385 results on '"CPN Tools"'
Search Results
2. Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool.
- Author
-
Feng, Tao, Chen, Taining, and Gong, Xiang
- Subjects
- *
PETRI nets - Abstract
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analysis of the identified security threats. Secondly, we use the CPN tool to model the protocol formally and conduct model checking and security analysis. Finally, we analyze and discuss the results of the model checking, which demonstrate that the ISA100.11a standard protocol may have vulnerabilities when certain security threats exist, and provide some suggestions to enhance the security of the protocol. This research provides a certain level of security assurance for the ISA100.11a standard protocol and serves as a reference for similar security research on protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Simulation and Comparison of Different Scenarios of a Workflow Net Using Process Mining
- Author
-
Nedopetalski, Felipe, Barreto, Franciny Medeiros, Freitas, Joslaine Cristina Jeske de, Julia, Stéphane, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, and Latifi, Shahram, editor
- Published
- 2023
- Full Text
- View/download PDF
4. Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool
- Author
-
Tao Feng, Taining Chen, and Xiang Gong
- Subjects
CPN tools ,ISA100.11a standard ,colored Petri net theory ,formal analysis ,Information technology ,T58.5-58.64 - Abstract
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analysis of the identified security threats. Secondly, we use the CPN tool to model the protocol formally and conduct model checking and security analysis. Finally, we analyze and discuss the results of the model checking, which demonstrate that the ISA100.11a standard protocol may have vulnerabilities when certain security threats exist, and provide some suggestions to enhance the security of the protocol. This research provides a certain level of security assurance for the ISA100.11a standard protocol and serves as a reference for similar security research on protocols.
- Published
- 2024
- Full Text
- View/download PDF
5. Using Colored Petri Nets for Optimization of Healthcare Processes
- Author
-
Gehlot, Vijay, Wickramasinghe, Nilmini, Sloane, Elliot B., Kirk, Michael, Miller, Eric R., Wickramasinghe, Nilmini, Series Editor, Chalasani, Suresh, editor, and Sloane, Elliot, editor
- Published
- 2022
- Full Text
- View/download PDF
6. DEVELOPMENT OF A MATHEMATICAL MODEL OF THE PROCESSES OF INCIDENT MANAGEMENT COMMUNICATIONS SERVICES
- Author
-
Sergei Vladimirovich Yakovlev, Svetlana Evgen'evna Derjabina, and Marina Vasil'evn Il'jasova
- Subjects
компания связи ,услуга ,itsm ,itil ,бизнес-процесс ,имитационная модель ,cpn tools ,пространство состояний ,маркировка ,communication company ,service ,business process ,simulation model ,state space ,marking ,Economics as a science ,HB71-74 - Published
- 2022
7. PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT.
- Author
-
Gong, Xiang, Feng, Tao, and Albettar, Maher
- Subjects
BUSINESS communication ,MACHINE-to-machine communications ,INTERNET of things ,ELLIPTIC curves ,PUBLIC key cryptography ,PHYSICAL mobility ,CLOCKS & watches - Abstract
Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and servers. In order to solve the security and availability problems regarding communication between edge devices with constrained resources and servers in M2M communication, in this study we proposed an authentication and session establishment protocol based on physical unclonable functions (PUFs). The scheme does not require clock synchronization among the devices, and it circumvents the situation where the authentication phase has to use a high computational overhead fuzzy extractor due to PUF noise. The protocol contains two message interactions, which provide strong security and availability while being lightweight. The security modelling is based on CPN Tools, which verifies security attributes and attack resistance in the authentication phase. After considering the design of the fuzzy extractor and scalability, the proposed scheme significantly reduces the computational overhead by more than 93.83% in the authentication phase compared with other schemes using PUFs. Meanwhile, under the guarantee of availability, the communication overhead is maintained at a balanced and reasonable level, at least 19.67% lower than the solution using XOR, hashing, or an elliptic curve. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Modeling and Verification of Temporal Constraints for Web Service Composition
- Author
-
Souilah Benabdelhafid, Maya, Boubaker, Houda, Boufaida, Mahmoud, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Cleophas, Loek, editor, and Massink, Mieke, editor
- Published
- 2021
- Full Text
- View/download PDF
9. OPTIMIZATION OF TOLL SERVICES USING QUEUING THEORY IN THE CASE OF ETHIOPIA
- Author
-
Abate Sewagegn
- Subjects
Queuing theory ,Simulation ,Service optimization ,Toll ,Model ,CPN tools ,Railroad engineering and operation ,TF1-1620 ,Industrial engineering. Management engineering ,T55.4-60.8 - Abstract
The toll road service is planned and built to fund road construction and management of traffic operations. Although the toll service has several benefits, it also has challenges by creating a queue in the event of high traffic. Queues at a toll service in addition to pollution and waiting time costs also expose drivers to road traffic accidents and affect the economy of the country. Queuing problems at highway gates and exits due to toll service have become the main concern for transport managers and planners because of the randomness of inter-arrival and service time. The critical point in the management of toll road services is finding the optimal number of servers. This paper aims to analyze the queue feature to optimize the toll service using analytical and simulation models by considering the Addis-Adama expressway toll service in Ethiopia. The paper used a mathematical model and a simulation model using the CPN tools to investigate the queuing parameters. Then the model results helped us to get the optimum output by using economic analysis and identifying the minimum waiting time and operating cost without expense. The performance of the toll service highly depends on the number of servers, the number of vehicles in the system and queue, waiting time in the queue, service time, and inter-arrival time.
- Published
- 2022
- Full Text
- View/download PDF
10. Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things.
