The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the a...The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.展开更多
With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system securit...With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM.展开更多
More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Ur...More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Urban air pollution is a serious environmental issue that poses adverse impacts on the health of people and the environment in most metropolitan areas. In this paper,we propose a geoinformatics augmented framework of environmental modelling and information sharing for supporting effective urban air pollution control and management. This framework is out-lined in terms of its key components and processes including: 1) an integrated,adaptive network of sensors for envi-ronmental monitoring; 2) a set of distributed,interoperable databases for data management; 3) a set of intelligent,robust algorithms and models for environmental modelling; 4) a set of flexible,efficient user interfaces for data access and in-formation sharing; and 5) a reliable,high capacity,high performance computing and communication infrastructure for integrating and supporting other framework components and processes.展开更多
With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision su...With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision support systems (DSS). To give an improved support to mobile business professionals, it is necessary to go further than just allowing a simple remote access to a Business Intelligence platform. In this paper, the need for actual context-aware mobile Geospatial Business Intelligence (GeoBI) systems that can help capture, filter, organize and structure the user mobile context is exposed and justified. Furthermore, since capturing, structuring, and modeling mobile contextual information is still a research issue, a wide inventory of existing research work on context and mobile context is provided. Then, step by step, we methodologically identify relevant contextual information to capture for mobility purposes as well as for BI needs, organize them into context-dimensions, and build a hierarchical mobile GeoBI context model which (1) is geo-spatial-extended, (2) fits with human perception of mobility, (3) takes into account the local context interactions and information-sharing with remote contexts, and (4) matches with the usual hierarchical aggregated structure of BI data.展开更多
In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theor...In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institutional design for sharing of information resources in rural areas as follows: firstly, establishing an administrative agency of rural information resources sharing, above the authority of all units, responsible for related work on sharing of information resources in rural areas; secondly, establishing and improving the positive and negative incentive mechanisms, to ensure the realization of sharing of information resources in rural areas.展开更多
The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ...The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.展开更多
Information Commons(IC,信息共享中心)是20世纪90年代国外高校图书馆为适应用户需求的变化而建立起来的一种新型的图书馆服务模式。本文阐明了IC兴起的背景及其发展和应用;分析了其构成要素和服务模式;从4个方面探讨了对我国图书馆的...Information Commons(IC,信息共享中心)是20世纪90年代国外高校图书馆为适应用户需求的变化而建立起来的一种新型的图书馆服务模式。本文阐明了IC兴起的背景及其发展和应用;分析了其构成要素和服务模式;从4个方面探讨了对我国图书馆的启示和借鉴作用。展开更多
Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when ...Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data.展开更多
Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by usi...Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by using the technology acceptance model (TAM) and information system success model as the theoretical foundation. The proposed model was empirically tested with the structural equation modeling technique based on data collected from a survey of 357 college students. Findings: The results show that 1) perceived ease of use, perceived usefulness and perceived playfulness all have a positive impact on the intention to use the Internet for acquiring information, 2) use context and system quality significantly influence perceived usefulness and perceived ease of use, and 3) service quality has a positive impact on perceived ease of use but not on perceived usefulness. Likewise information quality has no positive effect on perceived usefulness. Research limitations: The survey respondents were mainly from college students in Nanjing. We need to recruit college students in the western or other developing areas in China to further validate our findings. Practical implications: This study puts forward some feasible suggestions for university libraries to improve information organization and the use of digital library resources to better meet the needs of library users. Originality/value: This study provides insights into the understanding of the factors affecting college students' online information acquisition from multiple perspectives.展开更多
