SlideShare a Scribd company logo
1 of 8
Download to read offline
Natarajan Meghanathan, et al. (Eds): ITCS, SIP, JSE-2012, CS & IT 04, pp. 71–78, 2012.
© CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2107
A NOVEL METHOD FOR PETRI NET
MODELING
Chen-xi SHAO 1,3
, Er-hui ZHOU 1,2
, Zhen-zhong SHAO4
, Wei-hua
WANG5
, Xue-feng WU 1
1
Department of Computer Science and Techmology , University of Science and
Technology of China, Hefei, 230026,China
cxshao@ustc.edu.cn , xfwu@ustc.edu.cn
2
Information Center of Hospital 152 of PLA, Pingdingshan 467000, China
ehzhou@mail.ustc.edu.cn
3
Anhui Province Key Laboratory of Software in Computing and Communication,
Hefei 230027, China
4
Jianghuai Automobile Co., Ltd. Hefei, 230022, China
v5vv5v@163.com
5
Liwei Automobile Oil-pump Co., Ltd. Anhui, Hefei 230041, China
2285684217@qq.com
ABSTRACT
Message Sequence Chart (MSC) is a graphical trace language for describing the communication
behaviour of distributed systems. In order to build a Petri Net model of a complex system, this
paper introduces a strategy to build a Petri Net model by using MSC. The algorithm of
translating the MSC model to Petri Net model is also given in this paper. We can get the Petri
Net model and improve it by translating the model of MSC. By analyzing the Petri Net model, it
is proved to be safe and reliable.
KEYWORDS
modeling/simulation; Message Sequence Charts(MSC); Petri Net
1. INTRODUCTION
Petri nets is a graphic representation of the combination model, has the merits of intuitive,
simple and easy, for describing and analyzing of concurrent phenomena have unique advantage.
Of the existing modeling methods, the Petri Net modeling has got well developed and widely
applied. It not only has the strict mathematical basis, but also has a lot of analytical and
simulation tools. However, the traditional method for building a Petri Net model requires highly
for the modeling staff: They must be good at mathematics and familiar to the structure and
function of the complex system.
In order to simplify the Petri Net modeling of a complex system, this paper present a new
modeling method, which uses Message Sequence Charts(MSC) to model the research objects at
first, then translate the MSC model to Petri Net model with the corresponding algorithm. This
method can take full advantage of MSC which is simple, intuitionistic and easy to modify, and
72 Computer Science & Information Technology (CS & IT)
can be used to build the Petri Net model for analysis and modeling. By analyzing the Petri Net
model, it is proved to be safe and reliable.
2. MESSAGE SEQUENCE CHARTS[1,2]
MSC is a good graphical language for describing the communication behaviour of distributed
systems, which is simple, intuitionistic, easy to modify, and can also give a complete description
of mathematical semantics[1,2,3]
. The Z.120[1]
enacted by the International Telecommunication
Union has given the standardized definition of Message Sequence Charts. MSC is widely applied
in many fields due to its advantages of convenience and intuitive graphic description[4,5]
. But it
also has some disadvantages: The graphical semantic model and mathematical semantic model
are both not easy to analyze and simulate[6]
.
2.1. Graphical semantic description of MSC
MSC is composed of objects, including the own event of an object, the message transmission
among objects.
k
l
i
msc A
j
Figure 1 Two messages MSC
As shown in figure 1, the MSC A of two pieces of message is composed of object i, object j, and
message k, message l. The top and bottom of object i and j are expressed with white rectangle and
black rectangle respectively, connecting with straight line which stands for the time. The MSC of
two pieces of message shown in figure 1 describe the sequence of the two communication events
between object i and object j: Firstly, object i sends a message k to object j; secondly, object j
receives the message k; then object j sends another message l to object i; at last, object i receives
the message l.
2.2. The process algebraic specification of MSC
Every MSC can be given a strict description with the process algebraic language, including the
algebraic expression of event and the operator. The algebraic expression of event: For example,
out(i,j,k) stands for the event that object i sends the message k to object j; in(j,i,k) stands for the
event that object j receives the message k from object i; ε stands for the state of a object (it doesn't
express any action); action(i,a) stands for that object i takes the action a, and so on. The operator:
For example, “·” defines strict order, that is the event on the left of this operator takes place
precede the event on the right; “+” stands for that to choose a event on either side of this
operator to take; “‖” stands for parallel relation, that is the event on either side of this operator
can occur first, and so on.
The priority of the operators above defines as follow: “·” is prior to “‖”, and “‖” Is prior to “+
”.
The event sequence of the MSC shown in chart 1 can be expressed with the process algebraic
language that:
Computer Science & Information Technology (CS & IT) 73
