Dissertations / Theses on the topic 'Preemptive Time Petri Nets'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 42 dissertations / theses for your research on the topic 'Preemptive Time Petri Nets.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bowden, Fred D. J. "The modelling and analysis of command and control decision processes using extended time petri nets." Title page, table of contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09PH/09phb784.pdf.
Full textCavalcante, Sergio Vanderlei. "A hardware-software co-design system for embedded real-time applications." Thesis, University of Newcastle Upon Tyne, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360339.
Full textJiffry, Mustafa Abdulrahman. "Petri nets approach for the analysis of MASCOT interprocess communications." Thesis, King's College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.324637.
Full textRogge-Solti, Andreas, Laura Vana, and Jan Mendling. "Time Series Petri Net Models - Enrichment and Prediction." CEUR Workshop Proceedings, 2015. http://epub.wu.ac.at/5394/1/paper8.pdf.
Full textBarate', A. "Application of Petri Nets to the Real-Time Interaction with Music Structures." Doctoral thesis, Università degli Studi di Milano, 2009. http://hdl.handle.net/2434/56013.
Full textXia, Fei. "Supporting the MASCOT method with Petri net techniques for real-time systems development." Thesis, King's College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325515.
Full textClark, Ian George. "A unified approach to the study of asynchronous communication mechanisms in real-time systems." Thesis, King's College London (University of London), 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326237.
Full textShi, Lihua. "Uniting formal and structured methods for the development of reliable software." Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.388141.
Full textCortés, Luis Alejandro. "A Petri Net based Modeling and Verification Technique for Real-Time Embedded Systems." Licentiate thesis, Linköping University, Linköping University, ESLAB - Embedded Systems Laboratory, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-5751.
Full textEmbedded systems are used in a wide spectrum of applications ranging from home appliances and mobile devices to medical equipment and vehicle controllers. They are typically characterized by their real-time behavior and many of them must fulfill strict requirements on reliability and correctness.
In this thesis, we concentrate on aspects related to modeling and formal verification of realtime embedded systems.
First, we define a formal model of computation for real-time embedded systems based on Petri nets. Our model can capture important features of such systems and allows their representations at different levels of granularity. Our modeling formalism has a welldefined semantics so that it supports a precise representation of the system, the use of formal methods to verify its correctness, and the automation of different tasks along the design process.
Second, we propose an approach to the problem of formal verification of real-time embedded systems represented in our modeling formalism. We make use of model checking to prove whether certain properties, expressed as temporal logic formulas, hold with respect to the system model. We introduce a systematic procedure to translate our model into timed automata so that it is possible to use available model checking ools. Various examples, including a realistic industrial case, demonstrate the feasibility of our approach on practical applications.
Marsal, Gaëlle. "Evaluation of time performances of ethernet-based automation systems by simulation of high-level Petri nets." Cachan, Ecole normale supérieure, 2006. http://tel.archives-ouvertes.fr/tel-00162228.
Full textIn this work, two time performances of switched Ethernet automation systems that use a client/server cooperation model are evaluated : The response time from an occurrence of an input event to the occurrence of the corresponding output event ; The network cycle time for the scanning by a controller of the whole set of its remote inputs / outputs modules. The conjunction of three time consumption mechanisms makes both time performances variable and difficult to compute in an analytic fashion. Thus, the proposed method is based on simulation of a timed and coloured Petri net model of the dynamic behaviour of the whole automation architecture. The results which have been obtained on six benchmark architectures enabled us : To show that multi-controllers architectures using a client/server cooperation model provide faster network cycle times than those based on master/slave and producer/consumer models ; To quantify the influence of the time consumption mechanisms on these performances
Thumu, Prashanth. "TIME CONDITION SYSTEMS." UKnowledge, 2005. http://uknowledge.uky.edu/gradschool_theses/374.
Full textMarsal, Gaelle [Verfasser]. "Evaluation of time performances of Ethernet-based Automation Systems by simulation of High-level Petri Nets / Gaelle Marsal." Aachen : Shaker, 2007. http://d-nb.info/1166512339/34.
Full textKriščiūnas, Darius. "Gyvenamojo namo šildymo ir vėdinimo sistemos kompiuterinio valdymo modelio sudarymas ir tyrimas naudojant Petri tinklą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2005. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2005~D_20050522_223544-30240.
Full textAntunes, Dante Carlos. "Modelagem temporal de sistemas : uma abordagem fundamentada em redes de petri." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 1997. http://hdl.handle.net/10183/21112.