This study investigates the degree of capital mobility in a panel of 16 Latin American and 4 Caribbean countries during 1960 to 2017 against the backdrop of the Feldstein-Horioka hypothesis by applying recent panel da...This study investigates the degree of capital mobility in a panel of 16 Latin American and 4 Caribbean countries during 1960 to 2017 against the backdrop of the Feldstein-Horioka hypothesis by applying recent panel data techniques.This is the first study on capital mobility in Latin American and Caribbean countries to employ the recently developed panel data procedure of the dynamic common correlated effects modeling technique of Chudik and Pesaran(J Econ 188:393–420,2015)and the error-correction testing of Gengenbach,Urbain,and Westerlund(Panel error correction testing with global stochastic trends,2008,J Appl Econ 31:982–1004,2016).These approaches address the serious panel data econometric issues of crosssection dependence,slope heterogeneity,nonstationarity,and endogeneity in a multifactor error-structure framework.The empirical findings of this study reveal a low average(mean)savings–retention coefficient for the panel as a whole and for most individual countries,as well as indicating a cointegration relationship between saving and investment ratios.The results indicate that there is a relatively high degree of capital mobility in the Latin American and Caribbean countries in the short run,while the long-run solvency condition is maintained,which is due to reduced frictions in goods and services markets causing increase competition.Increased capital mobility in these countries can promote economic growth and hasten the process of globalization by creating a conducive economic environment for FDI in these countries.展开更多
Between states, between enterprises and enterprises, between people, it can be stated that credit is full of every corner of our lives. But the current lack of social credit is fundamental. Credit risk is particularly...Between states, between enterprises and enterprises, between people, it can be stated that credit is full of every corner of our lives. But the current lack of social credit is fundamental. Credit risk is particularly prominent. In the extensive data generation today, the information on personal credit statistics is very large, but still lack the data system processing and screening. Through the information retrieval of 200 credit information reports, this paper constructs the evaluation system of personal credit by using the basic information of the individual. The basic information of these individuals has great convenience in information collection and information statistics, and this basic information covers all aspects that are likely to result in the breach of contract. Through the use of single factor analysis and logistic model to solve the index system, you can not only find the impact of individual indicators on the degree of personal credit, but also see the overall impact of indicators on the degree of credit, that is, the weight of the indicators. Finally, four different credit ratings are divided by assigning the indicators to the scores. Credit rating can clearly measure the respective credit situation. Through the classification of these levels, measuring the credit line when a person in the individual credit operation, at the same time, it can provide reference and proval to administrative departments, which is benefit for managing credit risks. It has a substantial meaning and value in use. The solution to the rating system cannot only be applied to individuals, but also to the enterprises, with a wide range of versatility.展开更多
In this study, we use Chinese A-share stock market data from 1995 to 2005 to test the persistence of the size and valueeffect and the robustness of the Fama-French three-factor model in explaining the variation in sto...In this study, we use Chinese A-share stock market data from 1995 to 2005 to test the persistence of the size and valueeffect and the robustness of the Fama-French three-factor model in explaining the variation in stock returns.Wefind that the three-factor model can explain the common variation in stock returns well.However, it is mis-specifiedfor the Chinese stock market.We demonstrate that the size effect and the book-to-market effect are significant andpersistent over our sample period.Interestingly, the book-to-market effect for China is much stronger than the averageones in mature markets and other emerging markets documented by Fama and French (1998).Moreover, we find noevidence to support the argument that seasonal effects can explain the results of the multifactor model.Last, our mixedobservations on firm-specific fundamentals suggest that the risk-based explanation proposed by Fama and French(1995) cannot shed light on the size and BM effect for China.In view of the features of the Chinese stock market, weinstead argue that China’s size and book-to-market effect may be attributed to syndicate speculators’ manipulation andmispricing caused by irrational investor behavior.展开更多