(out(i,j,k)‖in(i,j,k)) ·(out(j,i,l)‖in(j,i,l)) (1)
“+” can be replaced with “‖”. So expression (1) can be replaced with
(out(i,j,k)·in(i,j,k)+in(i,j,k)·out(i,j,k))· (out(j,i,l)·in(j,i,l)+ in(j,i,l)·out(j,i,l)) (2)
Because the message is received only after it is sent out, the expression in(i,j,k)·out(i,j,k) and
in(j,i,l)·out(j,i,l) should be deleted. So the expression (2) can be simlified to the expression (3)
out(i,j,k)·in(i,j,k) ·out(j,i,l)·in(j,i,l) (3)
2.3. The description function of MSC
The powerful description function of MSC can meet the requirements of general situational
modeling. MSC can describe the transmission and receipt of message (shown in char 1). It can
also describe the state, action, calculagraph, and meet the function of fuzzy sequence and
subsequence charts. Details can be found in paper [2].
In the subsequence function of MSC, every object in the sequence can be abstract object, which is
able to extend to a subsequence chart. In this way, we can build a hierarchical model of a system.
3. THE TRANSLATION TO PETRI NET
3.1. The definition of Petri Net
Petri Net[7,8]
is a graphical and mathematical modeling tool which can be applied to many
systems. It is also a powerful tool to describe and study a complex system characterized by
parallel, asynchronism, distributed and random. The definition is as follow:
Petri Net is defined as a three-tuples, PN = ( P, T, F), in which P stands for a set of places which
is limited and nonempty, P={p1,p2,…,pm};
T stands for a set of transitions, which is limited and nonempty, T={t1,t2,…,tn};
F stands for a set of connections, F=P×T∪T×P. P and T also meet the requirement that P∩T=
Ф, and P∪T≠Ф.
In the actual chart, the "place" is expressed with “○”, the "transition" is expressed with“▃”, the
“connection” is represented by the straight line with arrows, the place and transition are
connected with connections.
3.2 The translation algorithm
The algorithm of translating the MSC model to Petri Net model is as follows:
Step 1: Divide every object of MSC into three parts, the top, the bottom and the event( sending
or receiving the message, state, action and so on);
Step 2: Replace the white rectangle and black rectangle which stand for the top and bottom of a
object respectively with “○”which stands for the place;
74 Computer Science & Information Technology (CS & IT)
Step 3: Replace the event( sending or receiving the message, action and so on) with “▃”which
stands for the transition;
Step 4: Delete the “state” In the MSC;
Step 5: If in the MSC there are events of fuzzy order, then determine flexibly the order of
divided events according to demand;
Step 6: If there are two neighboring transitions on the time line or on the line of message
transmission, add a place in the middle of the two transitions;
Step 7: Connect the transition and the place with the connection along the time line and the
message transmission line. The direction of the connection must be the same to the direction of
the time line and the message transmission line;
Step 8: Translation ends.
3.3 The illustration of translation algorithm
According to the translation algorithm, the translation from the MSC of two objects to Petri Net is
shown in figure 2:
k
i j
ii
j
j
j
kk
kkk
(a) MSC model
(b) Segmentation
(c) Replace and supplement(d) Connecting arc joint
i
Figure 2 Messaging between two objects into the MSC corresponding Petri net
4. APPLICATION INSTANCE
4.1 The description of instance
Here, we build a model for the procedure from developing new products to coming into the
market of an automotive vehicles manufacturer with virtual manufacturing technique.
Details are as follows: When the market is active, the Market_Dept grasps the opportunity to put
forward the suggestion of developing new products; Virtual Manufacturing Environment provides
the virtual prototype to be evaluated by the Market_Dept; then the Market_Dept feedbacks the
evaluation and correction to the Virtual Manufacturing Environment; after the virtual prototype is
improved, the Virtual Manufacturing Environment provides the information of the final improved
Computer Science & Information Technology (CS & IT) 75
products for the Real Manufacturing Environment, which produces the new products in the
hundreds. At last, the Market_Dept gets ready for putting the new products on the market.
4.2 The model of MSC
4.2.1 The description of MSC model
In the model of MSC, the procedure from developing new products to coming into the market is
abstracted to be six objects: Market_Environment, Market_Department, Virtual Manufacturing_
Environment, Real Manufacturing_Environment, Purchase_Department and Error_Manage,
which are shown in figure 3.
4.2.2 Conflict Resolution Mechanism
In a more complex system, conflicts are inevitable. Similarly, there will be many conflicts of
technique, personnel, resources and so on in the production and business of a manufacturer[9]
.
activit ready
Market Env
_
Market Dept
_
Error Manage
_
RM Env
_
VM Env
_
Purchase Dept
_
business
opportunities
study
ready ready
New
product plan
ready
VM
Virtual
prototyping
evaluate
result
improve
design
