基于对等网络架构的新型控制系统研究与实现
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
分散控制系统(DCS)是确保工业生产安全可靠运行的神经中枢、运行中心和安全屏障不可或缺的重要组成部分。传统DCS以客户机/服务器、多级分层架构为基础,导致系统的集成依赖于复杂的中间件和通信机制,降低了系统的可靠性及安全性。而采用面向对象和嵌入式服务的设计理念,实现控制系统结构的扁平化、功能的分散,已经成为当代控制系统技术的发展方向。对等网络技术是实现控制系统数据服务分散、实现面向对象设计的关键技术。论文研究了基于对等网络(P2P)架构的新型控制系统及其资源管理方式、名字服务的资源定位等关键技术,以及在新架构下系统与网络的故障模式、故障影响等,这些关键技术的研究和应用提高了新型控制系统的可靠性及安全性。论文研究对于自主研制的自动化控制系统在我国核电、轨道交通、大型石油化工、火电等支柱产业的应用,具有重大的现实意义和学术价值。本文具体研究内容包括:
     1.针对基于C/S架构的控制系统存在的缺点,提出了基于对等网络架构的新型控制系统,对基于对等网络架构的控制系统的工作原理、通信机制进行了研究。通过与基于C/S架构的控制系统的对比,从可靠性、通信负荷、网络延迟、系统构建与维护、系统成本等方面分析基于对等网络架构的控制系统的优势及在新型控制系统研制中应关注的实时性、可靠性、安全性和资源管理机制等主要问题。
     2.针对控制系统应用中严格的实时性要求和高可靠、高安全性要求,研究了基于对等网络架构的控制系统的资源管理机制,提出了面向服务的SMCP名字服务模型和两级哈希表查找算法的资源搜索机制,能够高效、快速、安全的对控制系统数据资源进行管理和定位。
     3.针对基于对等网络架构的控制系统中的资源共享问题,研究了系统网络上位号资源库的分发机制,提出了资源库分块共享算法(TDBS),在实现控制系统资源共享的同时,既提高了系统的安全性,又提升了系统的可维护性。
     4.针对控制系统的故障模式和故障诊断问题,提出了基于模糊有色Petri网的对等网络控制系统的故障安全验证方法。在分析基于对等网络架构控制系统故障模式的基础上,通过智能推理,准确、有效地发现控制系统故障传播的关键路径,定位系统薄弱环节,从而为提高系统的可靠性奠定基础。
     5.在前述章节理论研究的基础上,研制了基于对等网络架构的新型控制系统—SUPMAX分散控制系统。通过第三方功能性能测试、工程验证,证明基于对等网络架构的新型控制系统在实时性、安全性、灵活性等方面均优于基于C/S架构的控制系统。
     基于对等网络架构的新型控制系统—SUPMAX分散控制系统在实际的工程项目中得到了成功应用,表明了本文提出的方法以及所研制的新型控制系统的可行性和有效性。
It is widely recognized now that digital control system is an important facility nec-essary to industrial process for guaranteeing safe and reliable operation. Based on the socalled client/server structure and multi-level network architecture, the sophisticated mid-ware and data link are widely used in the existing distributed control system (DCS), whichmay degrade the reliability and safety of the system. In this decade, the design philoso-phy, such as object oriented and server embedded, pops up and makes the functionalityof DCS upgrade. With such philosophy, the infrastructure of DCS is getting more ?at,and its functionality more distributed. Specially, the peer to peer (P2P) network supportssuch kind of design methodology. This work focuses the techniques coming out of theDCS based on P2P networks. Especially, the implementation technique, failure modesand their effects on safety and reliability of the system are considered. The newly de-veloped DCS based on the techniques proposed well demonstrates the design matchingthe goal. Needless to say, successfully development of the control facility will improvethe applicability of the native DCS products to the safety important industrial processes,nuclear power plant, large scale petrochemical industry, for examples. The contributionsof the work are listed as following.
     1. It is known that the traditional control systems based on client/server (C/S) archi-tecture are getting to face some bottlenecks for improving their real-time, reliabilityand safety. This work proposes a new methodology based on the so called peer-to-peer (P2P) to construct the digital control system, which makes the structure of thesystem more ?at and distributed. In this work, the principle and communicationmechanism of the control system based on P2P are explored. Especially, compar-ing with the traditional control systems based on C/S structure, the proposed onedemonstrates high qualities on reliability, link load and delay, maintainability andcost-efficiency.
