Top Banner
Vulnerability and protector control: cellular automata approach O. Jellouli 1 , A. Bernoussi 1 , M. Amharref 1 , and S. El Yacoubi 2 1 Faculty of Sciences and Techniques, B.P. 416, Tangier, Morocco 2 Department of mathematics and computer science, University of Perpignan, France Abstract. In this work we consider the protector control problem using cellular automata approach. We give some definitions and characteriza- tions of vulnerable zones and protector control for a cellular automaton model. We illustrate this notion through a fire forest example using a developed application with JAVA environment. 1 Introduction Understanding of complex environmental systems which involve a large number of interacting components and exhibit important features at multiple spatial and temporal scales, remains an important issue on which several researchers are focused . In connection with the theory of complex systems, the study of the behavior of these systems will help to predict and/or control their evolution. For the study of distributed parameters systems, the classical approach was based on Partial Differential Equations (PDEs) and a large literature has been devoted to this approach. However, the complexity of real systems ranging from biology and ecology to medicine and species abundance, leads to serious difficul- ties both in control theory and in the model implementation. In this context and with the growing interest in spatial modeling, the in- vestigation of more and more efficient modeling tools is necessary. The adopted methods should ensure the persistence of the main properties of these systems, such as their symmetries and conservation laws and their global dynamics. Among the problems related to systems analysis, we consider the concept of vulnerability which characterizes the response of a distributed parameters system subject to an expanding spatial disturbance. For such problem, we con- sider an approach based on cellular automata (CA) models and investigate the possibility of protecting the region which is vulnerable to the effects of a given disturbance. The notions of vulnerability and protector control have been re- cently introduced and studied by means of PDEs in both linear and nonlinear cases [1, 2]. Their practical use which generally needs a hard implementation of PDEs, particularly in the case of controlled processes, is still limited. The purpose of this paper is to consider CA models, which are often described as a counterpart to PDEs, as tools for modelling and simulating vulnerability and risk for some real phenomena such as pollution, flood, forest fire, etc.). The rea- son behind the choice of CA models is their capability to provide a powerful
10

Vulnerability and Protector Control : Cellular Automata Approach

Mar 30, 2023

Download

Documents

HANAE GIO
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Vulnerability and Protector Control : Cellular Automata Approach

Vulnerability and protector control: cellularautomata approach

O. Jellouli1, A. Bernoussi1, M. Amharref1, and S. El Yacoubi2

1 Faculty of Sciences and Techniques, B.P. 416, Tangier, Morocco2 Department of mathematics and computer science, University of Perpignan, France

Abstract. In this work we consider the protector control problem usingcellular automata approach. We give some definitions and characteriza-tions of vulnerable zones and protector control for a cellular automatonmodel. We illustrate this notion through a fire forest example using adeveloped application with JAVA environment.

1 Introduction

Understanding of complex environmental systems which involve a large numberof interacting components and exhibit important features at multiple spatialand temporal scales, remains an important issue on which several researchersare focused . In connection with the theory of complex systems, the study of thebehavior of these systems will help to predict and/or control their evolution.

For the study of distributed parameters systems, the classical approach wasbased on Partial Differential Equations (PDEs) and a large literature has beendevoted to this approach. However, the complexity of real systems ranging frombiology and ecology to medicine and species abundance, leads to serious difficul-ties both in control theory and in the model implementation.

In this context and with the growing interest in spatial modeling, the in-vestigation of more and more efficient modeling tools is necessary. The adoptedmethods should ensure the persistence of the main properties of these systems,such as their symmetries and conservation laws and their global dynamics.

Among the problems related to systems analysis, we consider the conceptof vulnerability which characterizes the response of a distributed parameterssystem subject to an expanding spatial disturbance. For such problem, we con-sider an approach based on cellular automata (CA) models and investigate thepossibility of protecting the region which is vulnerable to the effects of a givendisturbance. The notions of vulnerability and protector control have been re-cently introduced and studied by means of PDEs in both linear and nonlinearcases [1, 2]. Their practical use which generally needs a hard implementationof PDEs, particularly in the case of controlled processes, is still limited. Thepurpose of this paper is to consider CA models, which are often described asa counterpart to PDEs, as tools for modelling and simulating vulnerability andrisk for some real phenomena such as pollution, flood, forest fire, etc.). The rea-son behind the choice of CA models is their capability to provide a powerful

Page 2: Vulnerability and Protector Control : Cellular Automata Approach

2 O. Jellouli, A. Bernoussi, M. Amharref, and S. El Yacoubi

framework for investigating spatial expanding behaviours in part due to theirexplicit representation of space.

