Journal of Electrical and Computer Engineering

Journal of Electrical and Computer Engineering / 2020 / Article

Research Article | Open Access

Volume 2020 |Article ID 6265379 |

Anis M’halla, Dimitri Lefebvre, Mouhaned Gaied, "Distributed Monitoring Based on -Time Petri Nets and Chronicle Recognition of the Tunisian Railway Network", Journal of Electrical and Computer Engineering, vol. 2020, Article ID 6265379, 12 pages, 2020.

Distributed Monitoring Based on -Time Petri Nets and Chronicle Recognition of the Tunisian Railway Network

Academic Editor: Vinod Sharma
Received13 Jul 2019
Revised27 Jul 2020
Accepted10 Aug 2020
Published25 Aug 2020


This paper falls under the problems of the monitoring of a Discrete Event System (DES) with time constraints. Among the various techniques used for online and distributed monitoring, we are interested in the chronicle recognition. Chronicles are temporal patterns that represent the system’s possible evolutions. The proposed models are based on -time Petri nets that are suitable to represent with accuracy and modularity the Tunisian railway network. These models are scalable and may be used to represent a large variety of railway networks. Then, monitoring is based on the generation of chronicles that are suitable to detect and isolate traffic incidents in a distributed setting. Consequently, the proposed approach is tractable for large networks. Finally, to demonstrate the effectiveness and accuracy of the approach, an application to the case study of the Tunisian railway network is outlined.

1. Introduction

Transport systems need to be monitored online to avoid critical situations and temporal disturbances. These disturbances concern either the railway infrastructure or the traffic management and may lead to service disruptions due to weather, obstacles on the tracks, malice, social movements, and so on. In the systems under consideration, the processing times are interval-valued with parameters that depend on the operation to be performed. Any deviations from the specified interval will characterize a traffic disturbance. Consequently, the monitoring of the time intervals will be used as the main principle to detect and isolate the disturbances that affect the system. In this context, we propose the chronicles as a formalism for interpreting events to monitor temporal disruptions. A chronicle is composed of a set of events and a set of temporal constraints linking the pairs of events. The proposed approach is applied to the railway transport network in Tunisia. The main contribution of this paper is to use the combination of Petri net formalism and chronicles for the analysis of traffic disruptions. The overall goal is to maintain the stability and efficiency of the studied railway network.

Over the past decade, the chronicle formalism has been developed and used by numerous authors, particularly for faults diagnosis [14]. It was also used by the Telecom operators for fault diagnosis in telecommunication networks [5] or for the diagnosis of web service failures [6, 7]. Lately, to deal with the time aspects inherent to the chronicles, the authors in [8] propose an automated translation of chronicles into a set of Labeled Time Petri Nets with Priorities (LTPNPr). The aim of this study was to improve the characterization of diagnosability for a discrete event system by taking into account the notion of finite durations between the occurrence of two events. The diagnosability study was done by comparing the chronicles associated with the normal behavior to the chronicle associated with faulty behaviors. The diagnosability analysis is based on LTPNPr in which priority relationships on transitions are used to complete the firing conditions. This approach is different from our contribution that uses -time Petri nets for modelling issues and that excludes the notion of priority for transition firings. In [9], the authors proposed a diagnosis approach based on chronicles and modular temporal analysis. In fact, a failure was allocated to each set of chronicles, and each chronicle recognized the fault signature which was obtained from the state diagnosed with the finite state automata associated to each process module.

To describe clearly all desired behaviors of an automated production system, an incremental learning approach, based on Causal Temporal Signatures (CTS) was proposed in [10]. The CTS was defined as “a subset of partially-ordered observable events that characterizes the system’s faulty behavior”. The formalism of CTS, based on chronicles, was used to diagnose faults in Discrete Event Systems (DES). The main benefits of this formalism were the readability and the expressiveness. In [11], the authors proposed a chronicle model allowing integrating prohibition constraints representing the absence of events in the model. Based on this formalism, criteria were proposed to characterize the chronicles and to compare them in order to evaluate the relevance of the chronicle database used for the diagnosis. The chronicles were modeled by temporal Petri nets, and the exclusivity test was solved by a model checking approach.

The association of the Petri net formalism and chronicles for the monitoring and diagnosis is widely proposed in the literature [1215]. In these works, the notions of causality, conflict, competition, unfolding, time branching formulated in Petri net setting lead to the modelling, identification, and discrimination of fault patterns. These approaches can be extended to more complex monitoring problems where the places not only represent faults but also process states. This context was also exploited in our approach: no specific assumption is made about what the chronicle represents, and it can be associated with normal or faulty behaviors.