- Author
-
Gong, Xiang and Feng, Tao
- Subjects
- *
KEY agreement protocols (Computer network protocols) , *INTERNET of things , *INTERNET protocols , *ELLIPTIC curves , *PROBLEM solving - Abstract
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the current related research. Then, we propose a new lightweight authentication and key agreement protocol based on the CoAP framework. The scheme adopts shared secret and elliptic curve public key technology, which ensures the anonymity of the communicators and provides strong security and anti-attack capacity. In terms of security analysis, the Dolev–Yao Adversary model and a security model checking analysis method based on CPN Tools are improved, in order to verify the correctness and security of the proposed scheme. Compared with other schemes, regarding communication overhead, computational cost, and security, the proposed scheme provides a robust and comprehensive security guarantee, although it is not the lightest. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
11. Customer Classification-Based Pre-sale Multi-value-chain Collaborative Mechanism Verification
- Author
-
Duan, Lei, Bo, Wen, Wu, Changmao, Ning, Huansheng, Zhang, Changyou, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Milošević, Danijela, editor, Tang, Yong, editor, and Zu, Qiaohong, editor
- Published
- 2019
- Full Text
- View/download PDF
12. Customer Evaluation-Based Automobile After-Sale Service Multi-value-Chain Collaborative Mechanism Verification
- Author
-
Liu, Dong, Bo, Wen, Wu, Changmao, Yang, Hongju, Zhang, Changyou, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Milošević, Danijela, editor, Tang, Yong, editor, and Zu, Qiaohong, editor
- Published
- 2019
- Full Text
- View/download PDF
13. Research on a Vehicle Authentication and Key Transmission Protocol Based on CPN
- Author
-
Lu Zheng and Tao Feng
- Subjects
CAN protocol ,CPN Tools ,Dolev–Yao ,formal analysis ,security assessment ,Mathematics ,QA1-939 - Abstract
With the rapid development of the Internet of Vehicles, the increase in vehicle functional requirements has led to the continuous increase in complex electronic systems, and the in-vehicle network is extremely vulnerable to network attacks. The controller area network (CAN) bus is the most representative in-vehicle bus technology in intra-vehicular networks (IVNs) for its flexibility. Although the current framework to protect the safety of CAN has been proposed, the safety communication mechanism between electronic control units (ECUs) in the vehicle network is still weak. A large number of communication protocols focus on the addition of safety mechanisms, and there is a lack of general protocol formal modeling and security assessment. In addition, many protocols are designed without considering key updates and transmission, ECUs maintenance, etc. In this work, we propose an efficient in-vehicle authentication and key transmission scheme. This scheme is a certificateless framework based on identity cryptography, which can not only ensure the security of the in-vehicle network but also meet the real-time requirements between ECUs. Moreover, this scheme can reduce the complexity of key management for centralized key generators. To evaluate the security of this scheme, we adopt a protocol model detection method based on the combination of the colored Petri net (CPN) and the Dolev–Yao attack model to formally evaluate the proposed protocol. The evaluation results show that the proposed scheme can effectively prevent three types of man-in-the-middle attacks.
- Published
- 2022
- Full Text
- View/download PDF
14. Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things
- Author
-
Xiang Gong and Tao Feng
- Subjects
CoAP ,Internet of Things ,authentication ,anonymity ,key agreement ,CPN Tools ,Chemical technology ,TP1-1185 - Abstract
To solve the problem regarding the lack of a lightweight and secure authentication and key agreement protocol in the Constrained Application Protocol of the Internet of Things environment, we explore the security flaws and applicability problems in the current related research. Then, we propose a new lightweight authentication and key agreement protocol based on the CoAP framework. The scheme adopts shared secret and elliptic curve public key technology, which ensures the anonymity of the communicators and provides strong security and anti-attack capacity. In terms of security analysis, the Dolev–Yao Adversary model and a security model checking analysis method based on CPN Tools are improved, in order to verify the correctness and security of the proposed scheme. Compared with other schemes, regarding communication overhead, computational cost, and security, the proposed scheme provides a robust and comprehensive security guarantee, although it is not the lightest.
- Published
- 2022
- Full Text
- View/download PDF
15. A New Approach to Evaluate the Complexity Function of Algorithms Based on Simulations of Hierarchical Colored Petri Net Models
- Author
-
Júnior, Clarimundo M. Moraes, Julia, Rita Maria S., Julia, Stéphane, de F. Silva, Luciane, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Series editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, and Latifi, Shahram, editor
- Published
- 2018
- Full Text
- View/download PDF
16. Implementation of support for a multi-type flow of requests in the payment card processing server model in the form of a petri net and its validation.
- Author
-
Tshukin, B.A., Klimov, V.V., and Sokolov, I.D.
- Subjects
PETRI nets ,PAYMENT ,MODEL validation - Abstract
In this paper we are considering the implementation of support for modeling of the input flow of differently typed requests in the model of the payment card processing system server in form of a hierarchical coloured Petri net. Also, the validation of the extended model was performed using data from a real processing system. Based on its results, we made a conclusion on the acceptability of using the model in further research and in practical application. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
17. Prosega/CPN: An Extension of CPN Tools for Automata-based Analysis and System Verification
- Author
-
J. C. Carrasquel, A. Morales, and M. E. Villapol
- Subjects
формальные методы ,раскрашенные сети петри ,cpn tools ,конечные автоматы ,верификация протоколов ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The verification and analysis of distributed systems is a task of utmost importance, especially in today’s world where many critical services are completely supported by different computer systems. Among the solutions for system modelling and verification, it is particularly useful to combine the usage of different analysis techniques. This also allows the application of the best formalism or technique to different components of a system. The combination of Colored Petri Nets (CPNs) and Automata Theory has proved to be a successful formal technique in the modelling and verification of different distributed systems. In this context, this paper presents Prosega/CPN ( Protocol Sequence Generator and Analyzer ), an extension of CPN Tools for supporting automata-based analysis and verification. The tool implements several operations such as the generation of a minimized deterministic finite-state automaton (FSA) from a CPN’s occurrence graph, language generation, and FSA comparison. The solution is supported by the Simulator Extensions feature whose development has been driven by the need of integrating CPN with other formal methods. Prosega/CPN is intended to support a formal verification methodology of communication protocols; however, it may be used in the verification of other systems whose analysis involves the comparison of models at different levels of abstraction. For example, business strategy and business processes. An insightful use case is provided where Prosega/CPN has been used to analyze part of the IEEE 802.16 MAC connection management service specification.