Recently automotive nets are adopted to solve increasing problems in automotive electronic systems.Technologies of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch ...Recently automotive nets are adopted to solve increasing problems in automotive electronic systems.Technologies of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch weight and lack in module installation space.However,the multilayer automotive nets software becomes more and more complex,and the development expense is difficult to predict and to keep in check.In this paper,the modeling method of hierarchical automotive nets and the substitution operation based on object-oriented colored Petri net(OOCPN) are proposed.The OOCPN model which analyzes the software structure and validates the collision mechanism of CAN/LIN bus can speed the automobile system development.First,the subsystems are divided and modeled by object-oriented Petri net(OOPN).According to the sets of message sharing relations,the message ports among them are set and the communication gate transitions are defined.Second,the OOPN model is substituted step by step until the inner objects in the automotive body control modules(BCM) are indivisible and colored by colored Petri net(CPN).And the color subsets mark the node messages for the collision mechanism.Third,the OOCPN model of the automotive body CAN/LIN nets is assembled,which keeps the message sets and the system can be expanded.The proposed model is used to analyze features of information sharing among the objects,and it is also used to describe each subsystem real-time behavior of processing messages and implemental device controllers operating,and puts forward a reasonable software framework for the automotive body control subsystem.The research can help to design the communication model in the automotive body system effectively and provide a convenient and rapid way for developing the logical hierarchy software.展开更多
文摘The whole-process project cost management based on building information modeling(BIM)is a new management method,aiming to realize the comprehensive optimization and improvement of project cost management through the application of BIM technology.This paper summarizes and analyzes the whole-process project cost management based on BIM,aiming to explore its application and development prospects in the construction industry.Firstly,this paper introduces the role and advantages of BIM technology in engineering cost management,including information integration,data sharing,and collaborative work.Secondly,the paper analyzes the key technologies and methods of the whole-process project cost management based on BIM,including model construction,data management,and cost control.In addition,the paper also discusses the challenges and limitations of the whole-process BIM project cost management,such as the inconsistency of technical standards,personnel training,and consciousness change.Finally,the paper summarizes the advantages and development prospects of the whole-process project cost management based on BIM and puts forward the direction and suggestions for future research.Through the research of this paper,it can provide a reference for construction cost management and promote innovation and development in the construction industry.
文摘With the rapid development of network technology, the meaning of layers and attributes in respect of information system security must be extended based on the understanding of the concept of information system security. The layering model (LM) of information system security and the five-attribute model (FAM) based on security factors were put forward to perfect the description and modeling of the information system security framework. An effective framework system of risk calculation and assessment was proposed, which is based on FAM.
文摘More effective environmental pollution control and management are needed due to the increasing environ-mental impacts from a range of human activities and the growing public demands for a better living environment. Urban air pollution is a serious environmental issue that poses adverse impacts on the health of people and the environment in most metropolitan areas. In this paper,we propose a geoinformatics augmented framework of environmental modelling and information sharing for supporting effective urban air pollution control and management. This framework is out-lined in terms of its key components and processes including: 1) an integrated,adaptive network of sensors for envi-ronmental monitoring; 2) a set of distributed,interoperable databases for data management; 3) a set of intelligent,robust algorithms and models for environmental modelling; 4) a set of flexible,efficient user interfaces for data access and in-formation sharing; and 5) a reliable,high capacity,high performance computing and communication infrastructure for integrating and supporting other framework components and processes.
文摘With the requirements for high performance results in the today’s mobile, global, highly competitive, and technology-based business world, business professionals have to get supported by convenient mobile decision support systems (DSS). To give an improved support to mobile business professionals, it is necessary to go further than just allowing a simple remote access to a Business Intelligence platform. In this paper, the need for actual context-aware mobile Geospatial Business Intelligence (GeoBI) systems that can help capture, filter, organize and structure the user mobile context is exposed and justified. Furthermore, since capturing, structuring, and modeling mobile contextual information is still a research issue, a wide inventory of existing research work on context and mobile context is provided. Then, step by step, we methodologically identify relevant contextual information to capture for mobility purposes as well as for BI needs, organize them into context-dimensions, and build a hierarchical mobile GeoBI context model which (1) is geo-spatial-extended, (2) fits with human perception of mobility, (3) takes into account the local context interactions and information-sharing with remote contexts, and (4) matches with the usual hierarchical aggregated structure of BI data.