In transportation systems, a large number of observations are regularly collected and should be processed. Such a large amount of data cannot be treated online efficiently by a human operator. On the contrary, chronicles are suitable to analyze such data in order to recognize normal and faulty behaviors. The main advantage of this tool is the ability to describe and represent the possible evolutions of the transport systems and to recognize these behaviors in a flow of events.

The contributions presented in this paper are devoted to distributed monitoring of rail transport networks and deal with the detection of traffic disturbance symptoms in these systems. -time Petri nets are used for modelling aspects. Among the various techniques used for the distributed monitoring, we are interested in the chronicles recognition.

The paper is organized as follows. Section two presents the railway transport system in Tunisia and gives some basic notions about -time Petri nets. The third section presents the chronicle formalism and illustrates how chronicles are applied to the distributed monitoring. In Section four, the approach is applied to the Tunisian railway transport network. The main purpose of this study is to avoid time constraints violation and to guarantee the stability and safety of railway traffic. Finally, the last section concludes the paper. Some perspectives for further works are also proposed.

2. Modelling of the Tunisia Sahel Railway Network

2.1. Presentation of the Studied Transport Network

The railway network of the Sahel Tunisia, Figure 1, ensures the transportation of passengers between the main cities of the Sahel from Sousse to Mahdia. It starts at the Sousse Bab Jdid station, crosses the industrial zone of Sousse, and bypasses the Sahline city until the Monastir station by the serving the airport, the tourist zone, and the University of Monastir; Figure 1. South of Monastir, the line continues to the Ksar Hellal city going through the industrial zone, and the main agglomerations located on this axis are Khniss, Ksibet Elmedouini, Bouhjar, and Sayada. Leaving Moknine, it serves the industrial zone of Teboulba and continues to Mahdia. The particularity of this railway network is the single line connecting the Bekalta station to Mahdia tourist zone station. Therefore, the segments are unidirectional in this area, while it has double tracks in the rest of the network.

With an average of 40 minutes of frequency, the metro of Sahel ensures daily 44 journeys scheduled between 5 : 00 am until 10 : 00 pm and ensures the transport of more than 9 million passengers per year with an average of 27,000 passengers daily. Figure 2 shows the travel times between the various stations deserved by the metro of the Sahel.

2.2. Model of the Studied Railway Network
2.2.1. -Time Petri Net

Several modelling approaches have been proposed for transport networks. Models may be graphical or analytical or both as the same time as Petri nets. In this work, -time Petri Nets (P-TPNs) are used for modelling the transport network. In such models, travel durations are included within a minimum value and a maximum one.

Definition 1 (see Reference [16]). The formal definition of a P-TPN is given by a pair <R, IS>, where R is a marked Petri net:ISi defines the static interval of sojourn time of a mark in the place belonging to the set of places (Q+ is the set of positive rational numbers). A token in the place fires an output transition when it has stayed in a duration at least ai and at most bi. After the duration bi, there is a death of mark in .

2.2.2. Modelling

The Sahel railway network consists of 3 main stations (Sousse, Monastir, and Mahdia) and 28 other stations, Figure 3. The travel from Sousse to Monastir is represented by the places to , Figure 3. In the considered application, the white places represent the paths between two stations, the red places represent the stations, and the gray places represent resources introduced to avoid catching-up. A specific module for bidirectional segments is detailed in [17] and used in Figure 3.

The sojourn duration qi in each place represents either the travelling time between the station or the parking times in stations. Such duration has an expected value (qie) which should be computed in order to satisfy the planned schedule (Table 1).

