首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
本文从一般时间网出发,派生出一种简单时间网,并建模了延迟,分支选择,异步选择,优先权等Ada实时结构,特别是把优先权处理为一种时间特性,这样不仅扩充了Petri网在Ada中的建模能力,同时可以更加准确刻画Ada程序行为。  相似文献   

2.
3.
为了增强混杂Petri网解决资源共享和资源冲突的能力,定义一种新的混杂Petri网模型———资源配置混杂Petri网,提出了相应的使能和激发规则.将对连续变迁和离散变迁的控制作用引入混杂Petri网,同时,增加了资源配置变迁和资源释放变迁,用于有效分配可重复利用的资源.以典型的混杂生产过程为例,研究混杂系统生产过程建模.研究结果表明,所定义的模型描述能力强,模型语义正确合理,能够有效描述和分析混杂系统生产过程.  相似文献   

4.
基于时间Petri网的工作流建模   总被引:4,自引:0,他引:4  
随着工作流管理的发展,人们提出了很多扩展Petri网概念用于工作流建模。描述工作流中的资源、资源条件以及任务与资源条件之间的关系是一件很复杂的事情。而现有的用于描述工作流的Petri网在这方面,并不令人满意。该文特别强调资源的概念,在时间Petri网的基础上提出了一种新Petri网———资源条件/任务网(ResourceCondition/Tasknet,简称RC/TN),利用RC/TN网来进行工作流建模,描述工作流的执行过程。并将该工作流建模方法应用于OA流程的描述中。  相似文献   

5.
The Ada task system is critically evaluated from the point of view of real-time applications. Based on such an evaluation an abstract machine, supplying both an operational semantics and an implementation schema for it, is derived. Such a schema, depending on parameters, may supply a standard implementation following the Ada Reference Manual specifications, or may allow the user to implement ad hoc policies required by the time constraints of the specific application.  相似文献   

6.
Petri nets for protocol engineering   总被引:8,自引:0,他引:8  
  相似文献   

7.
8.
The problem of splitting any given Petri net into functional subnets is considered. The properties of functional subnets and sets that induce them are investigated. An algorithm of polynomial complexity is constructed for decomposition of nets.Translated from Kibernetika i Sistemnyi Analiz, No. 5, pp. 131–140, September–October 2004.  相似文献   

9.
Foundations of compositional analysis of Petri nets are presented. This analysis consist of the determination of properties of a given Petri net from the properties of its functional subnets. Compositional analysis covers the investigation of behavioral and structural properties of Petri nets with the help of matrix methods that use fundamental equations and invariants. The exponential acceleration of computations as a function of the dimensionality of a net is obtained. __________ Translated from Kibernetika i Sistemnyi Analiz, No. 1, pp. 143–154, January–February 2006.  相似文献   

10.
In this study, the determination of control actions for timed continuous Petri nets is investigated by the characterisation of attractive regions in marking space. In particular, attraction in finite time, which is important for practical issues, is considered. Based on the characterisation of attractive regions, the domain of admissible piecewise constant control actions is computed, and sufficient conditions to verify the feasibility of the control objectives are proposed. As a consequence, an iterative procedure is presented to compute piecewise constant control actions that correspond to local minimum time control for timed continuous Petri nets.  相似文献   

11.
Techniques for analyzing sequential programs in order to improve their reliability have been widely studied in the past. Among the most interesting analysis techniques, we consider symbolic execution. However, analysis techniques for concurrent programs, and in particular symbolic execution, are still an open research area. In this paper, we define a method for symbolic execution of concurrent systems, based on an extension of the Petri net formalism, called EF nets. EF nets are a powerful, highly expressive and general formalism. Depending on the level of abstraction of actions and predicates that one associates to the transitions of the net, EF nets can be used as a high-level specification formalism for concurrent systems, or as a lower level internal representation of concurrent programs. Thus, the model is not dependent on a particular concurrent programming language, but it is flexible enough to be the kernel model for the representation of a wide set of systems and programming languages. In the paper, in order to support the analysis of a concurrent system or program, at first a general algorithm for symbolically executing an EF net is defined. Then, a more efficient algorithm is given for the particular, though important, subclass of EF nets, defined as safe EF nets. Such algorithm is proved to significantly help in reducing the amount of information needed to characterize a symbolic execution. Both the modelling power of the EF nets and the usefulness of the concurrent symbolic execution algorithms defined are illustrated by means of a case study.  相似文献   

