lyapunov-stability-based context-layered recurrent pi-sigma neural network for the identification of nonlinear systems. Appl. Soft Comput. 122, 108836 (2022)CrossRef
33.
go back to reference Shobana, R.; Kumar, R.; Jaint, B.: A recurrent neural network-based identification of complex nonlinear dynamical systems: a novel structure, stability analysis and a comparative study. Soft Comput., pp. 1–17 (2023b) Shobana, R.; Kumar, R.; Jaint, B.: A recurrent neural network-based identification of complex nonlinear dynamical systems: a novel structure, stability analysis and a comparative study. Soft Comput., pp. 1–17 (2023b)
34.
go back to reference Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp. 46–57. IEEE (1977) Pnueli, A.: The temporal logic of programs. In: 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp. 46–57. IEEE (1977)
35.
go back to reference Clarke, E.M.; Emerson, E. A.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: 25 Years of Model Checking: History, Achievements, Perspectives, pp. 196–215 (2008) Clarke, E.M.; Emerson, E. A.: Design and synthesis of synchronization skeletons using branching time temporal logic. In: 25 Years of Model Checking: History, Achievements, Perspectives, pp. 196–215 (2008)
Metadata
Title
Control of Discrete Event Systems by Using Symbolic Transition Model: An Application to Power Grids
Author
Mete Özbaltan
Publication date
27-04-2024
Publisher
Springer Berlin Heidelberg
Published in
Arabian Journal for Science and Engineering
Print ISSN: 2193-567X
Electronic ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-024-09036-z

Premium Partners