- Published
- 2018
- Full Text
- View/download PDF
18. FORMAL APPROACH BASED ON PETRI NETS FOR MODELING AND VERIFICATION OF VIDEO GAMES.
- Author
-
Barreto, Franciny M. and Julia, Stephane
- Subjects
PETRI nets ,VIDEO games ,VIDEO game design - Abstract
Video games are complex systems that combine technical and artistic processes. The specification of this type of system is not a trivial task, making it necessary to use diagrams and charts to visually specify sets of requirements. Therefore, the underlying proposal of this work is to present an approach based on the formalism of Petri nets for aiding in the design process of video games. The activities of the game are represented by a specific type of Petri net called Work-Flow net. The definition of a topological map can be represented by state graphs. Using Colored Petri nets, it is possible to define formal communication mechanisms between the model of activity and the model of the map. The simulation of the timed models allows then to produce an estimated time that corresponds to the effective duration a player will need to complete a level of a game. Furthermore, a kind of Soundness property related to gameplay in a game Quest can be verified through state space analysis. For a better understanding of the approach, the video game Silent Hill II is used. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
19. Modelling of Systems Using a Time-Triggered Ethernet
- Author
-
Nikishin, Kirill, Konnov, Nicolas, Pashchenko, Dmitry, Diniz Junqueira Barbosa, Simone, Series editor, Chen, Phoebe, Series editor, Du, Xiaoyong, Series editor, Filipe, Joaquim, Series editor, Kara, Orhun, Series editor, Kotenko, Igor, Series editor, Liu, Ting, Series editor, Sivalingam, Krishna M., Series editor, Washio, Takashi, Series editor, Dudin, Alexander, editor, Gortsev, Alexander, editor, Nazarov, Anatoly, editor, and Yakupov, Rafael, editor
- Published
- 2016
- Full Text
- View/download PDF
20. МОДЕЛЬ АВТОМАТИЗОВАНОЇ СИСТЕМИ ОПРАЦЮВАННЯ ПАРАМЕТРІВ ПАСАЖИРОПОТОКУ ГРОМАДСЬКОГО ТРАНСПОРТУ 'РОЗУМНОГО' МІСТА НА ОСНОВІ КОЛЬОРОВИХ МЕРЕЖ ПЕТРІ
- Author
-
O. Yu. Boreiko
- Subjects
raspberry pi ,периферійні пристрої ,контролер ,теорія мереж петрі ,cpn tools ,Forestry ,SD1-669.5 - Abstract
Розроблено структуру автоматизованої системи опрацювання параметрів пасажиропотоку громадського транспорту "розумного" міста. Структура базується на використанні одноплатного комп'ютера Raspberry Pi в ролі головного контролера, IP відеокамер, USB фотокамери, GPS і GSM модулів та інших периферійних пристроїв для збору даних про пасажиропотік у транспортному засобі громадського користування та передачі їх на оброблення сервером. Основою структури є клієнт-серверна взаємодія. Представлено покроковий алгоритм, що відображає загальні принципи функціонування системи та етапи опрацювання параметрів пасажиропотоку. На основі розроблених структури та алгоритму функціонування побудовано та досліджено модель автоматизованої системи опрацювання параметрів пасажиропотоку громадського транспорту на основі кольорових мереж Петрі. Модель реалізовано засобами програмного пакету CPN Tools, призначеного для побудови моделей за допомогою розширених класів теорії мереж Петрі. Результати дослідження кольорової мережі Петрі дають змогу стверджувати, що пропоновані структура та алгоритм системи цілком задовольняють технічне завдання. Згідно з проведеним аналізу мережа Петрі є живою, усі стани системи досяжні, а "мертві" переходи та тупики відсутні.
- Published
- 2017
- Full Text
- View/download PDF
21. Extending CPN Tools with Ontologies to Support the Management of Context-Adaptive Business Processes
- Author
-
Serral, Estefanía, De Smedt, Johannes, Vanthienen, Jan, van der Aalst, Wil, Series editor, Mylopoulos, John, Series editor, Rosemann, Michael, Series editor, Shaw, Michael J., Series editor, Szyperski, Clemens, Series editor, Fournier, Fabiana, editor, and Mendling, Jan, editor
- Published
- 2015
- Full Text
- View/download PDF
22. Modeling Hybrid Systems with Petri Nets
- Author
-
Bera, Debjyoti, van Hee, Kees, Nijmeijer, Henk, Kacprzyk, Janusz, Series editor, Obaidat, Mohammad S., editor, Ören, Tuncer, editor, and Filipe, Joaquim, editor
- Published
- 2015
- Full Text
- View/download PDF
23. Profiling the publish/subscribe paradigm for automated analysis using colored Petri nets.
- Author
-
Gómez, Abel, Rodríguez, Ricardo J., Cambronero, María-Emilia, and Valero, Valentín
- Subjects
- *
PETRI nets , *ANALYSIS of colors , *UNIFIED modeling language , *SYSTEMS development , *WEB services - Abstract
UML sequence diagrams are used to graphically describe the message interactions between the objects participating in a certain scenario. Combined fragments extend the basic functionality of UML sequence diagrams with control structures, such as sequences, alternatives, iterations, or parallels. In this paper, we present a UML profile to annotate sequence diagrams with combined fragments to model timed Web services with distributed resources under the publish/subscribe paradigm. This profile is exploited to automatically obtain a representation of the system based on Colored Petri nets using a novel model-to-model (M2M) transformation. This M2M transformation has been specified using QVT and has been integrated in a new add-on extending a state-of-the-art UML modeling tool. Generated Petri nets can be immediately used in well-known Petri net software, such as CPN Tools, to analyze the system behavior. Hence, our model-to-model transformation tool allows for simulating the system and finding design errors in early stages of system development, which enables us to fix them at these early phases and thus potentially saving development costs. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
24. OPTIMISATION OF SERVICE CAPACITY BASED ON QUEUEING THEORY.
- Author
-
DORDA, MICHAL, TEICHMANN, DUSAN, and GRAF, VOJTECH
- Subjects
QUEUING theory ,MATHEMATICAL models ,PETRI nets ,QUEUEING networks ,PRODUCTION planning ,CAPACITY requirements planning ,MACHINERY maintenance & repair - Abstract
Queueing theory is a mathematical tool which can be applied for capacity planning and optimisation of production, manufacturing or logistics systems. One of the possible applications of queueing theory is service capacity optimisation. Let us consider that an engineering company operates m homogeneous machines. We assume that the machines are successively operating and down and times between failures and times to repair are exponentially distributed. The broken-down machines are repaired by n repairmen; we assume that n < m. In the article a mathematical model of the problem is presented; the model can be used for optimisation of the number of the repairmen with respect to costs of the system. Results obtained by the mathematical model are compared with simulation results; a simulation model of the problem is based on coloured Petri nets. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. THE USE OF TIMED COLOURED PETRI NETS IN A MANUFACTURING PROCESS MODELING AND SIMULATION.