Full textThis dissertation presents TempER-Tr approach. TempER-Tr is a conceptual modeling technique based on Petri nets that integrates the specification of the dynamic properties of system to a temporal entity-relationship data model. A model or conceptual schema describes the identified properties of a system. These properties can be classified into static and dynamic properties. The static properties describe the states that the system can reach, while the dynamic properties describe the transitions between the states. The conceptual modeling of the static properties is usually known as data modeling, while behavioral or functional modeling deals with dynamic properties. The TempER-Tr model is an extension of a model known as ER-Tr. In the ER-Tr model, the conventional entity-relationship model is used to describe the static properties of a system. In the TempER-Tr model, it is adopted a kind of temporal entityrelationship model. In addition, a new notation language is proposed, based on SQL, with more expression power. The conventional entity-relationship model doesn't provide tools to specify constraints that involve the association of objects with the time dimension, requiring that this have to be done at the dynamic properties modeling level. At the conventional entityrelationship model the entities and relationships sets present just two dimensions: the first one is related to the instance (lines) and the second to the attributes (columns). At a temporal entity-relationship approach, a new dimension is added: the time line. This way, the temporal constraints can be specified at the level of the static diagrams. An important requirement to be supplied by any temporal data model is the possibility to relate, into the same diagram, time-varying objects with time-invarying objects. This is due to the fact that in information systems some data need to be explicitly related to time and others don't, either because they don't change with time, or because users don't need to know when the facts occurred. • The temporal data model proposed in this work, nominated TempER, presupposes that all entities, being them time-varying or time-invarying, have an "existence", or a temporal validity. At the time-varying entities, named transitory entities, this existence is a subset of points from the time line. In time-invarying entities, named perennial entities, it is assumed that they "always exist", i.e., their temporal validity is constant, implicit, and equal to all points of the time line. Transitory entities, as much as perennial entities, are focused by the TempER model through two perspectives: a temporal perspective and a non-temporal perspective. Through the non-temporal perspective the entities present two dimensions - lines and columns - similar to a conventional entity-relationship model. Through the temporal perspective the entities present three dimensions: the two conventional dimensions and, in addition, the time dimension. While the temporal data model describes the static properties of a system, the behavioral model in the TempER-Tr approach focus the transactions that are executed by the system, in response to the events that occur at the external environment. A certain set of dynamic constraints must be attended so that transactions are enable to occur. This configures a behavior similar to a Petri net. The TempER-Tr model is completely mappeable, inclusive the temporal data model, to the CEM net, a kind of high level Petri net. This way, the semantic of TempER-Tr model is formally specified. In addition, the utilization of the characteristics of Petri nets is possible.
Sousa, João Carlos Tanganho de. "Parallel run-time for CO-OPN." Master's thesis, Faculdade de Ciências e Tecnologia, 2009. http://hdl.handle.net/10362/8101.
Full textDomain Specific Modeling (DSM) is a methodology to provide programs or system’s specification at higher level of abstraction, making use of domain concepts instead of low level programming details. To support this approach, we need to have enough expressive power in terms of those domain concepts, which means that we need to develop new languages , usually termed Domain Specific Languages (DSLs). An approach to execute specifications developed using DSLs goes by applying a model transformation technique to produce a specification in another language. These transformation techniques are applied sucessively until the specification reaches a language with an implemented run-time. The language named Concurrent Object-Oriented Petri Nets (CO-OPN) is being used successfully as a target language for such model transformation techniques. CO-OPN is an object-oriented formal language for specifying concurrent systems, that separates coordination from computational tasks. CO-OPN offers mechanisms to define the system structure and behavior, and like DSLs, relieves the developer from stipulate how that structure and behavior are attained by the underlying system. The currently available code generator for CO-OPN only produces sequential code, despite of this language potential of expressing specifications rich in concurrent behavior. The generated sequential code can be executed either in a Sequential Run-Time or in the step simulator, which is part of CO-OPN Builder IDE. The generation of sequential code turns out to be an adversity to CO-OPN application since concurrent specifications cannot be executed in parallel and therefore this languages potential is not fully exploited. This dissertation aims at filling this CO-OPN’s execution gap, through the development of a Parallel Run-Time. The new Run-Time is achieved through the adaptation of the sequential code generator and actual execution support mechanisms. In this manner, all concurrent specifications that target CO-OPN benefit from thread safe code, ready for execution in parallel and distributed environments, relieving the developer from delving into parallel programming details.By guaranteeing a safe execution environment, CO-OPN becomes an alternative to the way parallel software is nowadays developed.
TAVARES, Eduardo Antônio Guimarães. "Software Synthesis for Energy-Constrained Hard Real-Time Embedded Systems." Universidade Federal de Pernambuco, 2009. https://repositorio.ufpe.br/handle/123456789/1403.