produce
notify
Resource
validation
validation
finish
prepare
Products
products
Figure 3 MSC model of manufacturing enterprises
MSC Manufacturing Enterprise
finish
finish
error (lack of resources)
ready
In order to resolve the conflict, in the MSC model of the manufacturer above, we add the
Error_Manage. In the actual business operation of a manufacturer, Error_Manage is a flexible
department composed of relevant experts and headers of the important department to take real-
time communication and coordination, which also integrates the system of experts in charge of
conflict resolution with the set of rules, the set of limits and so on to be in charge of resolving and
coordinating kinds of conflicts.
76 Computer Science & Information Technology (CS & IT)
4.2.3 The instance of Conflict Resolution
In RM_Env of the model, when it is lack of resources, the Conflict Resolution Mechanism starts:
Firstly, it reports to Error_Manage; then Error_Manage reports to Purchase_Dept; after
Purchase_Dept supplies resources to RM_Env, it reports confirmation to Error_Manage;
meanwhile, after gets the supplement, RM_Env reports the receipt to Error_Manage. Such
Conflict Resolution Mechanism makes sure the normal management of a manufacturer.
4.3 The model of Petri Net
With the translation algorithm shown in 3.2, the MSC of a manufacturer shown in chart 3 can be
translated to the corresponding Petri Net, shown in figure 4.
4.4 The analysis of Petri Net
Analyze the initialized Petri Net with the existing analytical technique of Petri Net. With respect
to safety, it is easy to find that there is no dead lock in the model of Petri Net translated from
MSC with the translation algorithm. That is because the message of MSC must be sent out before
received. It is won't occur that to receive a piece of message which is can't be sent out, which
breaks the necessary condition of the dead lock. So there can't be dead-lock. With respect to
Computer Science & Information Technology (CS & IT) 77
liveness, the nodes from the beginning to the end are all reachable (the route of message
transmission is attainable). Therefore, the Petri Net is safe and feasible.
5. CONCLUSION
In the Petri Net modeling of a complex system, it has many advantages to get the Petri Net model
from MSC model:
(1) Because of the powerful function of the description of MSC, it is easy to build a simple,
intuitionistic MSC model of a complex system;
(2) The subsequence charts function of MSC support the theory of hierarchical modeling and
module abstract and composite[10]
;
(3) The translation algorithm provides a powerful tool to translate the MSC model to Petri Net
model;
(4) MSC model can help to understand Petri Net model of a complex system, enhance the
readability of Petri Net model, and avoid the dead lock effectively;
(5) It can modify Petri Net model by modifying the responding MSC model, which makes
building and modifying Petri Net model based on the simple and intuitionistic MSC model.
After Petri Net model is built, how to evaluate a complex system with the responding Petri Net
model is the next target of author's group.
ACKNOWLEDGEMENTS
This work is supported by the Natural Science Foundation of China (NSFC) under Grant No.
60434010 and No. 61174144. And thanks professor Fang-zhou BAI for his valuable suggestions.
REFERENCES
[1] Geneva:ITU-T, (1996). ITU-T Recommendation Z.120: Message Sequence Chart (MSC) .
[2] S.Mauw, (1996). The formalization of Message Sequence Charts. Computer Networks and ISDN
Systems. No.28,pp1643-1657.
[3] Rudolph, E., J. Grabowski and P. Graubmann,( 1996). Tutorial on Message Sequence Charts.
Computer Networks and ISDN Systems. No.28,pp629-1641.
[4] Kumar, Sandeep; Khoo, Siau-Cheng; Roychoudhury, Abhik; Lo, David,(2011). Mining message
sequence graphs. 33rd International Conference on Software Engineering, ICSE 2011, May 21, 2011
- May 28, 2011, p 91-100.
[5] Dan, Haitao; Hierons, Robert M.(2011), Conformance testing from message sequence charts.
Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation,
ICST 2011, p 279-288.
[6] Olaf Kluge, ( 2003). Modelling a Railway Crossing with Message Sequence Charts and Petri Nets.
Lecture Notes in Computer Science. Springer Verlag. No.2472,pp197-218.
78 Computer Science & Information Technology (CS & IT)
[7] T.Murata,( 1989). Petri Nets: Properties, Analysis and pplications. Proceedings of the IEEE.
No.77,pp541-580.
[8] Chongyi Yuan,( 1998). Principle of Petri Net. Beijing:Electronics Industrial Press.
[9] Song Huang,Yujin Hu,Chenggang Li,( 2004). A TCPN based approach to model the coordination in
virtual manufacturing organizations. Computers & Industrial Engineering. No.47,pp61-76.
[10] Zhibin Jiang,( 2004). Petri Net and its application in the manufacturing system modeling and control.
Beijing: Machinery Industrial Press.
Authors
Chen-xi SHAO, male, 1954, M.Eng. , associate professor, research interests are
simulation of complex system and qualitative simulation;
Zhen-zhong SHAO, male,1983, B. Eng., engineer, research intersts are CIM,
CAD/CAM and VR.
Wei-hua WANG, female, 1960, B. In.& Co., research interests are MRP-II,ERP
andSCM.