- Author
-
Pop, Alin
- Subjects
PETRI nets ,MANUFACTURING processes ,TEXTILES ,ASSEMBLY line methods ,ALUMINUM tubes - Abstract
The paper presents a case study of petri nets applications in modeling and simulation of manufacturing process. For this purpose the CPN TOOLS program is used. By using the timed colored petri nets within this program, it can be model and simulate the manufacturing process for a certain period of time. Transitions used in the model are mainly associated with assembly operations and positions are associated with workstations. In order for the simulation to be faithful to the manufacturing process it is necessary to know precisely the operating times for each operation. In the paper it's analyze the functioning of the manufacturing process over a duration of 8 hours, making several simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2019
26. Modeling EMA and MA Algorithms to Estimate the Bitrate of Data Streams in Packet Switched Networks
- Author
-
Domnin, Alexander, Konnov, Nikolay, Mekhanov, Victor, Junqueira Barbosa, Simone Diniz, Series editor, Chen, Phoebe, Series editor, Cuzzocrea, Alfredo, Series editor, Du, Xiaoyong, Series editor, Filipe, Joaquim, Series editor, Kara, Orhun, Series editor, Kotenko, Igor, Series editor, Sivalingam, Krishna M., Series editor, Ślęzak, Dominik, Series editor, Washio, Takashi, Series editor, Yang, Xiaokang, Series editor, Dudin, Alexander, editor, Nazarov, Anatoly, editor, Yakupov, Rafael, editor, and Gortsev, Alexander, editor
- Published
- 2014
- Full Text
- View/download PDF
27. Strategies for Modeling Complex Processes Using Colored Petri Nets
- Author
-
van der Aalst, Wil M. P., Stahl, Christian, Westergaard, Michael, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Jensen, Kurt, editor, van der Aalst, Wil M. P., editor, Balbo, Gianfranco, editor, Koutny, Maciej, editor, and Wolf, Karsten, editor
- Published
- 2013
- Full Text
- View/download PDF
28. CPN Assistant II: A Tool for Management of Networked Simulations
- Author
-
Korečko, Štefan, Marcinčin, Ján, Slodičák, Viliam, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Haddad, Serge, editor, and Pomello, Lucia, editor
- Published
- 2012
- Full Text
- View/download PDF
29. People Transfer in City Transport Modeled via CPN
- Author
-
Kolář, Dušan, Květoňová, Šárka, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Moreno-Díaz, Roberto, editor, Pichler, Franz, editor, and Quesada-Arencibia, Alexis, editor
- Published
- 2012
- Full Text
- View/download PDF
30. Formal Security Evaluation and Improvement of Wireless HART Protocol in Industrial Wireless Network
- Author
-
Tao Feng, Lu Zheng, and Fuyuan Luo
- Subjects
Science (General) ,WirelessHART ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,computer.internet_protocol ,Wireless network ,Industrial control system ,Q1-390 ,CPN Tools ,Scalability ,T1-995 ,Wireless ,Wireless Application Protocol ,business ,Protocol (object-oriented programming) ,computer ,Technology (General) ,Information Systems ,Computer network - Abstract
With the rapid development of wireless communication technology in the field of industrial control systems, Wireless HART is an international wireless standard, because of its low cost and strong scalability, as well as its wide range of applications in the industrial control field. However, it is more open communication so that the possibility of increased attacks by external. At present, there are many types of research on wireless protocol security at home and abroad, but they all focus on the realization of the security function of the protocol itself, which has certain limitations for the formal modeling of the protocol security assessment. Taking into account the aforementioned research status, this paper takes the Wireless HART protocol as the research object and adopts the model detection method combining eCK model theory and colored Petri net theory to evaluate and improve the security of the protocol. First, the colored Petri net theory and CPN Tools modeling tool were introduced to verify the consistency of the original model of the protocol. And the eCK model was used to evaluate the security of the original protocol model. It was found that the protocol has two types of man-in-the-middle attack vulnerabilities: tampering and deception. Aiming at the attack loopholes of the protocol, an improvement plan was proposed. After improving the original protocol, CPN Tools modeling tool was used for security verification. It was found that the new scheme improvement can effectively prevent the existing attacks and reasonably improve the security of the protocol.
- Published
- 2021
- Full Text
- View/download PDF
31. A Simulating Model of NGN Based on CPN Tools
- Author
-
Lu, Yiqin, Fang, Fang, Quan, Runqing, and Zhou, Qihai, editor
- Published
- 2011
- Full Text
- View/download PDF
32. Server consolidation for heterogeneous computer clusters using Colored Petri Nets and CPN Tools
- Author
-
Issam Al-Azzoni
- Subjects
Colored Petri Nets ,Heterogeneous clusters ,Server consolidation ,Discrete optimization ,CPN Tools ,State space search ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
In this paper, we present a new approach to server consolidation in heterogeneous computer clusters using Colored Petri Nets (CPNs). Server consolidation aims to reduce energy costs and improve resource utilization by reducing the number of servers necessary to run the existing virtual machines in the cluster. It exploits the emerging technology of live migration which allows migrating virtual machines between servers without stopping their provided services. Server consolidation approaches attempt to find migration plans that aim to minimize the necessary size of the cluster. Our approach finds plans which not only minimize the overall number of used servers, but also minimize the total data migration overhead. The latter objective is not taken into consideration by other approaches and heuristics. We explore the use of CPN Tools in analyzing the state spaces of the CPNs. Since the state space of the CPN model can grow exponentially with the size of the cluster, we examine different techniques to generate and analyze the state space in order to find good plans to server consolidation within acceptable time and computing power.