Section 1: Sousse Med 5 sector

Section 2: Sousse Sud sector

Section 3: Sousse Z.Ind sector

Section 4: Sahline sector

Section 5: Sahline Sabkha sector

Section 6: Hôtels sector

Section 7: Les Hôtels sector

Section 8: L’Aeroport sector

Section 9: La faculté sector

Section 10: Monastir sector


1IS1 = [60, inf]99
2IS2 = [230, 250]236
3IS3 = [60, 120]80
4IS4 = [172, 188]177
5IS5 = [60, 120]80
6IS6 = [174, 186]178
7IS7 = [60, 120]80
8IS8 = [173, 187]177
9IS9 = [60, 120]80
10IS10 = [168, 192]176
12IS12 = [60, 120]80
13IS13 = [170, 190]176
15IS15 = [60, 120]80
16IS16 = [227, 253]235
17IS17 = [60, 120]80
18IS18 = [111, 129]117
19IS19 = [60, 120]80
20IS20 = [168, 192]176
21IS21 = [60, 120]80
22IS22 = [112, 128]117
23IS23 = [60, 120]80
24IS24 = [110, 130]116
25IS25 = [60, 120]80
26IS26 = [113, 127]117
27IS27 = [60, 120]80
28IS28 = [107, 133]115
29IS29 = [60, 120]80
30IS30 = [109, 131]116
31IS31 = [60, 120]80
32IS32 = [110, 130]116
33IS33 = [60, 120]80
34IS34 = [172, 188]177
35IS35 = [60, 120]80
36IS36 = [165, 195]175
37IS37 = [60, 120]80
38IS38 = [106, 134]115
39IS39 = [60, 120]80
40IS40 = [110, 130]116
41IS41 = [60, 120]80
42IS42 = [110, 130]116
43IS43 = [60, 120]80
44IS44 = [832, 848]837
45IS45 = [60, inf]78
46IS46 = [233, 247]237
47IS47 = [60, 120]80
48IS48 = [351, 369]357
49IS49 = [60, 120]80
50IS50 = [108, 132]116
51IS51 = [60, 120]80
52IS52 = [166, 194]175
53IS53 = [60, 120]80
54IS54 = [230, 250]236
55IS55 = [60, 120]80
56IS56 = [173, 187]177
57IS57 = [60, 120]80
58IS58 = [171, 189]177
59IS59 = [60, 120]80
60IS60 = [170, 190]176
61IS61 = [60, 120]80
62IS62 = [113, 127]117
63IS63 = [60, inf]71
64IS64 = [110, 130]116
65IS65 = [60, 120]80
66IS66 = [168, 192]176
67IS67 = [60, 120]80
68IS68 = [166, 194]175
69IS69 = [60, 120]80
70IS70 = [167, 193]175
71IS71 = [60, 120]80
72IS72 = [233, 247]237
73IS73 = [60, 120]80
74IS74 = [176, 184]178
75IS75 = [60, 120]80
76IS76 = [110, 130]116
77IS77 = [60, 120]80
78IS78 = [349, 371]356
79IS79 = [60, 120]80
80IS80 = [228, 252]236
81IS81 = [832, 848]837
82IS82 = [60, 120]80
83IS83 = [111, 129]117
84IS84 = [60, 120]80
85IS85 = [110, 130]116
86IS86 = [60, 120]80
87IS87 = [107, 133]115
88IS88 = [60, 120]80
89IS89 = [173, 187]177
90IS90 = [60, 120]80
91IS91 = [170, 190]176
92IS92 = [60, 120]80
93IS93 = [105, 135]115
94IS94 = [60, 120]80
95IS95 = [115, 125]118
96IS96 = [60, 120]80
97IS97 = [109, 131]116
98IS98 = [60, 120]80
99IS99 = [108, 132]116
100IS100 = [60, 120]80
101IS101 = [108, 132]116
102IS102 = [60, 120]80
103IS103 = [105, 135]115
104IS104 = [60, 120]80
105IS105 = [174, 186]178
106IS106 = [60, 120]80
107IS107 = [108, 132]116
108IS108 = [60, 120]80
109IS109 = [230, 250]236
110IS110 = [171, 189]177
111IS111 = [167, 193]175
112IS112 = [175, 185]178
113IS113 = [60, 120]80
114IS114 = [172, 188]177
115IS115 = [60, 120]80
116IS116 = [170, 190]176
117IS117 = [60, 120]80
118IS118 = [233, 247]237

The main parameters of the models are defined as follows:A time interval [Li, Hi] expressed with time unit TU is associated to each segment between two successive stations. Its lower bound Li indicates the minimum time required for the travel and the upper bound Hi fixes the maximum time not to be exceeded in order to avoid any temporal disturbance on railway traffic.A train can park in a principal station for at least one minute. The static intervals associated with the three main stations are  =  =  = [60, +∞]; Figure 3.The sojourn time of a metro in any other station is estimated from one to two minutes: ISi = [60, 120]; Figure 3.At the beginning of each day, it is assumed that 4 trains start from the Mahdia station, and 2 others are stationed at the Sousse station; Figure 3.The static intervals ISi and the effective sojourn time qie associated with the stations and with the segments between two successive stations are detailed in Table 2 [17]. The static intervals are defined based on the SNCFT traffic dataset.

