Font Size: a A A

The Research Of Theory And Application Based On Cyber Net System

Posted on:2008-01-16Degree:MasterType:Thesis
Country:ChinaCandidate:S YangFull Text:PDF
GTID:2178360212995651Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Petri nets are fit for description and modeling of information management system in network circumference. Its main property includes concurrent, uncertainty, asynchronism, stepping description and analysis ability. With the advantages discussed above, Petri nets have variety of applications in description and modeling of discrete event systems. For example, Petri nets are useful to description of multi-processor computer system, computer network, traffic control system and so on. Petri nets, as a graphic tool, not only be a visualized interactive tool, such as flow chare, frame chare, net graph, but also describe dynamic activity of system by using static intuitional graph, which is what classical graph theory couldn't do. In the meantime, Petri net includes classical graph theory, because almost every conclusion of the latter can be used directly and indirectly. However, classical graph theories have trouble in describing network circumference.Petri net is a subject branch of computer theory and application, which have profound academic connotation and extensive application background. As a maths tool, we can build state equation, algebra equation about petri net and connect it with logic. On basis of different need, we can, using different convenient analysis tool, analyses static characters of system in order to understand its dynamic activity, which is the research way theory of petri nets. In addition, petri net has self-explaining ability. For example, process is an important concept in computer science. In researching property of petri nets, we can define process by using a special subclass of petri nets, occurrence nets, which is what classical graph theorycouldn't do.In this paper, the main work is operated on, a subnet of Petri net. Through Petri-net language and programming method, we develop a deep research to the theory and applications of cyber-net system, and obtain a good effect. Including the following main contributions:(1) Because cyber-net system is the non-linear relation, and it can not apply mechanically the analysis technology of other net systems. Currently, the research production about cyber net system is little; but just about the non-linear relation of cyber net system, it has the powerful description function, so it is important to study cyber net system; but in the process of modeling, judging the result correct or not is through the occurrence of model. However with the growing scale of model, it is more and more difficult to analyze the executing results. Because of these difficulties, we present the programming approach of computing successor marking, we can gain the successor marking through only inputting initial marking,incidence matrix and transition occurrence sequence. Finally we utilized the program to analyze the model of cyber-net about Fibonacii sequence, and testified the accuracy and practicability of this algorithm, meanwhile providing a new approach. For the application of cyber net system and other subclass.(2) Because of a good modeling ability about cyber net system, so it was noticeable importance to the research about cyber net system. This thesis employed the cyber net system to define addition, subtraction, multiplication, division, four basic operations and two operators cyber net model. In addition through subtly employing the abstract and thin concept of Petri net and using step by step abstract methods, we establish recursive cyber net model. By utilizing the result from procedure 1,we proved that the recursive model established was accurate and practical. This also provides a new method for utilizing Petri net to establishing recursive model, meanwhile step by step analyzing method was also a new approach to develop formal software by using Petri net.
Keywords/Search Tags:Petri nets, Cyber net system, Program design, Recursion, Simulation
PDF Full Text Request
Related items