Using Stochastic Colored Petri nets for Designing Multi-Purpose Plants
نویسندگان
چکیده
منابع مشابه
Designing Complex Agent Interaction Protocols Using Colored Petri Nets:
This paper deals with one of the key issue in modern enterprises applications: the Agents Interaction Protocols (AiP) that are interconnecting the different parts involved in collaborative activities. The challenge here is twofold. First, we must provide a formal model that is rich enough to capture interactions characteristics. Second, we must allow designers to combine existing protocols to a...
متن کاملRESTART Simulation of Colored Stochastic Petri Nets
In this paper the combination of stochastic colored Petri nets and the RESTART method is proposed to evaluate performance measures of complex systems that depend on rare events. A prototype implementation is described, which is applied to a logistics example.
متن کاملmodeling and evaluation of web services in mobile networks using stochastic colored petri nets
with recent developments in communication technologies, it is possible to access information any time and in any place; however, mobile environments bring forward certain requirements and exclusive challenges including low connection speeds and bandwidth limitations. thus, we need to consider mobile limitations when using web services. providing services and limited resource allocation to users...
متن کاملUsing Colored Petri Nets for Conversation Modeling
Conversations are a useful means of structuring communicative interactions among agents. The value of a conversation-based approach is largely determined by the conversational model it uses. Finite State Machines, used heavily to date for this purpose, are not su cient for complex agent interactions requiring a notion of concurrency. We propose the use of Colored Petri Nets as a model underlyin...
متن کاملAccessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets
In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Engineering
سال: 2012
ISSN: 1947-3931,1947-394X
DOI: 10.4236/eng.2012.410083