More Related Content

What's hot

FAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLAB
FAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLABFAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLAB
FAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLABJournal For Research
 
Finite_Element_Analysis_with_MATLAB_GUI
Finite_Element_Analysis_with_MATLAB_GUIFinite_Element_Analysis_with_MATLAB_GUI
Finite_Element_Analysis_with_MATLAB_GUIColby White
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET Journal
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Journals
 
Image compression using genetic programming
Image compression using genetic programmingImage compression using genetic programming
Image compression using genetic programmingAhmed Ebid
 
An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...IJDKP
 
Application Of Local Search Methods For Solving A Quadratic Assignment Probl...
Application Of Local Search Methods For Solving  A Quadratic Assignment Probl...Application Of Local Search Methods For Solving  A Quadratic Assignment Probl...
Application Of Local Search Methods For Solving A Quadratic Assignment Probl...ertekg
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Publishing House
 
Generalized eigenvalue minimization for uncertain first order plus time-delay...
Generalized eigenvalue minimization for uncertain first order plus time-delay...Generalized eigenvalue minimization for uncertain first order plus time-delay...
Generalized eigenvalue minimization for uncertain first order plus time-delay...ISA Interchange
 
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmChaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmCSCJournals
 
IRJET- Optimization of Semantic Image Retargeting by using Guided Fusion Network
IRJET- Optimization of Semantic Image Retargeting by using Guided Fusion NetworkIRJET- Optimization of Semantic Image Retargeting by using Guided Fusion Network
IRJET- Optimization of Semantic Image Retargeting by using Guided Fusion NetworkIRJET Journal
 
An efficient hardware logarithm generator with modified quasi-symmetrical app...
An efficient hardware logarithm generator with modified quasi-symmetrical app...An efficient hardware logarithm generator with modified quasi-symmetrical app...
An efficient hardware logarithm generator with modified quasi-symmetrical app...IJECEIAES
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationiaemedu
 
Embedding bus and ring into hex cell
Embedding bus and ring into hex cellEmbedding bus and ring into hex cell
Embedding bus and ring into hex cellIJCNCJournal
 
Image Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K MeansImage Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K MeansEditor IJCATR
 

What's hot (20)

FAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLAB
FAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLABFAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLAB
FAST AND EFFICIENT IMAGE COMPRESSION BASED ON PARALLEL COMPUTING USING MATLAB
 
Finite_Element_Analysis_with_MATLAB_GUI
Finite_Element_Analysis_with_MATLAB_GUIFinite_Element_Analysis_with_MATLAB_GUI
Finite_Element_Analysis_with_MATLAB_GUI
 
IRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary LogicIRJET- Optimization of 1-Bit ALU using Ternary Logic
IRJET- Optimization of 1-Bit ALU using Ternary Logic
 
44 paper
44 paper44 paper
44 paper
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Image compression using genetic programming
Image compression using genetic programmingImage compression using genetic programming
Image compression using genetic programming
 
An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...An experimental evaluation of similarity-based and embedding-based link predi...
An experimental evaluation of similarity-based and embedding-based link predi...
 
Application Of Local Search Methods For Solving A Quadratic Assignment Probl...
Application Of Local Search Methods For Solving  A Quadratic Assignment Probl...Application Of Local Search Methods For Solving  A Quadratic Assignment Probl...
Application Of Local Search Methods For Solving A Quadratic Assignment Probl...
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...Verifiable secure computation of linear fractional programming using certific...
Verifiable secure computation of linear fractional programming using certific...
 
Generalized eigenvalue minimization for uncertain first order plus time-delay...
Generalized eigenvalue minimization for uncertain first order plus time-delay...Generalized eigenvalue minimization for uncertain first order plus time-delay...
Generalized eigenvalue minimization for uncertain first order plus time-delay...
 