3. Chronicles Formalism

Chronicles provide formalism for monitoring transport systems. A chronicle is composed of a set of events, a set of temporal constraints linking the pairs of events, and the diagnosis test that describes the recognized situation [18].

3.1. Basic Definition

Preliminary definitions, useful for the rest of this paper, are given in order to explain the distributed detection principles.

An event is a stimulus to which the system can react by a state change [19]. An event can occur after a message has been sent by the process at the beginning or at the end of any operation.

Definition 2 (see Reference [19]). The occurrence date is the time corresponding to an event issued from the process. Let O be the occurrence function which associates to each event ei its occurrence date O(ei); then,where E is the set of events.

Definition 3. A constraint is a relationship expressed by the duration between event occurrences. Two types of constraints can be distinguished; Figure 4:Local constraints link timed events in the same monitoring siteGlobal constraints link timed events in different monitoring sitesIn our study, the monitoring system (site) Si manages a physical zone (i.e., a set of sensors and resources) in the system considered as a Discrete Event System. A monitoring site is composed of six functions: failure detection, diagnosis, prognosis, follow, resumption, and emergency. Our study is limited to the detection function, whose role consists in recognizing a deviation from the normal (expected) functioning, locally or in a distributed manner by communication and cooperation between different monitoring sites.
In many cases, the local information generated by each monitoring site is insufficient, and communications between sites become essential to compensate this deficiency. When these systems are connected, we have a distributed monitoring system. The ease of implementation, test, and maintenance and the reduction of the software complexity in distributed systems are furthered by a high degree of modularity and a low degree of coupling between modules [20]. This type of systems can easily be extended if the existing elements change or if new elements are added; the reconfiguration is, therefore, encouraged.
In a distributed monitoring architecture, the communication aspects are significant and specific problems must be taken into account, such as the clocks synchronization, the reconstitution of the exchanged messages order, and the communication delays. In this context, the main contribution of this paper is the evaluation of the influence of the communication delays between modules, on the temporal constraints verification. In particular, the proposed solution, inspired from the work of Boufaied, evaluates the impact of the uncertainties that concern communications delays, on the global constraints in railway transport networks.

3.2. Time Constraints Verification

The time constraints verification is based on some assumptions:The communication delays Ω belong to the interval [Ωmin, Ωmax]

Each monitoring site has its own clock, and all clocks have the same time base. Therefore, an event is dated only in the time frame associated to the receiving site. The occurrence function represents its temporal coordinate in the associated time frame.

The proposed technique is suitable for any system in which the operational constraints and the communication time uncertainties are of the same order, such as railway transport systems.

The problem to be solved can be summarized as follows:

Let CX,Y be a global constraint linking an event eX to eY; Figure 5. Whatever be the nature of the constraint, it is always possible to express it as an interval. Thus, CX,Y will be defined by

Since events eX and eY are received and dated by two different sites, it is not possible to directly evaluate the duration O(eX) − O(eY). Therefore, it is necessary that the site SY informs the site SX when it received the event eY (if we consider that only the site X is responsible for the time constraint monitoring). This is performed by sending the event ek; Figure 5. This communication between the two sites is generally affected by a communication delay Ω with . In these conditions, the following are known:The global constraint CX,YThe occurrences times of events ex and ek on the site XThe communication delay Ω between the two sites X and Y (O(eX) − O(eY) = O(eX) − O(ek) + Ω)

The question is that is it possible to know if the constraint CY,X is satisfied (i.e., if the occurrence time O(eY) satisfies the CY,X constraint)? It is possible to reformulate the initial global constraint into a new constraint which is a local constraint, for which it is possible to evaluate the involved durations.

As Ωmin ≤ Ω ≤ Ωmax, we obtainwhich leads to

The verification of the interval constraint consists, by means of the measurable duration Φ, of looking for the durations O(eX) − O(eY) that verify both:

A graphical representation of these two constraints is shown in Figure 6. In the plane (O(eY) − O(ek), O(eY) − O(eA)), the inequalities (1) and (2) define two bands. The searched durations belong to the intersection of these two bands which defines a polygon noted PO. The position of PO depends not only on the duration O(eY) − O(eX) but also on the terminal positions of the duration Ω with respect to dY,X and fY,X. For any duration Ω, PO is defined by 4 points: X1, X2, X3, and X4 of respective coordinates X1 = dY,X − Ωmax; dY,X − Ωmin; fY,X − Ωmin; and fY,X − Ωmax.