Full textA grande expansão do mercado de dispositivos digitais tem forçado empresas desenvolvedoras de sistemas embarcados em lidar com diversos desafios para prover sistemas complexos nesse nicho de mercado. Um dos desafios prominentes está relacionado ao consumo de energia, principalmente, devido aos seguintes fatores: (i) mobilidade; (ii) problemas ambientais; e (iii) o custo da energia. Como consequência, consideráveis esforços de pesquisa têm sido dedicados para a criação de técnicas voltadas para aumentar a economia de energia. Na última década, diversas técnicas foram desenvolvidas para reduzir o consumo de energia em sistemas embarcados. Muitos métodos lidam com gerenciamento dinâmico de energia (DPM), como, por exemplo, dynamic voltage scaling (DVS), cooperativamente com sistemas operacionais especializados, a fim de controlar o consumo de energia durante a execução do sistema. Entretanto, apesar da disponibilidade de muitos métodos de redução de consumo de energia, diversas questões estão em aberto, principalmente, no contexto de sistemas de tempo real crítico. Este trabalho propõe um método de síntese de software, o qual leva em consideração relação entre tarefas, overheads, restrições temporais e de energia. O método é composto por diversas atividades, as quais incluem: (i) medição; (ii) especificação; (iii) modelagem formal; (vi) escalonamento; e (v) geração de código. O método também é centrado no formalismo redes de Petri, o qual define uma base para geração precisa de escalas em tempo de projeto, adotando DVS para reduzir o consumo de energia. A partir de uma escala viável, um código customizado é gerado satisfazendo as restrições especificadas, e, dessa forma, garantindo previsibilidade em tempo de execução. Para lidar com a natureza estática das escalas geradas em tempo de projeto, um escalonador simples em tempo de execução é também proposto para melhorar o consumo de energia durante a execução do sistema. Diversos experimentos foram conduzidos, os quais demonstram a viabilidade da abordagem proposta para satisfazer restrições críticas de tempo e energia. Adicionalmente, um conjunto integrado de ferramentas foram desenvolvidas para automatizar algumas atividades do método de síntese de software proposto
Mohan, Sridhar. "Deadlock avoidance in mixed capacity flexible manufacturing systems." [Tampa, Fla.] : University of South Florida, 2004. http://purl.fcla.edu/fcla/etd/SFE0000428.
Full textFoyo, Pedro Manuel González Del. "Verificação formal de sistemas discretos distribuídos." Universidade de São Paulo, 2009. http://www.teses.usp.br/teses/disponiveis/3/3152/tde-11082010-164641/.
Full textThis work deals with the process of design and verification of complex systems, mainly real time, concurrent and distributed systems. An enumerative technique is proposed for model-checking which is capable of determining both quantitative and qualitative properties. The proposed technique detach the algorithm for labeling the formula being checked from the state space construction, allowing a better result in the verification process. This model-checking approach shows itself valuable in practical applications. This approach was first applied to systems modeled by Time Petri Nets and further extended to a unified net called GHENeSys, which includes abstraction and hierarchy concepts as well as elements for data and control interchange, called pseudo-boxes. The GHENeSys definition was modified in order to deal with systems in which temporal requirements can be expressed through delays and deadlines as in the real-time systems. The GHENeSys environment supports a refinement technique applied to both passive and active elements. Net properties like invariants, liveness, boundedness and also the validity of temporal formulas was proved to be maintained through the refinement process if some conditions are satisfied. Such characteristics are useful to deal with complex systems design. Some experiments based on well known academic articles were used to avaliate the performance of the algorithms and a case study is presented in order to compare obtained results with those obtained using the UPPAAL tool.
Givel, Louis-Marie. "Test de systèmes temps réel à l’aide du forçage en ligne." Thesis, Ecole centrale de Nantes, 2016. http://www.theses.fr/2016ECDN0024.
Full textReal-time systems must conform to requirements of correctness and safety, which requires testing them. In this thesis, we propose a method that allows to force an execution of a real-time system so as to reach a chosen state. This technique can be used to test real-time systems in situations where the chosen state could be hard to reach when dealing with the input sequence of the system alone. One example of an application could be that of a state that triggers a redundancy mechanism when reached, the execution of which would be infrequent, but that still requires testing. In this use case, it is effectively fault injection in the system. This solution is based on an offline analysis of a set of behavioral models of the system, using the formalism of durational Kripke structures. The models of the system are obtained through a Model Driven Engineering approach, and present the behaviors of the tasks from the point of view of the real-time operating system. Using a parametrization, transformation and composition of the models, we perform a parametric analysis of the resulting Time Petri net. Thanks to the result of this analysis, we establish a set of delays to be added to the execution of the system so as to reach the chosen state. With the help of an embedded model of the different tasks of the system, and through the means of a controller embedded in the real-time operating system, we perform the runtime enforcement of the system so as to make it reach the chosen state, and possibly allow for testing the execution starting from this state. This thesis details the formalisms used to model the application, the way in which the models are modified and analyzed to obtain the execution delays, as well as the implementation in a real-time operating system: TrampolineRTOS
Peres, Florent. "Réseaux de Petri temporels à inhibitions / permissions : application à la modélisation et vérification de systèmes de tâches temps réel." Phd thesis, INSA de Toulouse, 2010. http://tel.archives-ouvertes.fr/tel-00462521.
Full textKluth, Stephan. "Quantitative modeling and analysis with FMC-QE." Phd thesis, Universität Potsdam, 2011. http://opus.kobv.de/ubp/volltexte/2011/5298/.