- Published
- 2015
- Full Text
- View/download PDF
33. CPN Tools’ Application in Verification of Parallel Programs
- Author
-
Zhu, Lulu, Tong, Weiqin, Cheng, Bin, Zhu, Rongbo, editor, Zhang, Yanchun, editor, Liu, Baoxiang, editor, and Liu, Chunfeng, editor
- Published
- 2010
- Full Text
- View/download PDF
34. Model-Driven Design-Space Exploration for Embedded Systems: The Octopus Toolset
- Author
-
Basten, Twan, van Benthum, Emiel, Geilen, Marc, Hendriks, Martijn, Houben, Fred, Igna, Georgeta, Reckers, Frans, de Smet, Sebastian, Somers, Lou, Teeselink, Egbert, Trčka, Nikola, Vaandrager, Frits, Verriet, Jacques, Voorhoeve, Marc, Yang, Yang, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, and Margaria, Tiziana, editor
- Published
- 2010
- Full Text
- View/download PDF
35. CPN Tools-based Software Solution for Reliability Analysis of Processes in Microservice Environments.
- Author
-
Artamonov, Ivan V. and Sukhodolov, Alexander P.
- Subjects
SOFTWARE reliability - Abstract
Microservices are a popular contemporary method to build scalable distributed systems (e.g. websites). It is hard to predict executable operations reliability of the future system due to the vast number of components and their nonlinear relations. In this paper we consider the operation executed by multiple microservices as a single atomic transaction. The transaction matters only if it is completed successfully. In case of an error during an execution, or due to the necessity to discard the results, the transaction must be reversed or compensated. To analyze the reliability of the execution of such an operation we introduce a dedicated software solution based on Coloured Petri-Net, CPN, Tools. Accordingly, the interactive microservices system has to be described using Coloured Petri-net terms, and the operation must comply with certain rules of business process modelling, e.g. to have an input/output point. The software solution consists of several interconnecting units which include the CPN Tools, ACCESS/CPN and PostgreSQL. These programs are controlled by an application server through the web-interface. The software solution allows the analysis to be performed simultaneously by multiple examiners due to the implication of web technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
36. Modeling and Analysis of Network Control System Based on Hierarchical Coloured Petri Net and Markov Chain
- Author
-
Jingdong Li, Liankun Sun, Zhangang Wang, and Wanru Wang
- Subjects
0209 industrial biotechnology ,Article Subject ,Markov chain ,Network packet ,Computer science ,Programmable logic controller ,Coloured Petri net ,02 engineering and technology ,Set (abstract data type) ,020901 industrial engineering & automation ,CPN Tools ,Modeling and Simulation ,Control system ,QA1-939 ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Algorithm ,Equivalence (measure theory) ,Mathematics - Abstract
This paper investigates a modified modeling of networked control systems (NCSs) with programmable logic controller (PLC). First, the controller-to-actuator and sensor-to-controller network-induced delays are investigated by a modeling tactics based on hierarchical coloured petri net (HCPN) in a structure-conserving way. Comparing with the recent result, the signal transmission delay is set in a random interval instead of a fixed mode; moreover, the data packet drop out and disorder are also taken into consideration. Second, delays captured form CPN tools are analyzed with a strategy based on Baum–Welch algorithm and statistics science. Besides, time delays are modeled as a Markov chain and the transition probabilities is calculated using the consequent from the previous operation. Finally, a comparison verification illustrates the equivalence property between proposed models.
- Published
- 2021
- Full Text
- View/download PDF
37. Distributed Management Systems for Infocommunication Networks: A Model Based on TM Forum Frameworx
- Author
-
Valery Mochalov, Natalia Bratchenko, Gennady Linets, and Sergey Yakovlev
- Subjects
Open digital architecture ,OSS/BSS ,Frameworx ,business process framework ,distributed management system ,program component ,CPN Tools ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The existing management systems for networks and communication services do not fully meet the demands of users in next-generation infocommunication services that are dictated by the business processes of companies. Open digital architecture (ODA) is able to dramatically simplify and automate main business processes using the logic of distributed computing and management, which allows implementing services on a set of network nodes. The performance of a distributed operational management system depends on the quality of solving several tasks as follows: the distribution of program components among processor modules; the prioritization of business processes with parallel execution; the elimination of dead states and interlocks during execution; and the reduction of system cost to integrate separate components of business processes. The program components can be distributed among processor modules by an iterative algorithm that calculates the frequency of resource conflicts; this algorithm yields a rational distribution in a finite number of iterations. The interlocks of parallel business processes can be eliminated using the classic file sharing example with two processes and also the methodology of colored Petri nets. The system cost of integration processes in a distributed management system is reduced through partitioning the network into segments with several controllers that interact with each other and manage the network in a coordinated way. This paper develops a model of a distributed operational management system for next-generation infocommunication networks that assesses the efficiency of operational activities for a communication company.
- Published
- 2019
- Full Text
- View/download PDF
38. 基于 CPN 状态空间分析的 复杂系统脆性度量.