Despite the apparent simplicity of CA models, they are able to describe thecomplexity of real world systems by means of local transition rules which willbe directly expressed as algorithms and then easily implemented as computerprograms [3, 12, 15]. They will be used in this paper to illustrate a theoreticalaspect of systems and control theory through a simple example. It consists ofmodelling and simulating a fire spread, considered as a disturbance of a systemdescribed by a vegetation dynamics. The control will be also introduced in orderto protect a prescribed vulnerable area from the fire spreading. The concept ofspreadability have been already studied by means of CA models [5, 11] where acharacterization of spreadable zones has been established. The control which isdefined for distributed parameters systems as an external excitation which maysteer the system to a given objective, has been also introduced for CA models[6]. For the studied example, several models for vegetation or fire dynamics canbe considered among the large literature devoted to these systems [8, 9, 13, 14].The investigated model in this paper which has been used only to illustrate thenotions of vulnerability and protector control, has to be simplified for a moregeneral study.

This paper is organized as follows. In the next section, after recalling thebasic definition of CA models, the study of vulnerability and protector controlby means of CA models will be given. Section 3 is focused on the example of aforest fire dynamics. Simulation results will be given to illustrate the consideredphenomenon using a developed simulator. Some concluding remarks are givenin section 4.

2 Vulnerability and protector control with CellularAutomata approach

In this paper we consider the protector control problem with cellular automataapproach. We recall the CA principle.

2.1 Cellular Automata

Cellular automata are discrete models for systems that vary in space and time.First introduced by von Neumann in the 1950s when studying self-reproducingmachines, they have been used in several settings and provided models for a widerange of complex phenomena, including fluid dynamics, traffic model, excitablemedia, forest fire or pattern formation. This has led to a large body of literature,e.g. [3, 4, 7, 16, 17] and the references therein.

A standard CA consists of a regular infinite uniform lattice with a discretevariable at each site, named cell. The state of each cell is updated based onthe previous states of its immediate neighboring cells according to a set of localrules.

In what follows, the time variable is given in I = 0, 1, 2, · · · .

Page 3: Vulnerability and Protector Control : Cellular Automata Approach

Vulnerability and protector control: cellular automata approach 3

Definition 1. A cellular automaton is usually specified by the quadruple A =(L,S, N, f) where :

– L is a lattice defined by a regular grid of cells denoted by ci1i2···id , on a d-dimensional domain Ω. In a two-dimensional domain, a cell will be denotedby ci,j,

– S a finite set of states given as a commutative ring S = 0, 1, · · · , k− 1 inwhich modular arithmetic will be used,

– a finite neighborhood N (c) of size n which summarizes the effects of thesurrounding cells on the state evolution of cell c,

– a set of local transition rules which update the state of cell c depending onthe neighborhood of cell c (N(c)). It can be given by a transition function :

f :SN(c) −→ Sst(N(c)) −→ st+1(c)

In this section we consider the concept of vulnerability and protector controlas it was introduced in [1, 2, 10] using PDEs, through cellular automata approach.

2.2 Vulnerability and protector control: Cellular Automataapproach

Let us consider a dynamical system which evolves in a domain Ω ⊂ Rn.We will consider in what follows, a disturbed controlled system described by

a cellular automaton. Denote by A = (L,S, N, f) , A′ = (L,S ′, N, f ′) and A′′ =(L,S ′′, N, f ′′) the considered cellular automata in the autonomous, disturbednot controlled and disturbed-controlled cases respectively.

Spreadability and VulnerabilityLet P be a given property specifying the spatial disturbance defined by:

Ps′ti (c)⇔ s′ti (c) = s′ (1)

where s′ ∈ S ′ is a given state and s′ti(c) denotes the state of cell c in the disturbedcase, at time ti ∈ I where I is a given time interval. Consider the following set :

ωti =c ∈ L| Ps′ti (c)

=c ∈ L|s′ti (c) = s′

(2)

Let σ be a nonempty subset of L consisting of nσ cells.

Definition 2. – We say that the property P is spreadable from ωt0 if :

ωti ⊂ ωti+1∀i ∈ I (3)

– We say that a given region σ is P-vulnerable if there exist an instant t ∈]t0, T [ such that :

σ ∩ ωt 6= ∅ (4)

Page 4: Vulnerability and Protector Control : Cellular Automata Approach

4 O. Jellouli, A. Bernoussi, M. Amharref, and S. El Yacoubi

Considering τtN = ∪ts∈]t0,tN [

ωts where ωts =c ∈ L|Ps′ts (c)

, the trajectory

of the property P. We have the characterization of the vulnerable zones.