In many usual diagnosis approaches, the notions of uncertainty, inaccuracy, and incompleteness of information are modeled through bounded intervals. Whether the observation belongs to the expected interval leads to a binary reasoning about the detected inconsistencies. This type of binary reasoning may be insufficient for monitoring and diagnosis, especially for the evaluation of marginal deviations that can occur during transient phases. To enrich the reasoning, fuzzy sets and the theory of possibilities were integrated and lead to the definition of new fuzzy models. In order to quantify the set of possible durations Φ, a graphical representation, inspired from [19], is proposed; Figure 7. Considering a bounded delay, the possibility, that a time constraint is satisfied, belongs to the interval [0, 1]. Consequently, the verification of time constraints can be represented by fuzzy membership functions. This result makes it possible to highlight zones of certainty for the detection function: if the constraints to be verified are associated with a normal behavior of the monitored system, a high possibility value ensures a normal behavior of the monitored system; Figure 7. On the contrary, a low possibility value implies the detection of an illegal behavior.

4. Distributed Monitoring of the Sahel Railway Networks

4.1. Principle

Centralized monitoring consists of associating a single diagnoser to the whole process model. The latter collects the various process information before making a final decision on the process operating state. Although powerful in terms of diagnosis, the centralized structure is difficult to use for large and distributed systems such as transport systems since the building of a global model generates, in most cases, combinatorial explosion problems.

In distributed monitoring structures, the process is decomposed into several local models. To each model is associated a local diagnoser. Each diagnoser makes his decision based on local observation. In the case of global specifications, a protocol allows the communication between the different diagnosers in order to make a final decision. The distributed monitoring, based on chronicles, verifies that each observed event is consistent with the chronicles specified by the time constraints. If the chronicles represent an abnormal behavior model, chronicles recognition is used for monitoring purposes.

4.2. Distributed Monitoring Architecture

In the studied railway networks, every set of sensors providing useful information has its own monitoring sites. Then, these sites are connected in distributed architecture. According to Figure 6, the chronicles are distributed into several subchronicles associated to the different monitoring sites Si. Each diagnoser monitors locally a subsystem and communicates with other diagnosers in order to get necessary information in order to take decisions relative to the distributed diagnosis; Figure 8. Therefore, the detection function of each site has to recognize an evolution of the monitored process by subchronicles which are defined as sets of patterns of observable events temporally constrained. The recognition is performed through the verification of the time constraints associated to the considered subchronicles. The distributed detection function monitors the system evolution through the recognition of chronicles; Figure 8.

4.3. Distributed Monitoring of the Railway Sousse-Monastir

In order to help the supervisor in charge of managing the studied railway networks (i.e., detecting traffic perturbations, alert traveler claims, and maintain stability and security of the networks), a monitoring task is needed. The overall aim of the proposed monitoring approach is to control that the railway traffic proceeded well to avoid undesirable situations. The distributed monitoring of the Sahel railway networks based on the chronicle method involves the following steps.

4.3.1. Step 1: Subsystems Identification

The first task is to subdivide the railway network system into sectors (subsystems).

The railway network between Sousse and Monastir has been split into 10 sectors, as shown in Figure 9. Each sector is indicated by the dashed lines. These sectors are

4.3.2. Step 2: Sensor Recognition

This step consists of identifying the sensors needed to perform the system monitoring. In the proposed approach, each site Si, Figure 9, monitors a specific zone of the railway from Sousse to Monastir, through the observation of a set of events generated by the process. In the railway network, the travelling times should be within two bounds. Any deviations (occurrence of a temporal disturbance) from the allowed lower (resp. upper) bounds will lead to a low service quality and can lead to disaster scenarios. Therefore, the proposed monitoring approach, based on chronicle formalism, uses the additional information provided by the knowledge of interval constraints and allows detecting disruptions when a constraint is violated. Figure 9 gives journey times between the railway stations and parking times of the metro in stations. These durations are represented by the static intervals “ISi”.

