相关期刊:《China Communications》《IEEE/CAA Journal of Automatica Sinica》《Wuhan University Journal of Natural Sciences》《Journal of Software Engineering and Applications》更多>>
financially supported by the National Natural Science Foundation of China(61503220);the Natural Science Foundation of Shandong Province(ZR2016FM19);the Taishan Scholar Project of Shandong Province(TSQN201812092);the Key Research and Development Program of Shandong Province(2019GGX101072,2019JZZY010115,2018GGX106006);the Youth Innovation Technology Project of Higher School in Shandong Province(2019KJN005)。
Embedded systems have numerous applications in everyday life.Petri-net-based representation for embedded systems(PRES+)is an important methodology for the modeling and analysis of these embedded systems.For a large co...
Supported by the National Natural Science Foundation of China(61866006,61741203);the Natural Science Foundation of Guangxi Province(2016GXNSFAA380243);the Guangxi Innovation-Driven Development of Special Funds Project(Gui Ke AA17204091);the Guangxi Nanning Science and Technology Development Planning Project(2018015-5)
In order to solve the parallel algorithm of Petri net system with concurrent function, so as to achieve the parallel control and simulation operation of this system, this paper proposes the function partition complete...
Supported by the National Natural Science Foundation of China(Nos.21361023 and 21461023)
Hydrothermal assembly of Co2+ ion, a bis-imidazole ligand BIMB(BIMB = 1,4-bis(imidazol-1-yl)benzene) and a rigid bidentate linker 2,6-naphthalenedicarboxylic acid(H2ndc), yields a novel three-dimensional(3D) ...
Sensitive data leak can cause significant loss for some organizations, especially for technology intensive companies and country security departments. Traditional mandatory access control (MAC) can only control whethe...
This paper was supported by the National Natural Science Foundation of China under Grant No. 60973144; the National Basic Research Program of China under Grant No. 2009CB320505.
In order to discover more detailed topol- ogy inforrmtion of a certain network, a fightweight approach is proposed, in which only one probe source is required. In this approach, a heuristic method in using the" trace...
A lot of technologies can be used in home control subnet, but the hardware and software resources available for the home control subnet are limited. There are security problems easily seen. The paper gives the system-...
In this paper, an autonomous subnet based structural methodology forbottom-up synthesis of Petri Nets for Flexible Manufacturing Systems is proposed.Furthermore, the theoretical analysis of the model constructed by th...