Proposition 1. The zone σ is vulnerable if and only if : σ ∩ τtN 6= ∅

The fact that σ ∩ τtN 6= ∅ means that σ is in the trajectory of the propertyP and consequently the property P will reach σ.

Protector controlLet us now consider the protector control problem using a CA approach.

For a given area σ ⊂ L, denote by Sσ = s : σ → S the set of mappingsconsisting of the restriction to σ of a CA configuration. Assume that σ is vul-nerable, so there exists a time ti such that : s′ti 6= stiConsider now a dynamical control denoted by u which aims to protect the zoneσ. The control domain is assumed to be variable and it is given at time t byDt = c ∈ L| ut (c) 6= 0 where ut denotes the control variable. The problemconsists in finding the family of domains Dt such that σ ∩ τutN = ∅ where τutN isthe new trajectory of P for the controlled system.

The new obtained transition rule for the controlled CA is defined as follows :

s′′ti+1(c) = f ′′

(s′′ti (N (c)) , uti (c)χσ

)(5)

where f ′′(s′′t (N(c)), u) = st+1. It means that for cells in σ, the state value stevolves normally without disturbance when a control u is applied. Otherwise,f ′′(s′′t (N(c)), 0) = s′t and the disturbance is expanding in the absence of control.

We give the following definitions.

Definition 3. If a given zone σ is vulnerable then:

– The zone σ is said to be exactly protectable from time t1 if there exists acontrol u such that at every time ti ≥ t1:

sti = s′′ti (6)

where sti ∈ Sσ and s′′ti ∈ S′′σ are the configuration at the time ti of the

autonomous and the disturbed-controlled system respectively .In this case u is said to be an exact protector control.

– The zone σ is said to be weakly protectable if there exists a control u suchthat ∀ε > 0 :

Card(σ ∩ τutN

)Card (σ)

≤ ε (7)

whereCard

(σ ∩ τutN

)Card (σ)

represents the proportion of cells in the region σ that

are reached by the property P at a given time. We say that u is a weakprotector control.

Page 5: Vulnerability and Protector Control : Cellular Automata Approach

Vulnerability and protector control: cellular automata approach 5

Proposition 2. The zone σ is protectable, if there exists a protector control usuch that:

τutN ∩ σ = ∅ (8)

where τutN is the controlled trajectory of the disturbance.

To illustrate our approach, we consider the following example.

3 Forest fire dynamics example

3.1 Model description

Consider a two dimensional CA defined on a regular lattice L where cells aredenoted by cij and N(cij) a Von Neumann neighborhood of radius 1. The fun-damental dynamical properties of a CA model are the definition of the cell stateand the local rules that update this state from one time step to the next. We con-sider a CA model in three situation: autonomous, disturbed not controlled anddisturbed-controlled systems, defined on the same lattice L with the same typeof neighborhood but each CA has its own set of states and transition function.

Autonomous case: CA for a vegetation dynamics

The states set S = 0, 1, 2, 3, 4 where values 1 to 4 describe successivevegetation stages from a seed to adult plant. Value 0 is for a vacant cell.

State 0 : vacant cell , or State 1 : seed

or State 2 : germination , or State 3 : young plant

or State 4 : adult plant ,

The transition rules f . Defined by the following updating rules :

– A vacant cell will be occupied by a seed if at least one of its neighbours isan adult plant.

if sti (cij) = 0 then sti+1 (cij) =

1 if ∃k, l | ckl ∈ N (cij) and sti (ckl) = 40 otherwise

– A seed will evolve to a germination state at the next time step.

if sti (cij) = 1 then sti+1(cij) = 2

– The transition from germination to young vegetation is given by :

if sti (cij) = 2 then sti+1 (cij) =

0 if ∀k, l|ckl ∈ N (cij) |sti (ckl) = 43 otherwise

Page 6: Vulnerability and Protector Control : Cellular Automata Approach

6 O. Jellouli, A. Bernoussi, M. Amharref, and S. El Yacoubi

– The young state goes to the adult state in the next time step

if sti (cij) = 3 then sti+1 (cij) = 4

– In adult state, the growth of the vegetation slowed down. However the plantcan die (in an arbitrary way) before reaching the maximal age at time Tdead(where Tdead is a random selection for every cell).