4.3.3. Step 3: Distributed Detection Function

To each event is associated a diagnoser Si, Figure 9, and the detection function is distributed on the different sites:eS1: Beginning journey from the Sousse Bab Jdid station (Sensor S1).eS2: Metro arrival at Sousse Med.5 (Sensor S2).eS3: Departure from the subway station Sousse Med.5 (Sensor S3).eS4: Metro arrival at Sousse Sud Station (Sensor S4).eS5: Departure from the subway station Sousse Sud (Sensor S5).eS6: Metro arrival at Sousse Z.Ind Station (Sensor S6).eS7: Departure from the subway station Sousse Z.Ind (Sensor S7).eS8: Metro arrival at Sahline Ville station (Sensor S8).eS9: Departure from the subway station Sahline Ville (Sensor S9).eS10: Metro arrival at Sahline Sabkha station (Sensor S10).eS11: Departure from the subway station Sahline Sabkha (Sensor S11).eS12: Metro arrival at the Les Hôtels station (Sensor S12).eS13: Departure from the subway station Les Hôtels (Sensor S13).eS14: Metro arrival at the L’Aeroport station (Sensor S14).eS15: Departure from the subway station L’Aeroport (Sensor S15).eS16: Metro arrival at the La faculté station (Sensor S16).eS17: Departure from the subway station La faculté (Sensor S17).eS18: Metro arrival at the Monastir station (Sensor S18).

4.3.4. Step 4: Scenario Generation

A scenario is defined for each possible deviation in each section bringing the system to an erroneous situation. Deviations can occur due to unavailability of transportation systems, temporal disruptions, or traffic management and disturbances.

Let us detail the monitoring between the two events, eS18 (metro arrival at the Monastir station) and eS1 (departure from Sousse Bab Jdid); Figure 9. To monitor this duration, it is necessary to check the time constraint linking the occurrences of the two events eS18 and eS1. This timing constraint is a global one; therefore, the verification of this constraint can be performed through the measure of the travelling time between the station and parking time of a metro in stations. As long as these durations are included in the mentioned intervals, no disturbance is detected. Otherwise, a traffic disturbance is detected. As previously mentioned, the global constraint to compute is an interval constraint type defined as CS18,S1: dS18,S1 ≤ O(eS18) − O(eS1) ≤ fS18,S1, with

According to the time intervals (Figure 3), the minimum time (dS18,S1) of the travel between the Sousse and Monastir stations is 2315 s, whereas the maximum time (fS18,S1) is 3085 s.

4.3.5. Tested Scenario: Delay Departure of the Metro from the Sousse Bab Jdid Station

In the studied railway network, the detection function monitors the system evolution through the verification of time constraints. Let us suppose thatwhere

From an experimental point of view, at the end of each journey, the current real-time values are collected and stored in an SNCFT database. The only data, from which the identification is computed is, therefore, a sequence of vectors indicating the planned schedule and the actual train departure times at each station. In order to illustrate our approach, a small part of the real data has been extracted from Table 3. This table shows the planned and measured times associated to Sousse-Mahdia direction. These measurements have been recorded at the month of June, 2018.

StationPlanned timeReal time

Sousse Bab Jdid05 : 40 : 0005 : 41 : 22
Sousse Mohamed V05 : 42 : 0005 : 43 : 43
Sousse Sud05 : 45 : 0005 : 48 : 28
Sousse zone industrielle05 : 48 : 0005 : 52 : 34
Sahline Ville05 : 51 : 0005 : 55 : 33
Sahline Sabkha05 : 54 : 0005 : 57 : 33
Les Hôtels05 : 58 : 0006 : 01 : 01
Aeroport06 : 00 : 0006 : 02 : 01
La faculté06 : 06 : 0006 : 08 : 00
Monastir06 : 10 : 0006 : 21 : 25
La faculté 206 : 24 : 0006 : 24 : 24
Monastir zone industrielle06 : 26 : 0006 : 28 : 24
Frina06 : 28 : 0006 : 30 : 05
Khnis Bembla06 : 30 : 0006 : 33 : 24
Ksibet Bennane06 : 34 : 0006 : 37 : 23
Bouhadjar06 : 37 : 0006 : 40 : 23
Lamta06 : 39 : 0006 : 43 : 22
Sayada06 : 41 : 0006 : 44 : 43
Ksar Hellal Z.I.06 : 43 : 0006 : 47 : 03
Ksar Hellal06 : 45 : 0006 : 48 : 03
Moknine Gribaa06 : 47 : 0006 : 50 : 02
Moknine06 : 50 : 0006 : 52 : 03
Téboulba Z.I.06 : 53 : 0006 : 56 : 20
Téboulba06 : 56 : 0006 : 59 : 21
Bekalta07 : 00 : 0007 : 06 : 02
Baghdadi07 : 10 : 0007 : 13 : 04
Mahdia Z.T.07 : 15 : 0007 : 18 : 03
Sidi Massaoud07 : 18 : 0007 : 20 : 34
Borj Arif07 : 21 : 0007 : 22 : 33
Ezzahra07 : 24 : 0007 : 26 : 54
Mahdia07 : 30 : 0007 : 28 : 54

