期刊文献+

基于Petri网的综合电子系统总线建模与性能优化 被引量:2

Modeling and Optimizing on the Bus of Integrated Electronic System Based on Petri Net
原文传递
导出
摘要 针对综合电子系统运用中总线效率不高等问题,以某型步兵战车综合电子系统为例,通过对系统进行信息流规划,结合总线协议和实现机制,采用赋时颜色Petri网对综合电子信息系统通信机制进行建模,实现综合电子系统总线通信协议机制的仿真。通过对系统总线性能指标参数的分析,提出综合电子信息系统总线的优化方案。关键词:赋时颜色Petri网;综合电子系统;总线建模; Aiming at the problem of low efficiency for application of integrated electronic system, taking integrated electronic system of some infantry vehicle for example, this paper programs the information flow of the system, integrating with its bus protocol and implementation mechanism, sets up a model of communication mechanism of the integrated electronic system based on Colored Timed Petri Net(CTPN) , and realizes the simulation of bus protocol of the system. Through analysis and study on bus performance parameters of the system, it puts forward optimization schemes of the bus protocol.
出处 《装甲兵工程学院学报》 2011年第5期38-43,共6页 Journal of Academy of Armored Force Engineering
基金 军队科研计划项目
关键词 赋时颜色Petri网 综合电子系统 总线建模 性能优化 Colored Timed Petri Net(CTPN) integrated electronic system bus modeling performance optimization
  • 相关文献

参考文献8

  • 1周娟,陈慧岩.CAN总线在军用车辆上的应用[J].车辆与动力技术,2001(4):47-51. 被引量:10
  • 2凌征均.坦克综合电子系统总体研究[J].车辆与动力技术,1998(3):28-36. 被引量:5
  • 3饶运涛.现场总线原理与应用技术[M].北京:北京航空航天大学出版社,2006:22.
  • 4罗志强.航空电子综合化系统[M].北京:北京航空航天大学出版社,2000.
  • 5韩咚,田银花.基于赋时颜色Petri网的NSSK协议建模[J].计算机技术与发展,2010,20(6):156-158. 被引量:3
  • 6Mulyar blA. Patterns in Colored Petri Nets [ EB/OL] (2005-04- 15 ) [ 2010-07-161. http ://wiki. daimi, au. dk/cpntools-help/.
  • 7Welters M. Building Logistic Games in CPN Tools [ EB/OL] (2005- 1-22) [ 2010-07-16 ]. http ://wiki. daimi, au. dk/cpntools-help/.
  • 8Nolte Thomas, Hansson Hans, Norstrm Christer. Minimizing CAN Response-time Jitter by Message Manipulation [ C ]/fRTAS' 02 Proceedings of the Eighth TEEE Real-Time and Embedded Technology and Applicatime Symposium. Washington D C:IEEE.

二级参考文献17

  • 1于谅,杨国振,周启煌.基于CAN总线的分布式火控仿真系统设计[J].火炮发射与控制学报,2000(1):15-19. 被引量:4
  • 2刘道斌,郭莉,白硕.基于Petri网的安全协议形式化分析[J].电子学报,2004,32(11):1926-1929. 被引量:5
  • 3靳瑞芳,张建军.基于密码学的身份签密研究[J].计算机技术与发展,2007,17(2):226-228. 被引量:3
  • 4Needham R,Schroeder M.Using Encryption for Authentica-tion in Large Networks of Computers[J].Communications of the ACM,1978,21(12):993-999.
  • 5张世永,网络信息安全[M].北京:科学出版社,2003.
  • 6Denning D,Sacco G.Timestamps in Key Distribution Proto-ools[J].Communications of the ACM,1981,24(8):523-536.
  • 7Coulouris G.Distributed systems concepts and design[M].[s.1.] Addison-Wesley,1996:477-617.
  • 8Marrero W,Clarke E,Jha S.A model checker for authentica-tion protocols[C] //DIMACS Workshop on Design and Formal Verification of Security Protocols.[s.1.] :[s.n.].1997.
  • 9HeeChul Moon.A study on formal specification and tanalysis of cryptographic protocols using Colored Petri Nets[D].Kore-a:Kwangju institute of science and technology,1998.
  • 10邬宽明.CAN总线原理和应用系统设计[M].北京:北京航空航天大学出版社,2000..

共引文献15

同被引文献13

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部