if sti (cij) = 4 then sti+1(cij) =

4 ifsti−Tdead

(cij) = sti−Tdead+1 (cij)= · · · = sti (cij) = 4

0 if ti = Tdead

Disturbed system: CA with Fire

The set of states S ′ = 0, 1, 2, 3, 4 where :

or or State 0 : No fire (just vegetation) ,

State 1 : Excitement by fire , State 2 : Fire

State 3 : Ash

State 4 : Empty cell (nothing at all)

The transition rules f ′:

– The distribution of fire is made in a plant cover. We give then the followingtransition rules :

if s′ti (cij) = 0 then s′ti+1(cij) =

1 ifsti (cij) ∈ 2, 3, 4 and∃kl | ckl ∈ N (cij) and s′ti (ckl) = 1

0 otherwise

– if s′ti (cij) = 1 then s′ti+1(cij) = 2

– In the burned-out state, the fire remains stable during a period of combustionTfire. This parameter which depends on the vegetation stage, environment,wind, etc, will be in this study, randomly selected for every cell. After thistime, the fire goes out and the cells will be occupied by ash. That is thetransition from fire to ash.

if s′ti (cij) = 2 then s′ti+1(cij) =

2 ifs′ti−Tfire

(cij) = s′ti−Tfire+1 (cij)

= · · · = s′ti (cij) = 23 if ti = Tfire

– The total dispersion of ash: cells become empty.

if s′ti (cij) = 3 then s′ti+1(cij) = 4

Page 7: Vulnerability and Protector Control : Cellular Automata Approach

Vulnerability and protector control: cellular automata approach 7

– When the cell becomes empty, it always remains empty and obviously it canbe occupied by a new seed if we start again the simulation of vegetation.

if s′ti (cij) = 4 then s′ti+1(cij) = 4

Remark 1. (i) There are several factors that may affect the spread of fire. Slopewhich has a considerable influence on the rate of spread, especially in the initialstages of fire, wind power and direction, type of vegetation, humidity, etc. In theCA rules, these parameters can play an important role and have to be taken intoaccount.

(ii) It should be noted that we are not dealing in this paper with modellingof vegetation dynamics or fire. These are just examples of dynamics consideredin order to illustrate the notions of vulnerability and protector control. A morerigourous study is should be done in this direction for which a good formalismof these aspects have to be defined.

Controlled CA

We introduce the protector control in order to protect a chosen (vulnerable)zone σ. The effect of the control consists in changing the transition rule of firespread introducing a control term u.

-Transition rules f′′:

A given cell cij , with some vegetation, can be burned if there is a fire in itsneighborhood. So to protect the zone σ we have to determine a domain of thecontrol variable uti denoted by D, such that for each uti (cij) = u. The effect ofthe control u is to stop the fire spread toward the region σ.

if s′′ti (cij) = 0 then s′′ti+1(cij) =

1 if

sti ∈ 2, 3, 4 and∃kl | ckl ∈ N (cij) and s′′ti (ckl) = 1

u if cij ∈ D0 otherwise

or or State 0 : No fire (just vegetation)

State 1 : Excitement by fire , : Control u

3.2 Simulation results

The given simulations for the considered CA were performed using a developedapplication with JAVA environment. The CA is based on a regular grid of cellsrepresenting the domainΩ. The obtained lattice is L = cij |1 ≤ i ≤M, 1 ≤ j ≤Mwith M ×M representing the total total number of cells in L.

The states of cells on the boundaries of the grid are set to zero value whichmeans the choice of adiabatic boundary conditions.

Page 8: Vulnerability and Protector Control : Cellular Automata Approach

8 O. Jellouli, A. Bernoussi, M. Amharref, and S. El Yacoubi

Autonomous CAThe simulation starts with an initial state consisting of empty cells except forsome isolated seeds.

Figure 1: Evolution of a plant cover with M=33.

Disturbed system with fireThe simulation starts with an initial condition at t′ = 1 when the fire starts atthe cell c5,15.

Figure 2: Spreadable fire and vulnerable area

Remark 2. The fire is spreading over the whole area. We can then deduce thevulnerable area which has to be protected.

Controlled case:According to the simulation of fire spreading, the vulnerable zone is the arealocated in the right of cell c5,15 which is excited with fire. Therefore, the regionσ to be protected, must be set in this area.

Let σ ⊂ L be a region defined by: σ = cij | 18 ≤ i ≤ 25 , 12 ≤ j ≤ 22

Example 1. In this particular case, we can notice that the region σ can be pro-tected from fire spreading when the control domain consists of a rectangularzone D = cij | 16 ≤ i ≤ 27 , 10 ≤ j ≤ 24.