基金Supported by Soft Science Project of the Ministry of Science and Technology (2011GXS1D003)Soft Science Project of Chongqing Municipality (cstc2011cx-rkxB00008)
文摘In order to solve the issues concerning the cross-unit sharing of information resources in rural areas, we analyze the incentive problem of the sharing of information resources in rural areas using the incentive theory method; establish corresponding incentive mechanism model (It is divided into positive incentive model and negative incentive model, and only when the two models guarantee each other and are used at the same time can they be effective). Based on this, we put forward the institutional design for sharing of information resources in rural areas as follows: firstly, establishing an administrative agency of rural information resources sharing, above the authority of all units, responsible for related work on sharing of information resources in rural areas; secondly, establishing and improving the positive and negative incentive mechanisms, to ensure the realization of sharing of information resources in rural areas.
文摘The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.
基金supported by the National Nature Science Foundation of China(Grant No.71401052)the National Social Science Foundation of China(Grant No.17BGL156)the Key Project of the National Social Science Foundation of China(Grant No.14AZD024)
文摘Identification of security risk factors for small reservoirs is the basis for implementation of early warning systems.The manner of identification of the factors for small reservoirs is of practical significance when data are incomplete.The existing grey relational models have some disadvantages in measuring the correlation between categorical data sequences.To this end,this paper introduces a new grey relational model to analyze heterogeneous data.In this study,a set of security risk factors for small reservoirs was first constructed based on theoretical analysis,and heterogeneous data of these factors were recorded as sequences.The sequences were regarded as random variables,and the information entropy and conditional entropy between sequences were measured to analyze the relational degree between risk factors.Then,a new grey relational analysis model for heterogeneous data was constructed,and a comprehensive security risk factor identification method was developed.A case study of small reservoirs in Guangxi Zhuang Autonomous Region in China shows that the model constructed in this study is applicable to security risk factor identification for small reservoirs with heterogeneous and sparse data.
基金supported by the Special Fund for Fast Sharing of Science Paper in Net Era by the Chinese Ministry of Education, Science and Technology Development Center (Grant No.: FSSP2013044001)the Doctoral Fund of the Chinese Ministry of Education (Grant No.: 20130091110061)
文摘Purpose: This study intends to examine the factors that influence Chinese college students' use of the lnternet for acquiring information. Design/methodology/approach: This paper developed the research model by using the technology acceptance model (TAM) and information system success model as the theoretical foundation. The proposed model was empirically tested with the structural equation modeling technique based on data collected from a survey of 357 college students. Findings: The results show that 1) perceived ease of use, perceived usefulness and perceived playfulness all have a positive impact on the intention to use the Internet for acquiring information, 2) use context and system quality significantly influence perceived usefulness and perceived ease of use, and 3) service quality has a positive impact on perceived ease of use but not on perceived usefulness. Likewise information quality has no positive effect on perceived usefulness. Research limitations: The survey respondents were mainly from college students in Nanjing. We need to recruit college students in the western or other developing areas in China to further validate our findings. Practical implications: This study puts forward some feasible suggestions for university libraries to improve information organization and the use of digital library resources to better meet the needs of library users. Originality/value: This study provides insights into the understanding of the factors affecting college students' online information acquisition from multiple perspectives.
文摘This study investigates the degree of capital mobility in a panel of 16 Latin American and 4 Caribbean countries during 1960 to 2017 against the backdrop of the Feldstein-Horioka hypothesis by applying recent panel data techniques.This is the first study on capital mobility in Latin American and Caribbean countries to employ the recently developed panel data procedure of the dynamic common correlated effects modeling technique of Chudik and Pesaran(J Econ 188:393–420,2015)and the error-correction testing of Gengenbach,Urbain,and Westerlund(Panel error correction testing with global stochastic trends,2008,J Appl Econ 31:982–1004,2016).These approaches address the serious panel data econometric issues of crosssection dependence,slope heterogeneity,nonstationarity,and endogeneity in a multifactor error-structure framework.The empirical findings of this study reveal a low average(mean)savings–retention coefficient for the panel as a whole and for most individual countries,as well as indicating a cointegration relationship between saving and investment ratios.The results indicate that there is a relatively high degree of capital mobility in the Latin American and Caribbean countries in the short run,while the long-run solvency condition is maintained,which is due to reduced frictions in goods and services markets causing increase competition.Increased capital mobility in these countries can promote economic growth and hasten the process of globalization by creating a conducive economic environment for FDI in these countries.