- Author
-
冯丽萍, 彭其渊, and 文 超
- Abstract
To further resolve the problems that were brought by the existing research tools of complex system brittleness theory, such as system state describe difficulties or too critical constraint conditions about system boundary, this paper introduced colored Petri nets into the research on complex system brittleness measurement. The colored Petri nets,its simulation tool CPN Tools and the existing advanced state space tools were helpful to reduce the system complexity in modeling and quantification. This paper brought forward complex system brittleness measurement index,and gave the programming workflow. Lastly a numerical example illustrates that the node brittleness propagation process and its influence range in state space can reflect the system brittleness. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
39. Разработка нечеткой модели управления насосным агрегатом с применением раскрашенной сети Петри
- Subjects
Theoretical computer science ,CPN Tools ,Computer science ,Water flow ,Fuzzy set ,Coloured Petri net ,Fuzzy control system ,Petri net ,MATLAB ,Fuzzy logic ,computer ,computer.programming_language - Abstract
The article is devoted to fuzzy control modelling based on Petri nets (PN). The aim of the study was to develop a Petri net-based control model with fuzzy logic for information expressed in a linguistic form. The criteria of the water pump’s operation, depending on the changing water consumption, were used to determine various situations and events in the system. Linguistic variables such as “water flow rate” and “pump speed” were used to describe incomplete knowledge about the system’s behaviour. The terms of these variables correspond to their fuzzy values and are denoted with expressions characterizing one of the system’s states. The fuzzification of linguistic variables was implemented in the Fuzzy Toolbox environment of the MATLAB modelling system. A system of rules for the pump unit’s control was developed by means of describing the required behaviour of the system by the relationship between situations and events using the logic «If ... Then ...». All sorts of situations, events, and relations between them formed sets of PN positions, transitions, and arcs. An algorithm for the control of the pump unit was developed with the consideration of the system of the production rules of control and PN structural elements. Based on the developed control algorithm, the functions of the input and output transition incidents were defined and shown in tables. The tables define the matrices of the input and output transition incidents. The PN graph model was developed. The model describes the operation of one pump unit. The visualization of the model was implemented in the CPN Tools system (Coloured Petri Nets Tools). The values of the terms are taken as attributes of the colours of the coloured Petri net (CPN) and by using CPN ML (Coloured Petri Nets Tools Markup Language) are assigned to the network markers. The values of the terms were used to describe the behaviour and the desired reaction of the system. Simulation experiments referring to the system’s situations and model analysis were carried out.
- Published
- 2020
- Full Text
- View/download PDF
40. ОСНОВАННОЕ НА CPN-TOOLS ПО ДЛЯ АНАЛИЗА ПРОИЗВОДИТЕЛЬНОСТИ БИЗНЕС-ПРОЦЕССОВ
- Subjects
CPN Tools ,Computer science ,Business process ,Distributed computing ,Geography, Planning and Development ,Coloured Petri net ,Management, Monitoring, Policy and Law ,Throughput (business) - Abstract
При разработке и внедрении корпоративных информационных технологий необходимо оценивать эффективность работы проектируемых и совершенствуемых бизнес-процессов. Разрабатываемая система показателей во многом зависит от специфики бизнес-процесса, а ее качество – от опыта эксперта. Существующие технологии не позволяют объективно оценивать работоспособность будущих процессов по их схемам, будучи либо слишком примитивными, либо сложными для применения к моделям реального предприятия. Метрики производительности вообще сложно поддаются изучению формальными методами, так как кроме структуры процесса необходимо учитывать временные аспекты его работы, которые вообще могут носить стохастический характер. В статье описывается программное обеспечение для анализа производительности бизнес-процесса путем имитационного моделирования. Для отображения схемы взаимодействия предлагается использовать аппарат цветных сетей Петри со специальным расширением для анализа временных меток. Управление имитационным комплексом осуществляется серверным программным обеспечением через веб-ориентированный интерфейс. Программный комплекс позволяет проводить анализ нескольким исследователям одновременно.
- Published
- 2020
- Full Text
- View/download PDF
41. Modeling and simulation of the IEEE 802.11e wireless protocol with hidden nodes using Colored Petri Nets
- Author
-
Fernando L. Pelayo, Luis Orozco-Barbosa, María-Emilia Cambronero, Estefania Coronado, and Valentín Valero
- Subjects
IEEE 802 ,Hidden node problem ,computer.internet_protocol ,business.industry ,Computer science ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Local area network ,020206 networking & telecommunications ,02 engineering and technology ,CPN Tools ,Modeling and Simulation ,Scalability ,0202 electrical engineering, electronic engineering, information engineering ,Wireless Application Protocol ,Wireless ,020201 artificial intelligence & image processing ,business ,computer ,Software ,Computer network - Abstract
Wireless technologies are continuously evolving, including features such as the extension to mid- and long-range communications and the support of an increasing number of devices. However, longer ranges increase the probability of suffering from hidden terminal issues. In the particular case of Wireless Local Area Networks (WLANs), the use of Quality of Service (QoS) mechanisms introduced in IEEE 802.11e compromises scalability, exacerbates the hidden node problem, and creates congestion as the number of users and the variety of services in the network grow. In this context, this paper presents a configurable Colored Petri Net (CPN) model for the IEEE 802.11e protocol with the aim of analyzing the QoS support in mid- and long-range WLANs The CPN model covers the behavior of the protocol in the presence of hidden nodes to examine the performance of the RTS/CTS exchange in scenarios where the QoS differentiation may involve massive collision chains and high delays. Our CPN model sets the basis for further exploring the performance of the various mechanisms defined by the IEEE 802.11 standard. We then use this CPN model to provide a comprehensive study of the effectiveness of this protocol by using the simulation and monitoring capabilities of CPN Tools.
- Published
- 2020
- Full Text
- View/download PDF
42. Formal Analysis of Smart Contract Based on Colored Petri Nets
- Author
-
Huang Xin, Wang Duo, and Ma Xiaofeng
- Subjects
Correctness ,Smart contract ,Computer Networks and Communications ,Computer science ,business.industry ,Backtracking ,Static program analysis ,02 engineering and technology ,Petri net ,Bytecode ,CPN Tools ,Artificial Intelligence ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Software engineering ,business - Abstract
Smart contracts increasingly cause attention for its ability to widen blockchain's application scope. However, the security of contracts is vital to its wide deployment. In this article, we propose a multilevel smart contract modeling solution to analyze the security of contract. We improve the program logic rules for bytecode and apply the Hoare condition to create a Colored Petri Net (CPN) model. The model detection method provided by the CPN tools can show the full-state space and the wrong execution path, which help us analyze the security of the contract from several perspectives. The example shows that the counter-example path given by the contract model is accord with our expected results based on code analysis, proving the correctness of the solution. In addition, we design a highly automated modeling method, introducing custom call libraries and a path derivation algorithm based on backtracking, which improves the efficiency and pertinence of the dynamic simulation of CPN models.