Full textFMC-QE (Fundamental Modeling Concepts for Quantitative Evaluation [1]) ist eine auf FMC, den Fundamental Modeling Concepts, basierende Methodik zur Modellierung des Leistungsverhaltens von Systemen mit einem dazugehörenden Kalkül zur Erstellung von Leistungsvorhersagen wie Antwortzeiten und Durchsatz. In dieser neuen Methodik steht die Modellierung der hierarchischen Bedienanforderungen im Mittelpunkt, da sie der Ursprung aller dienstbasierenden Systeme sind. Wie in der Physik sind in FMC-QE die Bedienanforderungen Tupel aus Wert und Einheit, um Auftragstransformationen an Hierarchiegrenzen zu ermöglichen. Da die Komplexität durch eine Dekomposition in mehreren Sichten und in verschiedene hierarchische Schichten, die Unterscheidung von Operations- und Kontrollzuständen, sowie dazugehörige Berechungen unter Annahme der Stationarität reduziert wird, skaliert die Anwendbarkeit von FMC-QE auf komplexe Systeme. Gemäß FMC wird das zu modellierende System in einem 3-dimensionalen hierarchischen Beschreibungsraum dargestellt. Die quantitativen Kenngrößen der Systeme werden in drei beliebig frei-granularen hierarchischen bi-partiten Graphen beschrieben. Die hierarchische Struktur der Bedienanforderungen wird in Entity Relationship Diagrammen beschrieben. Die statischen Bedienerstrukturen, unterteilt in logische und reale Bediener, sind in Aufbaudiagrammen erläutert. Außerdem werden Petri Netze, genauer Farbige Zeit-behaftete Petri Netze, dazu verwendet, die dynamischen Abläufe, sowie die Kontrollflüsse im System zu beschreiben. Anschließend wird eine Menge von hierarchischen Gleichungen von der Struktur und den Parametern des Modells abgeleitet. Diese Gleichungen, die auf dem stationären Zustand des Systems beruhen, basieren auf den beiden Fundamental Gesetzen der Leistungsanalyse, dem Gesetz von Little und dem Verkehrsflussgesetz. Das Gesetz von Little definiert hierbei Beziehungen innerhalb einer hierarchischen Schicht (horizontal) und das Verkehrsflussgesetz wiederum Beziehungen zwischen hierarchischen Schichten (vertikal). Die Berechungen erlauben Leistungsvorhersagen für komplexe Systeme durch eine effiziente Berechnung von Leistungsgrößen für eine große Auswahl von System- und Lastkonfigurationen. Innerhalb der Forschungsgruppe von Prof. Dr.-Ing Werner Zorn am Hasso Plattner Institut an der Universität Potsdam ist die vorliegende Arbeit in einen größeren Forschungskontext im Bereich FMC-QE eingebettet. Während hier ein Fokus auf dem theoretischen Hintergrund, der Beschreibung und der Definition der Methodik als auch der Anwendbarkeit und Erweiterung gelegt wurde, sind andere Arbeiten auf dem Gebiet der Entwicklung einer Anwendung zur Modellierung und Evaluierung von Systemen mit FMC-QE bzw. der Verwendung von FMC-QE zur Entwicklung einer adaptiven Transportschicht zur Einhaltung von Dienstgüten (Quality of Service) und Dienstvereinbarungen (Service Level Agreements) in volatilen dienstbasierten Systemen beheimatet. Diese Arbeit umfasst einen Einblick in den Stand der Technik, die Beschreibung von FMC-QE sowie die Weiterentwicklung von FMC-QE in repräsentativen allgemeinen Modellen und Fallstudien. Das Kapitel 2: Stand der Technik gibt einen Überblick über die Warteschlangentheorie, Zeit-behaftete Petri Netze, weitere Leistungsbeschreibungs- und Leistungsvorhersagungstechniken sowie die Verwendung von Hierarchien in Leistungsbeschreibungstechniken. Die Beschreibung von FMC-QE in Kapitel 3 enthält die Erläuterung der Grundlagen von FMC-QE, die Beschreibung einiger Grundannahmen, der graphischen Notation, dem mathematischen Modell und einem erläuternden Beispiel. In Kapitel 4: Erweiterungen von FMC-QE wird die Behandlung weiterer allgemeiner Modelle, wie die Modellklasse von geschlossenen Netzen, Synchronisierung und Mehrklassen-Modelle beschrieben. Außerdem wird FMC-QE mit dem Stand der Technik verglichen. In Kapitel 5 werden Machbarkeitsstudien beschrieben. Schließlich werden in Kapitel 6 eine Zusammenfassung und ein Ausblick gegeben. [1] Werner Zorn. FMC-QE - A New Approach in Quantitative Modeling. In Hamid R. Arabnia, editor, Proceedings of the International Conference on Modeling, Simulation and Visualization Methods (MSV 2007) within WorldComp ’07, 280 – 287, Las Vegas, NV, USA, Juni 2007. CSREA Press. ISBN 1-60132-029-9.
Hefka, Lukáš. "Plánování a rozvrhování." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236744.
Full textGrabiec, Bartosz. "Supervision of distributed systems using constrained unfoldings of timed models." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2011. http://tel.archives-ouvertes.fr/tel-00744651.
Full textBalaguer, Sandie. "Study of concurrency in real-time distributed systems." Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2012. http://tel.archives-ouvertes.fr/tel-00821978.
Full textDefossez, François. "Modélisation discrète et formelle des exigences temporelles pour la validation et l’évaluation de la sécurité ferroviaire." Thesis, Ecole centrale de Lille, 2010. http://www.theses.fr/2010ECLI0004/document.