12.
13.
In this paper the correspondence between safe Petri nets and event structures, due to Nielsen, Plotkin and Winskel, is extended to arbitrary nets without self-loops, under the collective token interpretation. To this end we propose a more general form of event structure, matching the expressive power of such nets. These new event structures and nets are connected by relating both notions with configuration structures, which can be regarded as representations of either event structures or nets that capture their behaviour in terms of action occurrences and the causal relationships between them, but abstract from any auxiliary structure.A configuration structure can also be considered logically, as a class of propositional models, or—equivalently—as a propositional theory in disjunctive normal from. Converting this theory to conjunctive normal form is the key idea in the translation of such a structure into a net.For a variety of classes of event structures we characterise the associated classes of configuration structures in terms of their closure properties, as well as in terms of the axiomatisability of the associated propositional theories by formulae of simple prescribed forms, and in terms of structural properties of the associated Petri nets.  相似文献   

14.
This paper tackles the practical aspects of obtaining a distributed version of an Ada program. It proposes the use of an adapter, which can be a methodology or an automatic translator. The adapter accepts source of a concurrent Ada program, adds communication and control tasks, and produces source for a single distributed Ada program, which can then be compiled and run on a multi-processor computer. The original program can consist of packages and tasks, and both of these can be classed as virtual nodes. The process of adaption does not alter the contents of any package in the original program, so that the method is directly applicable to systems that make use of library and generic packages. The communication between virtual nodes, which would normally reside as one per processor, is via messages on a ring, but the protocols are kept as simple as possible, and the messages are fully checked Ada types, rather than byte strings. The method has been applied to programs of the client-server model, and could be adapted for other rendezvous-based languages such as occam.  相似文献   

15.
This paper develops modular verification rules for Ada generics which are proven to be sound and complete. The generic mechanism in Ada allows modules to be parameterized by types, procedures and functions. The modularity property allows a generic to be verified once, and then exported to other modules which assume that it is correct. This requires the generic to have a specification which is used in verifying other modules, but its implementation cannot be used for this purpose. Thus, modular verification cannot be based on removing generics by macro expansion which requires the use of the generic's implementation. The main difficulty with specifying and verifying a generic is that the specification language may need to be extended with a new theory for specifying and reasoning about properties of objects whose type is a parameter to the generic. Such theories must be part of the specification of the generic, and this raises the possibility that the extended specification language may not be expressive, even if it was before the extension. The use of strings in our specification language prevents this from happening, which is proven in the paper; this is a major step toward establishing the completeness of our rules. Modularity also had a large impact on our semantics for programming constructs which is quite different from the usual semantics in the literature, even though it is still based the denotational semantics of Scott and Strachey. The main reason for this is that we had to modify the standard definition of validity. Modularity requires that validity depend on certain internal assertions in a program, such as the precondition of a procedure invoked in the program.  相似文献   

16.
This document gives an algebraic and two polygraphic translations of Petri nets, all three providing an easier way to describe reductions and to identify some of them. The first one sees places as generators of a commutative monoid and transitions as rewriting rules on it: this setting is totally equivalent to Petri nets, but lacks any graphical intuition. The second one considers places as one-dimensional cells and transitions as two-dimensional ones: this translation recovers a graphical meaning but raises many difficulties since it uses explicit permutations. Finally, the third translation sees places as degenerated two-dimensional cells and transitions as three-dimensional ones: this is a setting equivalent to Petri nets, equipped with a graphical interpretation.  相似文献   

17.
针对工业生产中液位控制具有连续变量和离散变量共存这一复杂性,提出建立一种基于Petri网的水箱液位系统运行的混杂状态变换模型,用以分析单容、双容水箱液位等工业系统在运行过程中的多重状态及其转换关系.在Matlab/Simulink环境下,设计实现了单容、双容水箱液位混杂系统的仿真控制模型.仿真实验结果表明,该混杂模型及控制策略符合液位系统实际运行要求;采用混杂Petri进行建模分析,能较全面地描述液位系统中物理量间的并发及混杂现象,模型具有较好的封装性和可实现性,设计方法简便、有效.  相似文献   

18.
Asymptotic continuous Petri nets   总被引:6,自引:0,他引:6  
A Petri net is basically a discrete model. However, continuous Petri nets, such that the markings are real numbers have been defined. Two continuous Petri net models involving time have been drawn up. They differ by the calculation of the instantaneous firing speeds of the transitions. Both can be used to approximate a timed Petri net. The former considers constant firing speeds (CCPN) and is very easy to simulate (few events have to be considered, even when it approximates a timed Petri net with many reachable markings). The latter considers firing speeds depending on the marking (VCPN). Although it provides a better approximation, its simulation is longer because the markings and speeds are given by differential equations. This paper introduces a third model (ACPN) which presents the advantages of the two preceding ones. In most cases, this model represents the asymptotic behavior of the VCPN. Then their precisions are similar. Since the firing speeds of the ACPN are constant, it is as easy to simulate as the CCPN.  相似文献   

19.
Siegfried Wendt 《Software》1980,10(11):935-942
The problem of graphic representation of recursive program structures is discussed. On the basis of the stack mechanism, modified Petri nets are introduced which only slightly differ from the common state machine flowcharts, but have much more representation power.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号