- Published
- 2020
- Full Text
- View/download PDF
43. Cyber Attack Simulation for Operational Security Evaluation Using Coloured Petri Nets
- Author
-
Mehrdad Ashtiani and Mohammad Abdollahi Azgomi
- Subjects
cyber attacks ,attack modeling ,coloured petri nets (cpns) ,availability evaluation ,simulation ,cpn tools ,Information technology ,T58.5-58.64 ,Telecommunication ,TK5101-6720 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Today, cyber attacks to computer networks have turned into a real challenge for network administrators. A wide range of methods have been used for attack modeling and security quantification. The most important drawback of the existing methods is that they are not based on real security-related information of networks. Our aim has been to overcome this drawback by using high-level modeling techniques and real security relevant information of systems. In this paper, we use coloured Petri nets (CPNs) for attack modeling. One of the objectives of this paper is to show the power and flexibility of CPNs for high-level attack modeling. In our work, the important elements of networks involved in cyber attacks, such as hosts, attackers, intrusion detection and prevention systems, servers and firewalls are modeled as reusable CPN sub-models. In other words, with the help of hierarchy and the abstraction provided by CPNs, we have proposed a framework for modeling and evaluation of the impacts of cyber attacks on networks. Through an illustrative example, we have modeled a sample network and some attack scenarios by using the security-relevant information extracted from open source vulnerability database (OSVDB). Finally, we have evaluated some security measures of a sample network.
- Published
- 2012
44. Modelling and Simulation of Unreliable e2/e2/1/m Queueing System
- Author
-
Michal DORDA
- Subjects
modelling ,simulation ,Petri Net ,CPN Tools ,Mechanical engineering and machinery ,TJ1-1570 - Abstract
This paper is devoted to modelling and simulation of an E2/E2/1/m queueing system with a server subject to breakdowns. The paper introduces a mathematical model of the studied system and a simulation model created by using software CPN Tools, which is intended for modelling and a simulation of coloured Petri nets. At the end of the paper the outcomes which were reached by both approaches are statistically evaluated.
- Published
- 2011
- Full Text
- View/download PDF
45. Моделирование метода ранней диагностики потерь трафика реального времени в программно-конфигурируемых сетях на основе аппарата сетей Петри
- Subjects
таймауты ,real-time traffic ,контроллер ,сети Петри ,программно-конфигурируемые сети ,flow tables ,Petri nets ,switch ,timeouts ,Ethernet ,OpenFlow ,трафик реального времени ,таблицы потоков ,CPN Tools ,controller ,коммутатор ,software defined network - Abstract
В статье рассмотрена и исследована модель метода ранней диагностики потерь трафика реального времени в программно-конфигурируемых сетях (ПКС) при передаче разнородного трафика в коммутаторе OpenFlow на основе цветных временных иерархических сетей Петри и с использованием пакета моделирования CPN Tools. Разработаны и описаны подсети Петри, моделирующие основной процесс передачи трафика в ПКС. Проведено экспериментальное моделирование с различной загрузкой коммутатора и сравнение результатов разработанного метода с классическим методом передачи разнородного трафика в ПКС., Introduction. The classic computer network is Ethernet with support for Quality of Service (QoS). The further development of computer networks was the emergence of distributed networks, such as Time-Triggered Ethernet, software defined networks (SDN), cloud computing. The reason for the transition to the development of distributed networks was the limitation of the classical Ethernet computer network for further developments and variations in traffic transmission according to the IEEE 802.1 standard. In SDN the main protocol is OpenFlow, the protocol allows you to process and manage heterogeneous traffic. The main disadvantages of the OpenFlow protocol include a significant increase in the frame search time in the flow tables and a message to the controller about its removal at a late stage of diagnostics until a search occurs in all flow tables, in case of its inconsistency in fields. The aim of the research is improving the efficiency of loss diagnostics of real-time traffic in SDN. Tasks: the construction of a classification of the type of traffic at the switch input, the construction of a Petri subnet of the process of transmitting real-time traffic to the timeout controls in the SDN, the construction of a Petri subnet of the control of hard and idle timeouts, modification of the subnets of the flow table, comparison of the flow with the flow table, experimental modeling with different switch loading and comparison of the results of the developed method with the classical transfer of heterogeneous traffic to the SDN. Methods. A model of the method of early diagnosis of real-time traffic losses in the SDN based on color time hierarchical Petri nets using a free distributed package CPN Tools has been developed and described. The hard timeout and idle timeout control subnets developed recognize the loss of real-time traffic frames at an early stage, and this circumstance allows you to inform the SDN controller about the retransmission of the frame. In connection with the introduction of timeout control by separate subnets, traffic transmission through flow tables is greatly simplified, since there is no control of storage, processing of timeouts using the OpenFlow protocol. Results.An experimental study and comparison of the developed models based on the apparatus of Petri nets was carried out. Measurements of the time from entering the flow table 0 to N and how much time in clock pulses was required to determine the desired rule from the flow table were taken into account. According to the data obtained, the method of early diagnosis of real-time traffic losses in the SDN has proven its effectiveness and provides a reduction in the delay for transmitting real-time traffic with normal switch load 0.8 by 36% on average, the delay of real-time traffic is reduced due to early diagnosis of timeouts in the SDN., ВЕСТНИК ПОВОЛЖСКОГО ГОСУДАРСТВЕННОГО ТЕХНОЛОГИЧЕСКОГО УНИВЕРСИТЕТА. СЕРИЯ: РАДИОТЕХНИЧЕСКИЕ И ИНФОКОММУНИКАЦИОННЫЕ СИСТЕМЫ, Выпуск 2 (54) 2022, Pages 47-60
- Published
- 2022
- Full Text
- View/download PDF
46. PEASE: A PUF-Based Efficient Authentication and Session Establishment Protocol for Machine-to-Machine Communication in Industrial IoT
- Author
-
Maher Albettar, Xiang Gong, and Tao Feng
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,M2M ,authentication ,security protocol ,Industrial Internet of Things ,CPN Tools ,PUF ,Signal Processing ,Electrical and Electronic Engineering - Abstract
Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and servers. In order to solve the security and availability problems regarding communication between edge devices with constrained resources and servers in M2M communication, in this study we proposed an authentication and session establishment protocol based on physical unclonable functions (PUFs). The scheme does not require clock synchronization among the devices, and it circumvents the situation where the authentication phase has to use a high computational overhead fuzzy extractor due to PUF noise. The protocol contains two message interactions, which provide strong security and availability while being lightweight. The security modelling is based on CPN Tools, which verifies security attributes and attack resistance in the authentication phase. After considering the design of the fuzzy extractor and scalability, the proposed scheme significantly reduces the computational overhead by more than 93.83% in the authentication phase compared with other schemes using PUFs. Meanwhile, under the guarantee of availability, the communication overhead is maintained at a balanced and reasonable level, at least 19.67% lower than the solution using XOR, hashing, or an elliptic curve.