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest AlgorithmChaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
 
Capstone paper
Capstone paperCapstone paper
Capstone paper
 
IRJET- Optimization of Semantic Image Retargeting by using Guided Fusion Network
IRJET- Optimization of Semantic Image Retargeting by using Guided Fusion NetworkIRJET- Optimization of Semantic Image Retargeting by using Guided Fusion Network
IRJET- Optimization of Semantic Image Retargeting by using Guided Fusion Network
 
An efficient hardware logarithm generator with modified quasi-symmetrical app...
An efficient hardware logarithm generator with modified quasi-symmetrical app...An efficient hardware logarithm generator with modified quasi-symmetrical app...
An efficient hardware logarithm generator with modified quasi-symmetrical app...
 
Spectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolationSpectral approach to image projection with cubic b spline interpolation
Spectral approach to image projection with cubic b spline interpolation
 
Ca36464468
Ca36464468Ca36464468
Ca36464468
 
Y34147151
Y34147151Y34147151
Y34147151
 
Embedding bus and ring into hex cell
Embedding bus and ring into hex cellEmbedding bus and ring into hex cell
Embedding bus and ring into hex cell
 
Image Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K MeansImage Segmentation Using Two Weighted Variable Fuzzy K Means
Image Segmentation Using Two Weighted Variable Fuzzy K Means
 

Similar to A NOVEL METHOD FOR PETRI NET MODELING

New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...ijtsrd
 
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring ProblemsA Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring ProblemsSandra Long
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Qubit data structures for
Qubit data structures forQubit data structures for
Qubit data structures forcsandit
 
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATIONLATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATIONcscpconf
 
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATIONLATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATIONcsandit
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...IJERA Editor
 
Comparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical ImagesComparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical ImagesIRJET Journal
 
Novel Logic Circuits Dynamic Parameters Analysis
Novel Logic Circuits Dynamic Parameters AnalysisNovel Logic Circuits Dynamic Parameters Analysis
Novel Logic Circuits Dynamic Parameters Analysiscsandit
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm foreSAT Publishing House
 
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...IRJET Journal
 
IRJET - Application of Linear Algebra in Machine Learning
IRJET -  	  Application of Linear Algebra in Machine LearningIRJET -  	  Application of Linear Algebra in Machine Learning
IRJET - Application of Linear Algebra in Machine LearningIRJET Journal
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...ijtsrd
 
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHMNEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHMijcsit
 
Advanced SOM & K Mean Method for Load Curve Clustering
Advanced SOM & K Mean Method for Load Curve Clustering Advanced SOM & K Mean Method for Load Curve Clustering
Advanced SOM & K Mean Method for Load Curve Clustering IJECEIAES
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersIJNSA Journal
 
NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...
NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...
NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...Eugene Nho
 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeCSCJournals
 

Similar to A NOVEL METHOD FOR PETRI NET MODELING (20)

New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring ProblemsA Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Qubit data structures for
Qubit data structures forQubit data structures for
Qubit data structures for
 
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATIONLATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
 
lecture 1.pptx
lecture 1.pptxlecture 1.pptx
lecture 1.pptx
 
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATIONLATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
LATTICE-CELL : HYBRID APPROACH FOR TEXT CATEGORIZATION
 
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
Performance Study of BCH Error Correcting Codes Using the Bit Error Rate Term...
 
Comparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical ImagesComparison of Different Methods for Fusion of Multimodal Medical Images
Comparison of Different Methods for Fusion of Multimodal Medical Images
 
Novel Logic Circuits Dynamic Parameters Analysis
Novel Logic Circuits Dynamic Parameters AnalysisNovel Logic Circuits Dynamic Parameters Analysis
Novel Logic Circuits Dynamic Parameters Analysis
 
Bivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm forBivariatealgebraic integerencoded arai algorithm for
Bivariatealgebraic integerencoded arai algorithm for
 
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
IRJET- Two-Class Priority Queueing System with Restricted Number of Priority ...
 
IRJET - Application of Linear Algebra in Machine Learning
IRJET -  	  Application of Linear Algebra in Machine LearningIRJET -  	  Application of Linear Algebra in Machine Learning
IRJET - Application of Linear Algebra in Machine Learning
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...
 
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHMNEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
 
Advanced SOM & K Mean Method for Load Curve Clustering
Advanced SOM & K Mean Method for Load Curve Clustering Advanced SOM & K Mean Method for Load Curve Clustering
Advanced SOM & K Mean Method for Load Curve Clustering
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream CiphersMultiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
Multiple Dimensional Fault Tolerant Schemes for Crypto Stream Ciphers
 
NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...
NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...
NLP Project: Machine Comprehension Using Attention-Based LSTM Encoder-Decoder...
 