Page 9: Vulnerability and Protector Control : Cellular Automata Approach

Vulnerability and protector control: cellular automata approach 9

Figure 3: The zone σ is protected

Example 2. Let us consider another region σ with an increased area which hasto be protected. Let D be the following new domain of the control action :

D = cij | 14 ≤ i ≤ 28 , 8 ≤ j ≤ 26

Figure 4: The zone σ is not protected

In the two examples, we illustrate the possibility of protecting a given regionagainst the fire spread with a ’good’ choice of the domain D in example 1, Fig.3. As the control value u has been fixed for all controlled cells, the size andlocation of the domain D remains for the moment, the only way to control thepropagation of fire toward the vulnerable area.

4 Conclusion

In this paper we attempt to investigate the protector control problem usingcellular automata approach. The protector control consists to protect a givenzone faced to a spreadable disturbance. We consider the case of a control withdynamic support and we illustrate this aspect through a simple example of forestfire.

Page 10: Vulnerability and Protector Control : Cellular Automata Approach

10 O. Jellouli, A. Bernoussi, M. Amharref, and S. El Yacoubi

The modelling of the vegetation and fire dynamics is not the main objectiveof this work. These dynamics have been considered only to illustrate the pro-tector control concept and vulnerability through cellular automata approach.Furthermore, the concept of protector control has to be rigourously defined andcharacterized in relation with vulnerability and spreadability concepts. Suchproblems are under investigation.

References

1. A. Bernoussi, Spreadability and vulnerability of distributed parameter systems,International journal of systems science. Vol.38. N. 4, pp. 305-317, 2007.

2. A. Bernoussi, Spreadability, vulnerability and protector control, MathematicalModelling of Natural Phenomena, 5(7), pp. 145-150, 2010.

3. B.Chopard, and M. Droz, Cellular automata Modelling of Physical Systems, Cam-bridge University Press, Cambridge, 1998.

4. Deutsch, Andreas and Sabine Dormann, Cellular automaton modeling of biologicalpattern formation, 2005.

5. S. El Yacoubi and A. El Jai, Cellular automata and spreadability, Internationaljournal of Mathematical and computer modelling, volume 36, 1059-1074, 2002.

6. S. EL Yacoubi, A Mathematical method for control problems on Cellular Automatamodels, International Journal of Systems Sciences, 39, No 5, pp. 529-538, 2008.

7. Greenberg, M.James, and S. P. Hastings, Spatial patterns for discrete models ofdiffusion in excitable media. SIAM Journal on Applied Mathematics 34.3, pp. 515-523, 1978.

8. I. Karafyllidis and Adonios Thanailakis, A model for predicting forest fire spreadingusing cellular automata, Ecological modelling, Vol. 99, pp. 87-97, 1997.

9. P. Progias and G. Ch. Sirakoulis, An FPGA Processor for Modelling WildfireSpread, Mathematical and Computer Modeling, vol. 57, no. 5-6, pp. 1436-1452,2013.

10. Y.Qaraai, A.Bernoussi, Protector control: Extension to a class of nonlinear dis-tributed systems. International Journal of Applied Mathematics and ComputerScience, 20(3), pp. 427-443, 2010.

11. R. Slimi and S. El Yacoubi, Spreadable Cellular Automata: Modelling and Sim-ulation, International Journal of Systems Sciences, Vol. 40, No 5, pp. 507-520,2009.

12. Toffoli, Tommaso, Cellular automata as an alternative to (rather than an approx-imation of) differential equations in modeling physics, Physica D: Nonlinear Phe-nomena 10.1 pp. 117-127, 1984.

13. G.A. Trunfio, Predicting Wildfire Spreading Through a Hexagonal Cellular Au-tomata Model, in Proc. of ACRI 2004, LNCS vol. 3305, pp. 385-394, 2004.

14. G.A. Trunfio, D. D’Ambrosio, R. Rongo, W. Spataro, S. Di Gregorio, A New Algo-rithm for Simulating Wildfire Spread Through Cellular Automata, ACM Transac-tions on Modeling and Computer Simulation, 22, 6:1-6:26, ISSN: 1049-3301, 2011.

15. Gerard Y. Vichniac, Simulating physics with cellular automata. Physica D: Non-linear Phenomena 10.1 pp. 96-116, 1984.

16. Wolfram, Stephen, Cellular automata and complexity: collected papers, Vol. 1.Reading: Addison-Wesley, 1994

17. Maria L. Zapp and Michael R. Green, Sequence-specific RNA binding by the HIV-1Rev protein. Nature 342.6250 pp. 714-716, 1989.