- Published
- 2022
- Full Text
- View/download PDF
47. Equivalence class verification of the contract net protocol-extension.
- Author
-
Gupta, Amar and Gallasch, Guy
- Subjects
- *
EQUIVALENCE classes (Set theory) , *PETRI nets , *BIDDERS , *SOFTWARE verification , *DATA analysis - Abstract
The contract net protocol is a task allocation protocol that facilitates negotiation between bidders and an auctioneer in a multi-agent system to form a contract. The contract net protocol-extension (CNP-ext) allows the bidders to interact with more than one auctioneer concurrently, and to update their bids until a bid is granted. This introduces flexibility and ensures better selection of a bid. In earlier work, we modelled the CNP-ext with coloured petri nets and showed that it terminates correctly. We also analysed the terminal states and proved that the agents have consistent beliefs at the end of negotiations. Lastly, we showed how the number of terminal states and channel bounds are related to the number of bidders. However, due to state space explosion, our results were restricted to five bidders. As all bidders are considered identical, symmetries exist in the state space. Hence, we decided to tackle this problem using equivalence classes. In this paper, after first presenting an introduction to the CNP-ext, we present a substantial revision to our CNP-ext model and an intentionally didactic description of its operation. Then, we use equivalence classes to analyse the protocol and, importantly, present a proof that our equivalence specification is consistent. Using this technique, we are able to extend the verification results to twenty-four bidders. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
48. 基于层次颜色Petri网的全感应控制交通信号灯建模与仿真.
- Author
-
???
- Abstract
Focus on the real-time scheduling problem of a single-point full-sensitive control traffic lights signal system, we construct a dynamic timed control model of traffic lights by using the hierarchical colored Petri net (HCPN). First of all. traffic flow data are classified based on the fuzzy control theory. Secondly, utilizing the collected traffic information as the control parameters, we establish a basic traffic signal outline model based on the hierarchical color Petri net theory, and then stratified model refinement and stepwise refinement are made in accordance with the key features. In addition, a counter instead of time delay is added to the system model. The switching relationship between traffic light cycle time and traffic flows is reflected in a simple and direct way. Performance indicators are evaluated and compared through this method. Finally, the system model is implemented and validated using the CPN Tools and a simple performance optimization analysis is made. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
49. ALTERNATIVA PARA REALIZAR ANÁLISIS DE RENDIMIENTO DE PROCESOS AUTOMATIZADOS EMPLEANDO TÉCNICAS DE MINERÍA DE PROCESOS Y SIMULACIÓN SOBRE REDES DE PETRI.
- Author
-
Gramatges Hermida, Amanda, Suárez Rodríguez, Mayret, Valdés Padrón, Martha, Ross Domas, Lisbet, and Reyes López, Regina
- Subjects
- *
ELECTRONIC data processing , *COMPUTER simulation , *HUMAN error , *DATA logging , *PETRI nets , *INFORMATION storage & retrieval systems , *PROCESS mining - Abstract
Nowadays Process Mining and Simulation are recognized like innovative alternatives for business process analysis and improvement. Traditional techniques of process analysis need generally long processing times and are supported on analysts expertise, with the corresponding risk of human error; however, process mining techniques are able to extract knowledge from event logs commonly available in today's information systems through less expensive methods in time and resources. Whereas traditional simulation approaches rely on hand-made models, we advocate the use of process mining techniques for creating more reliable simulation models based on real event data. The present paper shows the results obtained with process mining and simulation on Petri Nets and ARENA in the same process, in order to compare the results obtained by each of them and determine if there are significant differences between them. [ABSTRACT FROM AUTHOR]
- Published
- 2016
50. Formal Approach Based on Petri Nets for Modeling and Verification of Video Games
- Author
-
Stéphane Julia and Franciny Medeiros Barreto
- Subjects
Soundness ,WorkFlow net ,CPN tools ,Theoretical computer science ,Computer science ,General Engineering ,ComputingMilieux_PERSONALCOMPUTING ,Petri nets ,video games ,Petri net ,simulation ,68-M99 ,CPN Tools ,state graph ,State space ,soundness verification ,State (computer science) ,Topological map ,Engineering design process ,Video game - Abstract
Video games are complex systems that combine technical and artistic processes. The specification of this type of system is not a trivial task, making it necessary to use diagrams and charts to visually specify sets of requirements. Therefore, the underlying proposal of this work is to present an approach based on the formalism of Petri nets for aiding in the design process of video games. The activities of the game are represented by a specific type of Petri net called WorkFlow net. The definition of a topological map can be represented by state graphs. Using Colored Petri nets, it is possible to define formal communication mechanisms between the model of activity and the model of the map. The simulation of the timed models allows then to produce an estimated time that corresponds to the effective duration a player will need to complete a level of a game. Furthermore, a kind of Soundness property related to gameplay in a game Quest can be verified through state space analysis. For a better understanding of the approach, the video game Silent Hill II is used.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.