Full textThe introduction of new European standards for railway safety, coupled with an increasing use of software technology changes the method of development of critical railway systems. Indeed, new systems have to be at least as good as the previous ones. Therefore the appropriate safety level of critical systems has to be proved in order to obtain the necessary approval from the authorities. Accordingly a high level of reliability and correctness must be reached by the use of mathematical proofs and then formal methods. We focus on the treatment of the temporal requirements in the level crossing case study which is modelled with p-time Petri nets, and on the translation of this model in a more formal way by using the B method. This paper introduces a methodology to analyse the safety of timed discrete event systems. First, our goal is to take out the forbidden state highlighted by a p-time Petri net modelling. This model deals with the requirements of the considered system and has to contain all the constraints that have to be respected. Then we aim at describing a process identified as a solution of the system functioning. This method consists in exploring all the possible behaviours of the system by means of the construction of state classes. Finally, we check if the proposed process corresponds to the requirements model previously built.Our case-study is the level crossing, a critical component for the safety of railway systems
Clavareau, Julien. "Modélisation des stratégies de remplacement de composant et de systèmes soumis à l'obsolescence technologique." Doctoral thesis, Universite Libre de Bruxelles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210482.
Full textLa sûreté de fonctionnement est progressivement devenue partie intégrante de l’évaluation des performances des systèmes industriels. En effet, les pannes d’équipements, les pertes de production consécutives, et la maintenance des installations ont un impact économique majeur dans les entreprises. Il est donc essentiel pour un manager de pouvoir estimer de manière cohérente et réaliste les coûts de fonctionnement de l’entreprise, en tenant notamment compte des caractéristiques fiabilistes des équipements utilisés, ainsi que des coûts induits entre autres par le non-fonctionnement du système et la restauration des performances de ses composants après défaillance.
Le travail que nous avons réalisé dans le cadre de ce doctorat se concentre sur un aspect particulier de la sûreté de fonctionnement, à savoir les politiques de remplacement d’équipements basées sur la fiabilité des systèmes qu’ils constituent. La recherche menée part de l’observation suivante :si la littérature consacrée aux politiques de remplacement est abondante, elle repose généralement sur l’hypothèse implicite que les nouveaux équipements envisagés présentent les mêmes caractéristiques et performances que celles que possédaient initialement les composants objets du remplacement.
La réalité technologique est souvent bien différente de cette approche, quelle que soit la discipline industrielle envisagée. En effet, de nouveaux équipements sont régulièrement disponibles sur le marché ;ils assurent les mêmes fonctions que des composants plus anciens utilisés par une entreprise, mais présentent de meilleures performances, par exemple en termes de taux de défaillance, consommation d’énergie, " intelligence " (aptitude à transmettre des informations sur leur état de détérioration).
De plus, il peut devenir de plus en plus difficile de se procurer des composants de l’ancienne génération pour remplacer ceux qui ont été déclassés. Cette situation est généralement appelée obsolescence technologique.
Le but de ce travail est de prolonger et d’approfondir, dans le cadre de la sûreté de fonctionnement, les réflexions engagées par les différents articles présentés dans la section état de l’art afin de définir et de modéliser des stratégies de remplacements d’équipements soumis à obsolescence technologique. Il s’agira de proposer un modèle, faisant le lien entre les approches plus économiques et celles plus fiabilistes, permettant de définir et d’évaluer l’efficacité, au sens large, des différentes stratégies de remplacement des unités obsolètes. L’efficacité d’une stratégie peut se mesurer par rapport à plusieurs critères parfois contradictoires. Parmi ceux-ci citons, évidemment, le coût total moyen engendré par la stratégie de remplacement, seul critère considéré dans les articles cités au chapitre 2, mais aussi la façon dont ces coûts sont répartis au cours du temps tout au long de la stratégie, la variabilité de ces coûts autour de leur moyenne, le fait de remplir certaines conditions comme par exemple d’avoir remplacé toutes les unités d’une génération par des unités d’une autre génération avant une date donnée ou de respecter certaines contraintes sur les temps de remplacement.
Pour arriver à évaluer les différentes stratégies, la première étape sera de définir un modèle réaliste des performances des unités considérées, et en particulier de leur loi de probabilité de défaillance. Etant donné le lien direct entre la probabilité de défaillance d’un équipement et la politique de maintenance qui lui est appliquée, notamment la fréquence des maintenances préventives, leur effet, l’effet des réparations après défaillance ou les critères de remplacement de l’équipement, un modèle complet devra considérer la description mathématique des effets des interventions effectuées sur les équipements. On verra que la volonté de décrire correctement les effets des interventions nous a amené à proposer une extension des modèles d’âge effectif habituellement utilisés dans la littérature.
Une fois le modèle interne des unités défini, nous développerons le modèle de remplacement des équipements obsolètes proprement dit.
Nous appuyant sur la notion de stratégie K proposée dans de précédents travaux, nous verrons comment adapter cette stratégie K à un modèle pour lequel les temps d’intervention ne sont pas négligeables et le nombre d’équipes limité. Nous verrons aussi comment tenir compte dans le cadre de cette stratégie K d’une part des contraintes de gestion d’un budget demandant en général de répartir les coûts au cours du temps et d’autre part de la volonté de passer d’une génération d’unités à l’autre en un temps limité, ces deux conditions pouvant être contradictoires.