文摘Between states, between enterprises and enterprises, between people, it can be stated that credit is full of every corner of our lives. But the current lack of social credit is fundamental. Credit risk is particularly prominent. In the extensive data generation today, the information on personal credit statistics is very large, but still lack the data system processing and screening. Through the information retrieval of 200 credit information reports, this paper constructs the evaluation system of personal credit by using the basic information of the individual. The basic information of these individuals has great convenience in information collection and information statistics, and this basic information covers all aspects that are likely to result in the breach of contract. Through the use of single factor analysis and logistic model to solve the index system, you can not only find the impact of individual indicators on the degree of personal credit, but also see the overall impact of indicators on the degree of credit, that is, the weight of the indicators. Finally, four different credit ratings are divided by assigning the indicators to the scores. Credit rating can clearly measure the respective credit situation. Through the classification of these levels, measuring the credit line when a person in the individual credit operation, at the same time, it can provide reference and proval to administrative departments, which is benefit for managing credit risks. It has a substantial meaning and value in use. The solution to the rating system cannot only be applied to individuals, but also to the enterprises, with a wide range of versatility.
文摘In this study, we use Chinese A-share stock market data from 1995 to 2005 to test the persistence of the size and valueeffect and the robustness of the Fama-French three-factor model in explaining the variation in stock returns.Wefind that the three-factor model can explain the common variation in stock returns well.However, it is mis-specifiedfor the Chinese stock market.We demonstrate that the size effect and the book-to-market effect are significant andpersistent over our sample period.Interestingly, the book-to-market effect for China is much stronger than the averageones in mature markets and other emerging markets documented by Fama and French (1998).Moreover, we find noevidence to support the argument that seasonal effects can explain the results of the multifactor model.Last, our mixedobservations on firm-specific fundamentals suggest that the risk-based explanation proposed by Fama and French(1995) cannot shed light on the size and BM effect for China.In view of the features of the Chinese stock market, weinstead argue that China’s size and book-to-market effect may be attributed to syndicate speculators’ manipulation andmispricing caused by irrational investor behavior.
基金supported by National Natural Science Foundation of China (Grant No. 60873003)
文摘Recently automotive nets are adopted to solve increasing problems in automotive electronic systems.Technologies of automotive local area network from CAN and LIN can solve the problems of the increasing of wire bunch weight and lack in module installation space.However,the multilayer automotive nets software becomes more and more complex,and the development expense is difficult to predict and to keep in check.In this paper,the modeling method of hierarchical automotive nets and the substitution operation based on object-oriented colored Petri net(OOCPN) are proposed.The OOCPN model which analyzes the software structure and validates the collision mechanism of CAN/LIN bus can speed the automobile system development.First,the subsystems are divided and modeled by object-oriented Petri net(OOPN).According to the sets of message sharing relations,the message ports among them are set and the communication gate transitions are defined.Second,the OOPN model is substituted step by step until the inner objects in the automotive body control modules(BCM) are indivisible and colored by colored Petri net(CPN).And the color subsets mark the node messages for the collision mechanism.Third,the OOCPN model of the automotive body CAN/LIN nets is assembled,which keeps the message sets and the system can be expanded.The proposed model is used to analyze features of information sharing among the objects,and it is also used to describe each subsystem real-time behavior of processing messages and implemental device controllers operating,and puts forward a reasonable software framework for the automotive body control subsystem.The research can help to design the communication model in the automotive body system effectively and provide a convenient and rapid way for developing the logical hierarchy software.