Let us suppose a late departure of the metro from the Sousse Bab Jdid station (departure at 05 : 41 : 22; see Table 3), observed by the monitor S3: Φes1⟶es3 = 620 s. This delay may involve an illegal behavior and can lead to a degraded service. In fact, according to Figure 10, we deduce that the possibility of railway traffic delay is of 0.39 (possibility of violation of the global constraint CS18,S1). This delay can affect the stability of the studied railway network: according to Table 3, the metro arrives in the Monastir station with a delay of 685 s: violation of the constraint CS18,S1 (planned arrival time 06 : 10 : 00/measured arrival time at 06 : 21 : 25). Consequently, the distributed monitoring, based on chronicle, allows an early detection of traffic disturbance, to avoid catastrophic scenarios and preserve stability and security of the studied railway networks.

5. Conclusions

In this study, we investigate the monitoring of a railway network. The proposed monitoring architecture is a distributed architecture, based on monitoring sites. To each site is associated a subsystem receiving a set of events and providing a detection function. Abnormal behaviors and traffic disturbances are recognized with the cooperation of local detection functions. The verification of the global constraints supposes the existence of communication tools allowing event exchanges between monitoring sites. The chronicle recognition is exploited for the detection of traffic disturbances.

The problem of the distributed recognition of subchronicles through the verification of local and global time constraints has been pointed out. This recognition is based on time constraints verification performed with a possibility evaluation. The results obtained for the illustrative example are promising. They show that the distributed monitoring improves the prevention of temporal disruption and traffic management by performing an early detection.

In our future works, a comparative study based upon several cases should be developed. A comparison with the proposed monitoring architecture and results with the works based on Causal Time Signature (CTS) should also be considered. Likewise, it would be interesting to apply a robust control strategy facing disturbances in railway transport systems in order to compensate the disturbances once they have been detected [21].

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.