Un autre problème auquel on est confronté quand on parle de l’obsolescence technologique est le modèle d’obsolescence à adopter. La manière dont on va gérer le risque d’obsolescence dépendra fortement de la manière dont on pense que les technologies vont évoluer et en particulier du rythme de cette évolution. Selon que l’on considère que le temps probable d’apparition d’une nouvelle génération est inférieur au temps de vie des composants ou supérieur à son temps de vie les solutions envisagées vont être différentes. Lors de deux applications numériques spécifiques.
Nous verrons au chapitre 12 comment envisager le problème lorsque l’intervalle de temps entre les différentes générations successives est largement inférieur à la durée de vie des équipements et au chapitre 13 comment traiter le problème lorsque le délai entre deux générations est de l’ordre de grandeur de la durée de vie des équipements considérés.
Le texte est structuré de la manière suivante :Après une première partie permettant de situer le contexte dans lequel s’inscrit ce travail, la deuxième partie décrit le modèle interne des unités tel que nous l’avons utilisé dans les différentes applications. La troisième partie reprend la description des stratégies de remplacement et des différentes applications traitées. La dernière partie permet de conclure par quelques commentaires sur les résultats obtenus et de discuter des perspectives de recherche dans le domaine.
Doctorat en Sciences de l'ingénieur
info:eu-repo/semantics/nonPublished
CARNEVALI, LAURA. "Formal methods in the development life cycle of real-time software." Doctoral thesis, 2010. http://hdl.handle.net/2158/521924.
Full textShiau, Yuh-Shin, and 蕭毓欣. "New Methods for Knowledge Representation and Reasoning Using Extended Fuzzy Petri Nets and Time Petri Nets." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/59329606435635902582.
Full text國立交通大學
資訊科學學系
86
In this thesis, we present an extended fuzzy Petri net model to model fuzzy IF-THEN rules and fuzzy IF-THEN-ELSE rules of rule- based systems. We also develop an efficient algorithm for performing vague reasoning automatically based on the extended fuzzy Petri net model. The proposed algorithm allows the computers to perform reasoning in a more flexible and more intelligent manner. Based on the proposed vague reasoning algorithm, we have implemented a vague reasoning system on a Pentium PC for performing vague reasoning automatically. Furthermore, we propose a method to describe the relationships between states and events for temporal knowledge representation and reasoning using time Petri nets. We also propose an algorithm to infer the consistency of the temporal knowledge based on the time Petri nets. Based on the proposed temporal reasoning algorithm, we have implemented a temporal reasoning system on a Pentium PC to check the consistency of the temporal knowledge.
Bowden, Fred D. J. "The modelling and analysis of command and control decision processes using extended time petri nets." Thesis, 2001. http://hdl.handle.net/2440/50724.
Full textThesis (Ph.D.) - University of Adelaide, Dept. of Applied Mathematics, 2001
Liu, Paladin R., and 劉儒斌. "Deadlock-free Verification of RosettaNet PIPs with Time Petri Nets." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/19853990500635503123.
Full text國立暨南國際大學
資訊管理學系
91
Among the increasingly widespread e-commerce protocols, RosettaNet is developed initially to support the specific electronic industry domain, especially for their vertical collaborative integration of the entire supply chain of electronic products. RosettaNet provides a complete and easy way to build a platform for electronic business document exchange. Similar to other communication protocols, RosettaNet is subject to protocol verification problems, like issues of liveness. However, there are neither research efforts devoted to these problem nor any solid results to resolve them. There are risks and difficulties incurred during the implementation of RosettaNet without any protocol verification scheme applied. RosettaNet PIPs (Partner Interface Processes) are XML-based dialogs that are specially designed for system-to-system information exchange of business processes between trading partners. In each PIP specification, there define a business process with the choreography of the message dialog, and a business document with the vocabulary. Although, RosettaNet PIPs intend to provide open e-commerce standards for automated information excess and exchange across the boundaries of individual companies, some of their pilot implementations, however, faced fierce obstacles and difficulties. Most of them are caused by the inability to handle exceptional conditions. For instance, consider a situation when a buyer places a purchase order to a seller. The buyer first sends a business document to the seller. Complying to the PIPs specifications, the seller side has to return an acknowledgement to the buyer side after receiving the purchase order. Assume that due to some unexpected noises during data transferring, this message of acknowledgement were lost. According to the PIPs, the buyer side has to resend the business document to at most three times and resume its state at being executing after then. One problem arises with the question whether the seller does receive the purchase order, but the buyer doesn't receive the confirmation of the purchase order. Such ambiguities impose difficulties and burdens on system testing activities. This paper deals with the verification problem of RosettaNet. The PIPs Specifications are first modeled with time Petri nets. Time Petri nets allow an explicit modeling of concurrency and parallelism and have been widely used in real-time system specification and verification. Behavioral specification models can be automatically translated into a state transition graph, from which properties such as deadlock and reachability become explicit. The correctness of the time Petri nets models is then verified to ensure the capability of deadlock-free, auto-repairing implementations of RosettaNet applications. Ideas of the deadlock detection mechanism to check the possible existence of an uncontrolled siphon are adopted. We then extend the models to complete the RosettaNet PIPs specifications at both the sender and receiver counterparts.