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying SchemeA Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
A Threshold Enhancement Technique for Chaotic On-Off Keying Scheme
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

A NOVEL METHOD FOR PETRI NET MODELING

  • 1. Natarajan Meghanathan, et al. (Eds): ITCS, SIP, JSE-2012, CS & IT 04, pp. 71–78, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2107 A NOVEL METHOD FOR PETRI NET MODELING Chen-xi SHAO 1,3 , Er-hui ZHOU 1,2 , Zhen-zhong SHAO4 , Wei-hua WANG5 , Xue-feng WU 1 1 Department of Computer Science and Techmology , University of Science and Technology of China, Hefei, 230026,China cxshao@ustc.edu.cn , xfwu@ustc.edu.cn 2 Information Center of Hospital 152 of PLA, Pingdingshan 467000, China ehzhou@mail.ustc.edu.cn 3 Anhui Province Key Laboratory of Software in Computing and Communication, Hefei 230027, China 4 Jianghuai Automobile Co., Ltd. Hefei, 230022, China v5vv5v@163.com 5 Liwei Automobile Oil-pump Co., Ltd. Anhui, Hefei 230041, China 2285684217@qq.com ABSTRACT Message Sequence Chart (MSC) is a graphical trace language for describing the communication behaviour of distributed systems. In order to build a Petri Net model of a complex system, this paper introduces a strategy to build a Petri Net model by using MSC. The algorithm of translating the MSC model to Petri Net model is also given in this paper. We can get the Petri Net model and improve it by translating the model of MSC. By analyzing the Petri Net model, it is proved to be safe and reliable. KEYWORDS modeling/simulation; Message Sequence Charts(MSC); Petri Net 1. INTRODUCTION Petri nets is a graphic representation of the combination model, has the merits of intuitive, simple and easy, for describing and analyzing of concurrent phenomena have unique advantage. Of the existing modeling methods, the Petri Net modeling has got well developed and widely applied. It not only has the strict mathematical basis, but also has a lot of analytical and simulation tools. However, the traditional method for building a Petri Net model requires highly for the modeling staff: They must be good at mathematics and familiar to the structure and function of the complex system. In order to simplify the Petri Net modeling of a complex system, this paper present a new modeling method, which uses Message Sequence Charts(MSC) to model the research objects at first, then translate the MSC model to Petri Net model with the corresponding algorithm. This method can take full advantage of MSC which is simple, intuitionistic and easy to modify, and
  • 2. 72 Computer Science & Information Technology (CS & IT) can be used to build the Petri Net model for analysis and modeling. By analyzing the Petri Net model, it is proved to be safe and reliable. 2. MESSAGE SEQUENCE CHARTS[1,2] MSC is a good graphical language for describing the communication behaviour of distributed systems, which is simple, intuitionistic, easy to modify, and can also give a complete description of mathematical semantics[1,2,3] . The Z.120[1] enacted by the International Telecommunication Union has given the standardized definition of Message Sequence Charts. MSC is widely applied in many fields due to its advantages of convenience and intuitive graphic description[4,5] . But it also has some disadvantages: The graphical semantic model and mathematical semantic model are both not easy to analyze and simulate[6] . 2.1. Graphical semantic description of MSC MSC is composed of objects, including the own event of an object, the message transmission among objects. k l i msc A j Figure 1 Two messages MSC As shown in figure 1, the MSC A of two pieces of message is composed of object i, object j, and message k, message l. The top and bottom of object i and j are expressed with white rectangle and black rectangle respectively, connecting with straight line which stands for the time. The MSC of two pieces of message shown in figure 1 describe the sequence of the two communication events between object i and object j: Firstly, object i sends a message k to object j; secondly, object j receives the message k; then object j sends another message l to object i; at last, object i receives the message l. 2.2. The process algebraic specification of MSC Every MSC can be given a strict description with the process algebraic language, including the algebraic expression of event and the operator. The algebraic expression of event: For example, out(i,j,k) stands for the event that object i sends the message k to object j; in(j,i,k) stands for the event that object j receives the message k from object i; ε stands for the state of a object (it doesn't express any action); action(i,a) stands for that object i takes the action a, and so on. The operator: For example, “·” defines strict order, that is the event on the left of this operator takes place precede the event on the right; “+” stands for that to choose a event on either side of this operator to take; “‖” stands for parallel relation, that is the event on either side of this operator can occur first, and so on. The priority of the operators above defines as follow: “·” is prior to “‖”, and “‖” Is prior to “+ ”. The event sequence of the MSC shown in chart 1 can be expressed with the process algebraic language that:
  • 3. Computer Science & Information Technology (CS & IT) 73 (out(i,j,k)‖in(i,j,k)) ·(out(j,i,l)‖in(j,i,l)) (1) “+” can be replaced with “‖”. So expression (1) can be replaced with (out(i,j,k)·in(i,j,k)+in(i,j,k)·out(i,j,k))· (out(j,i,l)·in(j,i,l)+ in(j,i,l)·out(j,i,l)) (2) Because the message is received only after it is sent out, the expression in(i,j,k)·out(i,j,k) and in(j,i,l)·out(j,i,l) should be deleted. So the expression (2) can be simlified to the expression (3) out(i,j,k)·in(i,j,k) ·out(j,i,l)·in(j,i,l) (3) 2.3. The description function of MSC The powerful description function of MSC can meet the requirements of general situational modeling. MSC can describe the transmission and receipt of message (shown in char 1). It can also describe the state, action, calculagraph, and meet the function of fuzzy sequence and subsequence charts. Details can be found in paper [2]. In the subsequence function of MSC, every object in the sequence can be abstract object, which is able to extend to a subsequence chart. In this way, we can build a hierarchical model of a system. 3. THE TRANSLATION TO PETRI NET 3.1. The definition of Petri Net Petri Net[7,8] is a graphical and mathematical modeling tool which can be applied to many systems. It is also a powerful tool to describe and study a complex system characterized by parallel, asynchronism, distributed and random. The definition is as follow: Petri Net is defined as a three-tuples, PN = ( P, T, F), in which P stands for a set of places which is limited and nonempty, P={p1,p2,…,pm}; T stands for a set of transitions, which is limited and nonempty, T={t1,t2,…,tn}; F stands for a set of connections, F=P×T∪T×P. P and T also meet the requirement that P∩T= Ф, and P∪T≠Ф. In the actual chart, the "place" is expressed with “○”, the "transition" is expressed with“▃”, the “connection” is represented by the straight line with arrows, the place and transition are connected with connections. 3.2 The translation algorithm The algorithm of translating the MSC model to Petri Net model is as follows: Step 1: Divide every object of MSC into three parts, the top, the bottom and the event( sending or receiving the message, state, action and so on); Step 2: Replace the white rectangle and black rectangle which stand for the top and bottom of a object respectively with “○”which stands for the place;
  • 4. 74 Computer Science & Information Technology (CS & IT) Step 3: Replace the event( sending or receiving the message, action and so on) with “▃”which stands for the transition; Step 4: Delete the “state” In the MSC; Step 5: If in the MSC there are events of fuzzy order, then determine flexibly the order of divided events according to demand; Step 6: If there are two neighboring transitions on the time line or on the line of message transmission, add a place in the middle of the two transitions; Step 7: Connect the transition and the place with the connection along the time line and the message transmission line. The direction of the connection must be the same to the direction of the time line and the message transmission line; Step 8: Translation ends. 3.3 The illustration of translation algorithm According to the translation algorithm, the translation from the MSC of two objects to Petri Net is shown in figure 2: k i j ii j j j kk kkk (a) MSC model (b) Segmentation (c) Replace and supplement(d) Connecting arc joint i Figure 2 Messaging between two objects into the MSC corresponding Petri net 4. APPLICATION INSTANCE 4.1 The description of instance Here, we build a model for the procedure from developing new products to coming into the market of an automotive vehicles manufacturer with virtual manufacturing technique. Details are as follows: When the market is active, the Market_Dept grasps the opportunity to put forward the suggestion of developing new products; Virtual Manufacturing Environment provides the virtual prototype to be evaluated by the Market_Dept; then the Market_Dept feedbacks the evaluation and correction to the Virtual Manufacturing Environment; after the virtual prototype is improved, the Virtual Manufacturing Environment provides the information of the final improved
  • 5. Computer Science & Information Technology (CS & IT) 75 products for the Real Manufacturing Environment, which produces the new products in the hundreds. At last, the Market_Dept gets ready for putting the new products on the market. 4.2 The model of MSC 4.2.1 The description of MSC model In the model of MSC, the procedure from developing new products to coming into the market is abstracted to be six objects: Market_Environment, Market_Department, Virtual Manufacturing_ Environment, Real Manufacturing_Environment, Purchase_Department and Error_Manage, which are shown in figure 3. 4.2.2 Conflict Resolution Mechanism In a more complex system, conflicts are inevitable. Similarly, there will be many conflicts of technique, personnel, resources and so on in the production and business of a manufacturer[9] . activit ready Market Env _ Market Dept _ Error Manage _ RM Env _ VM Env _ Purchase Dept _ business opportunities study ready ready New product plan ready VM Virtual prototyping evaluate result improve design produce notify Resource validation validation finish prepare Products products Figure 3 MSC model of manufacturing enterprises MSC Manufacturing Enterprise finish finish error (lack of resources) ready In order to resolve the conflict, in the MSC model of the manufacturer above, we add the Error_Manage. In the actual business operation of a manufacturer, Error_Manage is a flexible department composed of relevant experts and headers of the important department to take real- time communication and coordination, which also integrates the system of experts in charge of conflict resolution with the set of rules, the set of limits and so on to be in charge of resolving and coordinating kinds of conflicts.