  1. A. Sahuguède, E. Le Corronc, and M. V. Le Lann, “Chronicle discovery for diagnosis from raw data: a clustering approach,” in Proceedings of the 10th IFAC Symposium on Fault Detection, Supervision and Safety for Technical Processes, SAFEPROCESS, Warsaw, Poland, August 2018. View at: Google Scholar
  2. E. L. Corronc, A. Sahuguède, Y. Pencolé, and C. Paya, “Localization of time shift failures in (max, +)-linear systems,” IFAC-PapersOnLine, vol. 51, no. 7, pp. 186–191, 2018. View at: Publisher Site | Google Scholar
  3. J. Vizcarrondo, J. Aguilar, A. Subias, and E. Exposito, “Distributed chronicles for recognition of failures in web services composition,” in Proceedings of the CLEI, pp. 1–10, Naiguata, Venezuela, October 2003. View at: Publisher Site | Google Scholar
  4. P. Caulier and F. Vanderhaegen, “Improving proactive human behavior in supervision of manufacturing systems using chronicles,” IFAC Proceedings Volumes, vol. 46, no. 15, pp. 82–89, 2013. View at: Publisher Site | Google Scholar
  5. S. Salah, G. Maciá-Fernández, and J. E. Díaz-Verdejo, “A model-based survey of alert correlation techniques,” Computer Networks, vol. 57, no. 5, pp. 1289–1317, 2013. View at: Publisher Site | Google Scholar
  6. M. O. Cordier, X. Le Guillou, S. Robin, L. Rozé, and T. Vidal, “Distributed chronicles for on-line diagnosis of web services,” in Proceedings of the 18th International Workshop on Principles of Diagnosis (DX’07), pp. 37–44, Nashville, TE, USA, May 2007. View at: Google Scholar
  7. M. G. Michael, K. Michael, and C. Perakslis, “Uberveillance and the internet of things and people,” in Proceedings of the International Conference on Contemporary Computing and Informatics (IC3I), pp. 1381–1386, Mysore, India, November 2014. View at: Publisher Site | Google Scholar
  8. H. E. Gougam, A. Subias, and Y. Pencolé, “Timed diagnosability analysis based on chronicles,” IFAC Proceedings Volumes, vol. 45, no. 20, pp. 1256–1261, 2012. View at: Publisher Site | Google Scholar
  9. O. González-Miranda and M. Cerrada-Lozada, “Diagnóstico de Sistemas de Eventos Discretos Controlados: un Enfoque Basado en Crónicas y Análisis Modular Usando Modelos de Autómatas,” Revista Iberoamericana de Automática e Informática Industrial RIAI, vol. 11, no. 2, pp. 191–201, 2014. View at: Publisher Site | Google Scholar
  10. N. B. Rabah, R. Saddem, F. B. Hmida, V. Carré-Ménétrier, and M. Tagina, “Automatic acquisition and update of a causal temporal signatures base-for faults diagnosis in automated production systems,” in Proceedings of the 14th International Conference on Informatics in Control, Automation and Robotics, Madrid, Spain, 2016. View at: Publisher Site | Google Scholar
  11. G. Maitre, Y. Pencolé, A. Subias, and H. E. Gougam, “Modélisation et Analyse de chroniques pour le diagnostic,” in Proceedings of the Modélisation des Systèmes Réactifs (MSR 2015), Nancy, France, November 2015. View at: Google Scholar
  12. J. W. V. Capacho, C. G. P. Zuñiga, Y. A. M. Maldonado, and A. O. Castro, “Simultaneous occurrences and false-positives analysis in discrete event dynamic systems,” Journal of Computational Science, vol. 44, Article ID 101162, 2020. View at: Publisher Site | Google Scholar
  13. R. Kanazy, S. Chafik, E. Niel, and L. Piétrac, “Pronostic des événements de défaillances basé sur les réseaux de Petri temporels labellisés,” in Proceedings of the MSR 2019-12ème Colloque sur la Modélisation des Systèmes Réactifs, Angers, France, 2019. View at: Google Scholar
  14. P. Carle, C. Choppy, and R. Kervarc, “Behaviour recognition using chronicles,” in Proceedings of the 2011 Fifth International Conference on Theoretical Aspects of Software Engineering, pp. 100–107, IEEE, Xi’an, China, August 2011. View at: Publisher Site | Google Scholar
  15. R. Saddem, A. Toguyeni, and M. Tagina, “Consistency’s checking of chronicles’ set using time petri nets,” in Proceedings of the 18th Mediterranean Conference on Control and Automation, MED’10, pp. 1520–1525, IEEE, Marrakech, Morocco, June 2010. View at: Publisher Site | Google Scholar
  16. W. Khansa, J. P. Denat, and S. Collart-Dutilleul, “P-time Petri nets for manufacturing systems,” in Proceedings of the IEEE Workshop On Discrete Event Systems (WODES’96), pp. 94–102, Edinburgh, UK, August 1996. View at: Google Scholar
  17. M. Gaied, D. Lefebvre, A. Mhalla, and K. Ben Othmen, “Modelling and performance evaluation of railway transport systems using P-timed petri nets,” in Proceedings of the CODIT, IEEE, Thessaloniki, Greece, April 2018. View at: Publisher Site | Google Scholar
  18. J. Taisne, “Intelligent alarm process for DMS based on chronicle concept,” in Proceedings of the 19th International Conference on Electricity Distribution (C I R E D), Vienna, Austria, May 2007. View at: Google Scholar
  19. A. Boufaied, A. Subias, and M. Combacau, “Distributed time constraints verification modelled with time petri nets,” in Proceedings of the 17th IMACS World Congress Scientific Computation, Applied Mathematics and Simulation, Paris, France, July 2005. View at: Google Scholar
  20. A. Boufaied, A. Subias, and M. Combacau, “Détection distribuée par reconnaissance floue de chroniques,” Journal Européen des Systèmes Automatisés (JESA), vol. 40, no. n°2, pp. 233–259, 2006. View at: Publisher Site | Google Scholar
  21. A. Mhalla and M. Gaied, “Modeling and robustness study of railway transport networks using P-timed Petri nets,” Journal of Engineering, vol. 2018, Article ID 2083576, 12 pages, 2018. View at: Publisher Site | Google Scholar

Copyright © 2020 Anis M’halla et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

More related articles

 PDF Download Citation Citation
 Download other formatsMore
 Order printed copiesOrder

Related articles

Article of the Year Award: Outstanding research contributions of 2020, as selected by our Chief Editors. Read the winning articles.