Tseng, Chung-Liang, and 曾中亮. "Analysis of Clocked Petri Nets Using Stubborn Sets and Time Warp Distributed Simulator." Thesis, 1997. http://ndltd.ncl.edu.tw/handle/40041455923237692787.
Full text國立臺灣大學
電機工程學系
85
Petri nets, a useful model for concurrent systems, lack the notion of time which is critical in modeling real-time systems. Thus, Petri nets, in general, are not appropriate for modeling systems on which timing constraints are imposed. Several timed versions of Petri nets have been proposed in theliterature, incorporating timing information into the Petri net model either implicitly or explicitly. Among such extended Petri nets, clocked Petri nets associate each transition with a set of clockconstraints and/or clock reset operations.After we associate timing information with the transitions of thePetri net we can use this enhanced model to effectively model real- time systems. However,since a system's configuration must now include timing information, both the state space and the system complexity increase significantly.To reduce the complexity, weuse the concept of Stubborn set introduced by Antti Valmari. The intuition behind stubborn sets is simply that in each of the reachable states, only portion of the next states will be explored,resulting in a reduced state space. Aside from the above analytical aspect of clocked Petri nets,in this thesis we also implement a Time-Warp distributedsimulator on a distributed shared memory system for simple timedPetri nets. Our empirical results reveal how the "partition" issue affects the performance of our simulation.
Eadara, Archana. "Modeling, analysis, and simulation of Muzima fingerprint module based on ordinary and time Petri nets." Thesis, 2016. http://hdl.handle.net/1805/10800.
Full textIn the healthcare industry, several modern patient identification and patient matching systems have been introduced. Most of these implement patient identification by their first, middle and last names. They also use Social Security Number and other similar national identifiers. These methods may not work for many developing and underdeveloped countries where identifying a patient is a challenge with highly redundant and interchangeable first and last names of the patient, this is aggravated by the absence of a national identification system. In order to make the patient identification more efficient, Muzima, an interface of OpenMRS (Open source medical records system) introduced an additional identifier, fingerprint, through a module to the system. Ordinary and Time Petri nets are used to analyze this module. Chapter 1 introduces Muzima fingerprint module and describes the workflow of this interface followed by the related work, importance and applications of Petri nets. Chapter 2 introduces Ordinary and Time Petri nets using examples. Chapter 3 discusses about the mathematical modeling of the Muzima Fingerprint module using Petri nets. Chapter 4 explains the qualitative and quantitative analysis done on the Muzima fingerprint module. Chapter 5 discusses about the programming and simulation done to prove the theoretical results obtained. Chapter 6 provides the conclusion and future work for the thesis.
"Petri Net Modeling of Outpatient Waiting Time for MRI Examination." Thesis, 2013. http://hdl.handle.net/10388/ETD-2013-11-1304.
Full textKruger, Bernardus Rudolf. "A design methodology for distributed real-time control systems based on augmented Petri Nets." Thesis, 2015. http://hdl.handle.net/10539/17840.
Full textWang, Jyh Cheng, and 王志成. "Rapid Prototyping of Real-Time Distributed Systems - Using Petri Nets and Data-Oriented Model." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/64431828184821278319.
Full text"Calculating time-related performance measures of a distributed tactical decisionmaking organization using stochastic timed petri nets." Massachusetts Institute of Technology, Laboratory for Information and Decision Systems, 1985. http://hdl.handle.net/1721.1/2908.
Full textYan, Jiaxiang. "Modeling, monitoring and optimization of discrete event systems using Petri nets." 2014. http://hdl.handle.net/1805/3874.
