-
41
Research on data loss probability and its impact of CTCS-3 train ground communication based on GSM-R
Published 2014-12-01Subjects: “…deterministic and stochastic Petri net…”
Get full text
Article -
42
A Multistep Look-Ahead Deadlock Avoidance Policy for Automated Manufacturing Systems
Published 2017-01-01“…It is shown that the development of an optimal DAP for the considered class of Petri nets is also of polynomial complexity. It is indicated that the steps needed to look ahead in a DAP depend on the structure of the net model. …”
Get full text
Article -
43
Cloud/VPN-Based Remote Control of a Modular Production System Assisted by a Mobile Cyber–Physical Robotic System—Digital Twin Approach
Published 2025-01-01“…Continuous Petri Nets (CPNs) handle the movement of the MCPRS. …”
Get full text
Article -
44
A Comprehensive Approach to Power Management in Embedded Systems
Published 2011-03-01“…A set of mechanisms specifically conceived for this scenario is proposed, including a power management API defined at the level of user-visible system components, the infrastructure necessary to implement that API (namely, battery monitoring, accounting, autosuspend, and autoresume), an energy-event propagation mechanism based on Petri nets and implemented with aspect-oriented programming techniques, and an autonomous power manager build upon the proposed API and infrastructure. …”
Get full text
Article -
45
Research on models of network security evaluation and analysis
Published 2018-04-01“…Network security assessment helps to grasp the current and future risks of the network information system clearly,and gives corresponding security suggestions and countermeasures.Model of network security assessment and analysis is an important research direction and content,for which there is no review to give a comprehensive summary or analysis.A review of common network security evaluation and analysis model was given.The model that focus on attack was introduced,such as the attack tree,attack graph and kill chain,then the model that focus on network defense or offensive and defensive interaction was explained,such as attack surface,cyber epidemic model,Petri nets and automation machine,giving introduction to the basic concept,application field,modeling analysis process,advantages and disadvantages of the models.Then,typical examples were given to illustrate the application of the models in network defense technology evaluation and analysis.…”
Get full text
Article -
46
Modeling and performance analysis of train communication network based on switched ethernet
Published 2015-09-01“…In order to meet the information transmission requirements of large capacity,high speed and hard real-time in the future,switched ethernet was introduced to the train communication network (TCN).Messages of different priorities was investigated,and established the TCN transmission process model with determined and stochastic Petri nets (DSPN) in accordance to its communication scheduling mechanism.The influences of different switch scheduling algorithms to the delay were compared,and the relationships between throughput and message number,throughout and generating cy-cle were respectively investigated.The experimental results show that the priority scheduling algorithm can reduce the delay of real-time data under the condition of sacrificing non real-time data's delay.It also verify the throughput of TCN based on switched ethernet is much higher than that of the existing TCN,which can provide theoretical basis for the de-sign and optimization in the future.…”
Get full text
Article -
47
Multi-model based behaviour analysis for inclusive mobility
Published 2024-01-01“…They are modelled with Petri nets and Faults trees. The analysis of combinations between these models generates scenarios that can affect inclusive mobility in terms of human health, system safety or fluidity of mobility. …”
Get full text
Article -
48
Failure recovery algorithm for LRT and transaction property analysis
Published 2012-04-01“…Researchers have worked on recovery strategies of composition transactions,most efforts focus on transaction consistency by backward recovery,compensation is commonly used for backward recovery,which have limitations since the cost of compensation tasks are rather expensive,and the compensation mechanism can not satisfy various requirements of applications.A transaction recovery algorithm was proposed including forward recovery,backward recovery and alternative recovery,which was a formal modeling method based on extended Petri nets,state token,data token and QoS token were introduced to implement relaxed ACID properties of LRT.When failure occurs,terminate dependency point (TDP) and compensation set were calculated dynamically,recovery strategies were added or deleted automatically according to the data flow dependency,control flow dependency and state dependency among tasks.Failure types are generated by log file mining,therefore,failure coordination and recovery are implemented and an executable model which support add/delete failure recovery behavior is constructed seamlessly.…”
Get full text
Article -
49
The Concept of a Method for Predicting the Cascade Effect Under Conditions of Hybrid Warfare
Published 2024-09-01“…Using complementary tools such as process analysis, risk assessment, Petri nets, and Bayesian network in the form of the Critical Infrastructure Security Situational Management methodology, the authors provide a comprehensive solution for modeling how to protect the life and health of the civilian population. …”
Get full text
Article -
50
A Correctness Checking Approach for Collaborative Business Processes in the Cloud
Published 2020-01-01“…Our approach is implemented in the PIPE (an open tool for Petri nets) and evaluated on actual cases that show its effectiveness and efficiency.…”
Get full text
Article -
51
A Framework for the Objective Assessment of Registration Accuracy
Published 2014-01-01“…In this work, a different approach based on Petri nets is proposed. The basic idea consists in predicting the accuracy of a given pipeline based on the identification and characterization of the sources of inaccuracy. …”
Get full text
Article -
52
Mixed Integer Programming-Based Liveness Test for FMS with Full Routing Flexibility
Published 2014-01-01“…Mixed integer programming (MIP) is an important technique to verify the liveness property of sequential flexible manufacturing systems (FMS) modeled by Petri nets. When there are some fully flexible routings in FMS, the existing MIP-based methods are not suitable for testing their liveness. …”
Get full text
Article -
53
Process Completing Sequences for Resource Allocation Systems with Synchronization
Published 2012-01-01“…Throughout the paper, we use a class of Petri nets called Generalized Augmented Marked Graphs to represent our resource allocation systems.…”
Get full text
Article -
54
Methodical Approach to Selecting the Appropriate Distribution for Reliability Analysis: Automotive Application
Published 2025-01-01“…As a result, in improving the models used to analyze complex systems behavioral analogies such as Petri nets or Markov chains.…”
Get full text
Article -
55
Deadlock Prevention Policy with Behavioral Optimality or Suboptimality Achieved by the Redundancy Identification of Constraints and the Rearrangement of Monitors
Published 2015-01-01“…This work develops an iterative deadlock prevention method for a special class of Petri nets that can well model a variety of flexible manufacturing systems. …”
Get full text
Article -
56
Multiperson Interactive Activity Recognition Based on Interaction Relation Model
Published 2021-01-01“…Secondly, this paper proposed an adaptive occlusion state behavior recognition method derived from the semantic knowledge model to ravel out the concern of occlusion and self-occlusion in human action recognition. Then, Petri Nets are used to recognize multiperson interactive actions. …”
Get full text
Article -
57
Simulation of discrete control systems with parallelism of behavior
Published 2023-12-01“…To specify the behavior of such control systems, it is proposed to use the PRALU language of parallel control algorithms, which is based on Petri nets and which allows to order events occurring during the device operation. …”
Get full text
Article -
58
Effective Facial Expression Recognition System Using Artificial Intelligence Technique
Published 2024-12-01“…A hybrid ANN-GA model that uses Petri Nets and production systems is proposed for the real-time video sequence analysis with high precision in predicting different dynamic facial activities of anger, surprise, disgust, joy, sadness and fear from emotion faces. …”
Get full text
Article -
59
Modeling, Design, and Implementation of a Cloud Workflow Engine Based on Aneka
Published 2014-01-01“…This paper presents a Petri net-based model for cloud workflow which plays a key role in industry. …”
Get full text
Article -
60
A Retrieval Optimized Surveillance Video Storage System for Campus Application Scenarios
Published 2018-01-01“…From the above, we model the storage system by a stochastic Petri net (SPN) and verify the promotion of query performance by quantitative analysis.…”
Get full text
Article