Definitions of Petri Net. Part II

نویسنده

  • Waldemar Korczyński
چکیده

The articles [3], [1], [4], and [2] provide the notation and terminology for this paper. In this paper x, y, X , Y are sets. We introduce G-net structures which are extensions of 1-sorted structure and are systems 〈 a carrier, an entrance, an escape 〉, where the carrier is a set and the entrance and the escape are binary relations. Let N be a 1-sorted structure. The functor echaos(N) yields a set and is defined by: (Def. 1) echaos(N) = (the carrier of N)∪{the carrier of N}. Let I1 be a G-net structure. We say that I1 is GG if and only if the conditions (Def. 2) are satisfied. (Def. 2)(i) The entrance of I1 ⊆ [: the carrier of I1, the carrier of I1 :], (ii) the escape of I1 ⊆ [: the carrier of I1, the carrier of I1 :], (iii) (the entrance of I1) · (the entrance of I1) = the entrance of I1, (iv) (the entrance of I1) · (the escape of I1) = the entrance of I1, (v) (the escape of I1) · (the escape of I1) = the escape of I1, and (vi) (the escape of I1) · (the entrance of I1) = the escape of I1. Let us observe that there exists a G-net structure which is GG. A G-net is a GG G-net structure. Let I1 be a G-net structure. We say that I1 is EE if and only if the conditions (Def. 3) are satisfied. (Def. 3)(i) (The entrance of I1) · ((the entrance of I1)\ idthe carrier of I1) = / 0, and (ii) (the escape of I1) · ((the escape of I1)\ idthe carrier of I1) = / 0.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mapping CRC Card into Stochastic Petri Net for Analyzing and Evaluating Quality Parameter of Security (TECHNICAL NOTE)

CRC cards are unconventional method for identifying and describing classes, behavior and its responsibilities and collaborators of class. Representation of three categories of class, responsibilities and collaborators can give proper image of scenario. These cards are effective method for analyzing scenarios. With all positive features of CRC cards, of weaknesses of these cards are failure to s...

متن کامل

Modeling of Continuous Systems Using Modified Petri Nets

Due to the changes which may occur in their parameters, systems are usually demonstrated by some subsystems for different conditions. This paper employs Modified Petri Nets (MPN) to model theses subsystems and makes it simple to analyze them. In this method, first, the continuous transfer function is converted to a discrete transfer function and then, by MPN, system is modeled and analyzed. All...

متن کامل

Towards Petri Net WWW Community: Starting Points

This paper presents basic guidelines for building Petri net ontology, which should enable using Petri nets on the Semantic Web and help establish a true Web community of Petri net users and applications. Available Petri net model descriptions give format definitions. Their main objective is to provide the syntax for sharing Petri net models between different applications. Some of these applicat...

متن کامل

A Petri-net based modeling tool, for analysis and evaluation of computer systems

Petri net is one of the most popular methods in modeling and evaluation of concurrent and event-based systems. Different tools have been created to support modeling and simulation of different extensions of Petri net in different applications. Each tool supports some extensions and some features. In this work a Petri net based modeling and evaluation tool is presented that not only supports dif...

متن کامل

Formal approach on modeling and predicting of software system security: Stochastic petri net

To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...

متن کامل

Definitions of Petri Net . Part I Waldemar

In the sequel M is a Petri net. Let us consider X , Y . Let us assume that X misses Y . The functor PTempty f (X ,Y ) yielding a strict Petri net is defined by: (Def. 4)2 PTempty f (X ,Y ) = 〈X ,Y, / 0〉. Let us consider X . The functor Tempty f (X) yields a strict Petri net and is defined by: (Def. 5) Tempty f (X) = PTempty f (X , / 0). The functor Pempty f (X) yields a strict Petri net and is ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004