Full textYan, Jiaxiang. M.S.E.C.E., Purdue University, May 2013. Modeling, Monitoring and Optimization of Discrete Event Systems Using Petri Nets. Major Professor: Lingxi Li. In last decades, the research of discrete event systems (DESs) has attracts more and more attention because of the fast development of intelligent control strategies. Such control measures combine the conventional control strategies with discrete decision-making processes which simulate human decision-making processes. Due to the scale and complexity of common DESs, the dedicated models, monitoring methods and optimal control strategies for them are necessary. Among various DES models, Petri nets are famous for the advantage in dealing with asynchronous processes. They have been widely applied in intelligent transportation systems (ITS) and communication technology in recent years. With encoding of the Petri net state, we can also enable fault detection and identification capability in DESs and mitigate potential human errors. This thesis studies various problems in the context of DESs that can be modeled by Petri nets. In particular, we focus on systematic modeling, asynchronous monitoring and optimal control strategies design of Petri nets. This thesis starts by looking at the systematic modeling of ITS. A microscopic model of signalized intersection and its two-layer timed Petri net representation is proposed in this thesis, where the first layer is the representation of the intersection and the second layer is the representation of the traffic light system. Deterministic and stochastic transitions are both involved in such Petri net representation. The detailed operation process of such Petri net representation is stated. The improvement of such Petri net representation is also provided with comparison to previous models. Then we study the asynchronous monitoring of sensor networks. An event sequence reconstruction algorithm for a given sensor network based on asynchronous observations of its state changes is proposed in this thesis. We assume that the sensor network is modeled as a Petri net and the asynchronous observations are in the form of state (token) changes at different places in the Petri net. More specifically, the observed sequences of state changes are provided by local sensors and are asynchronous, i.e., they only contain partial information about the ordering of the state changes that occur. We propose an approach that is able to partition the given net into several subnets and reconstruct the event sequence for each subnet. Then we develop an algorithm that is able to reconstruct the event sequences for the entire net that are consistent with: 1) the asynchronous observations of state changes; 2) the event sequences of each subnet; and 3) the structure of the given Petri net. We discuss the algorithmic complexity. The final problem studied in this thesis is the optimal design method of Petri net controllers with fault-tolerant ability. In particular, we consider multiple faults detection and identification in Petri nets that have state machine structures (i.e., every transition in the net has only one input place and one output place). We develop the approximation algorithms to design the fault-tolerant Petri net controller which achieves the minimal number of connections with the original controller. A design example for an automated guided vehicle (AGV) system is also provided to illustrate our approaches.
Hayward, Duston L., and Daniel Lee Davis. "A practical application of Petri nets in the software safety analysis of a real-time military system." Thesis, 1987. http://hdl.handle.net/10945/22423.
Full textRamesh, Keerthanaa. "MODELING AND SIMULATION OF AN AUTOMATED PARALLEL PARKING SYSTEM USING HYBRID PETRI NETS." Thesis, 2015. http://hdl.handle.net/1805/9746.
Full textIn recent years, there have been a lot of technology innovations to automate the day to day processes done by every person. These days the automobile manufacturers introduce new features in their cars, in order to improve customer experience, like Adaptive cruise control, Parallel park assist, etc. The objective of this thesis is to model an automated parallel parking system and to simulate the system behavior, by taking into account the high level events which happen when a car is parallel parked. The tool used in this thesis to model and simulate the system is Hybrid Petri net (HPN), which is versatile to model the real life systems. Chapter 1 deals with a brief introduction of the related work in Hybrid Petri net modeling of real life systems, automatic parallel parking systems and how the concept for modeling the parallel parking system was developed. Chapter 2 deals with the general introduction about Discrete, Continuous and Hybrid Petri nets and their dynamics which are essential for understanding this thesis. Chapter 3 deals with the development of the model and the various stages in the model development. Errors encountered in each stage is briefly discussed and the improvements are discussed in the next stage of development. This chapter concludes with the final integrated model and operation of the model. Chapter 4 deals with the discussion of results obtained when the model is tested in MATLAB and SIMHPN (which is a Matlab embedded simulation program). The results are compared, the system behavior is observed and the purpose of the thesis is justified. In Chapter 5, a conclusion is provided to summarize the entire thesis.
Yaqub, Omar Seddeq Omar. "Modeling, Analysis, and Simulation of Two Connected Intersections Using Discrete and Hybrid Petri Nets." 2014. http://hdl.handle.net/1805/3873.
Full textIn recent decades, Petri nets (PNs) have been used to model traffic networks for different purposes, such as signal phase control, routing, and traffic flow estimation, etc. Because of the complex nature of traffic networks where both discrete and continuous dynamics come into play, the Hybrid Petri net (HPN) model becomes an important tool for the modeling and analysis of traffic networks. In Chapter 1 a brief historical summery about traffic systems control and then related work is mentioned followed by the major contributions in this research. Chapter 2 provides a theoretical background on Petri nets. In Chapter 3, we develop a HPN model for a single signalized intersection first, then we extend this model to study a simple traffic network that consists of two successive intersections. Time delays between different points of network are also considered in order to make the model suitable for analysis and simulation. In addition to HPN models, we also consider discrete Petri nets where their modeling simplicity enables the characterization of the occurrences of all events in the system. This discrete PN is particularly useful to give a higher-level representation of the traffic network and study its event occurrences and correlations. In Chapter 4, we build a discrete PN model to represent a traffic network with two successive intersections. However, we find that the model leads to unbounded places which cannot accurately reflect the dynamics of the traffic in terms of event occurrences. Hence, we introduce the Modified Binary Petri nets (MBPN) to overcome the limitation and resolve the confliction problem when we design our controllers. This MBPN model is a powerful tool and can be useful for the modeling and analysis of many other applications in traffic networks. Chapter 5 gives a summary for each chapter, provides conclusion and discusses future work for both discrete and hybrid Petri nets.
Biagi, Marco. "New methods for quantitative evaluation of Markov regenerative models." Doctoral thesis, 2019. http://hdl.handle.net/2158/1152945.
Full textPINZUTI, ALESSANDRO. "Compositional verification for Hierarchical Scheduling of Real-Time systems." Doctoral thesis, 2013. http://hdl.handle.net/2158/799053.
Full text