  • 6. 76 Computer Science & Information Technology (CS & IT) 4.2.3 The instance of Conflict Resolution In RM_Env of the model, when it is lack of resources, the Conflict Resolution Mechanism starts: Firstly, it reports to Error_Manage; then Error_Manage reports to Purchase_Dept; after Purchase_Dept supplies resources to RM_Env, it reports confirmation to Error_Manage; meanwhile, after gets the supplement, RM_Env reports the receipt to Error_Manage. Such Conflict Resolution Mechanism makes sure the normal management of a manufacturer. 4.3 The model of Petri Net With the translation algorithm shown in 3.2, the MSC of a manufacturer shown in chart 3 can be translated to the corresponding Petri Net, shown in figure 4. 4.4 The analysis of Petri Net Analyze the initialized Petri Net with the existing analytical technique of Petri Net. With respect to safety, it is easy to find that there is no dead lock in the model of Petri Net translated from MSC with the translation algorithm. That is because the message of MSC must be sent out before received. It is won't occur that to receive a piece of message which is can't be sent out, which breaks the necessary condition of the dead lock. So there can't be dead-lock. With respect to
  • 7. Computer Science & Information Technology (CS & IT) 77 liveness, the nodes from the beginning to the end are all reachable (the route of message transmission is attainable). Therefore, the Petri Net is safe and feasible. 5. CONCLUSION In the Petri Net modeling of a complex system, it has many advantages to get the Petri Net model from MSC model: (1) Because of the powerful function of the description of MSC, it is easy to build a simple, intuitionistic MSC model of a complex system; (2) The subsequence charts function of MSC support the theory of hierarchical modeling and module abstract and composite[10] ; (3) The translation algorithm provides a powerful tool to translate the MSC model to Petri Net model; (4) MSC model can help to understand Petri Net model of a complex system, enhance the readability of Petri Net model, and avoid the dead lock effectively; (5) It can modify Petri Net model by modifying the responding MSC model, which makes building and modifying Petri Net model based on the simple and intuitionistic MSC model. After Petri Net model is built, how to evaluate a complex system with the responding Petri Net model is the next target of author's group. ACKNOWLEDGEMENTS This work is supported by the Natural Science Foundation of China (NSFC) under Grant No. 60434010 and No. 61174144. And thanks professor Fang-zhou BAI for his valuable suggestions. REFERENCES [1] Geneva:ITU-T, (1996). ITU-T Recommendation Z.120: Message Sequence Chart (MSC) . [2] S.Mauw, (1996). The formalization of Message Sequence Charts. Computer Networks and ISDN Systems. No.28,pp1643-1657. [3] Rudolph, E., J. Grabowski and P. Graubmann,( 1996). Tutorial on Message Sequence Charts. Computer Networks and ISDN Systems. No.28,pp629-1641. [4] Kumar, Sandeep; Khoo, Siau-Cheng; Roychoudhury, Abhik; Lo, David,(2011). Mining message sequence graphs. 33rd International Conference on Software Engineering, ICSE 2011, May 21, 2011 - May 28, 2011, p 91-100. [5] Dan, Haitao; Hierons, Robert M.(2011), Conformance testing from message sequence charts. Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011, p 279-288. [6] Olaf Kluge, ( 2003). Modelling a Railway Crossing with Message Sequence Charts and Petri Nets. Lecture Notes in Computer Science. Springer Verlag. No.2472,pp197-218.
  • 8. 78 Computer Science & Information Technology (CS & IT) [7] T.Murata,( 1989). Petri Nets: Properties, Analysis and pplications. Proceedings of the IEEE. No.77,pp541-580. [8] Chongyi Yuan,( 1998). Principle of Petri Net. Beijing:Electronics Industrial Press. [9] Song Huang,Yujin Hu,Chenggang Li,( 2004). A TCPN based approach to model the coordination in virtual manufacturing organizations. Computers & Industrial Engineering. No.47,pp61-76. [10] Zhibin Jiang,( 2004). Petri Net and its application in the manufacturing system modeling and control. Beijing: Machinery Industrial Press. Authors Chen-xi SHAO, male, 1954, M.Eng. , associate professor, research interests are simulation of complex system and qualitative simulation; Zhen-zhong SHAO, male,1983, B. Eng., engineer, research intersts are CIM, CAD/CAM and VR. Wei-hua WANG, female, 1960, B. In.& Co., research interests are MRP-II,ERP andSCM.