     2. Considering the issues mentioned above, network resource management strategyfor the control system developed is set up. In this work, the searching mechanismbased on the name service and two-level Harsh searching algorithm is proposed.Site applications well illustrated the efficiency, realness and safety of the controlproposed.
     3. The despatching mechanism for tag-list resource on the network is set up to enableresource sharing in the control system. Especially, the block sharing algorithm of resource library (TDBS) is proposed to improve the safety and maintainability ofthe system.
     4. Based on exploring the failure mode of the control system developed, based on thefuzzy colored Petri net, a method for verifying fail-safe of the peer-to-peer controlsystem is proposed. Through analyzing the failure mode and intelligent reasoning,some critical routing of the failure propagation in the control systems is detectedcorrectly and effectively. Therefore, the weakness of the control systems could befound out and the innovative approach could be adopted correspondingly.
     5. A new type control system based on peer-to-peer architecture, named as SUPMAX,is developed and tested. It is well proven that this new type control system based onthe P2P architecture has some nice features over the ones based on C/S architecture,including real-time performance, operating safety, maintenance convenience andetc..
     The site application of the SUPMAX control system well demonstrated the feasibil-ity of the methodology based on P2P network to upgrade the control systems for safetyimportant industrial.
引文
[1] IEC Standard 61508,电气/电子/可编程电子安全系统的功能安全,International Electrotech-nical Commission,2000.
    [2] Boggia G.,Camarda P.,Grieco L.A.,Zacheo G.,Toward wireless Networked Control Sys-tems: An experimental study on real-time communications in 802.11 WLANs,Factory Com-munication Systems,2008. WFCS 2008. IEEE International Workshop on 21-23 May 2008Page(s):149 - 155
    [3]赵海,现场总线网络控制系统FCS,电子科技导报,(7):5-9,1996.
    [4] IEC Standard 61158,Digital data communication for measurement and control—Fieldbus foruse in industrial control systems,International Electrotechnical Commission,2007.
    [5] G. Schickhuber and O. McCarthy,Distributed Fieldbus and Control Network Systems. Comput-ing & Control Engineering Journal,8(1):21-32,1997.
    [6] Glanzer D.A.,Foundationˉeldbus technical overview,http://www.ˉeldbus.org/ gener-alassembly/techoverview.pdf,2003.
    [7]冯冬芹,金建祥,褚健,工业以太网关键技术初探,信息与控制,2003,32(3): 219-224.
    [8]冯冬芹,彭圣嘉,李杰,金建祥,工业以太网最新进展,自动化博览(二十周年纪念文集),2003: 102-105.
    [9]唐鸿儒,丁伟,现场控制网络技术展望.测控技术,19(12):1-4,2000.
    [10]冯晓东,基于工业以太网的网络控制系统及其应用,上海:上海交通大学,2003.
    [11] Walsh G.C.,Ye H. and Bushnell L.G.,Stability analysis of networked control systems,IEEETrans. Contr. Syst. Tech.,2002,10: 438-446.
    [12] Zhang W.,Stability Analysis of Networked Control Sys-tems,http://dora.cwru.edu/msb/pubs/wxzPHD.pdf,Oct 4,2001.
    [13]白涛,网络化控制系统性能分析与调度优化(博士论文),上海交通大学,2005.
    [14] IEEE Standard,IEEE 802.1p:LAN Layer 2 QoS/CoS Protocol for Traffic Prioritiza-tion,Institute of Electrical and Electronics Engineers.
    [15] L. Lo Bello and Mirabella,O,Design issues for Ethernet in automation. In the 8th Inter-national Conference on Emerging Technologies and Factory Automation,Antibes Juan-les-pins,France,213-221,2001.
    [16]沈鑫刻,交换式以太网原理、技术和实现,北京:人民邮电出版社,1999.
    [17] J. Baillieul and Antsaklis P.J.,Control and Communication Challenges in Networked Real-TimeSystems,Proc. of IEEE,95(1):9-28,2007.
    [18] Y. Chen,A. Wei,Z. Xu,Distributed Monitoring and Real-Time Control Systems via Ether-net,Intelligent Control and Automation,Sixth World Congress,2(21-23):6657-6660,2006.
    [19] J. R. Moyne and Tilbury D.M.,The Emergence of Industrial Control Networks for Manufactur-ing Control,Diagnostics,and Safety Data,Proc. of IEEE,95(1):29-47,2007.
    [20] L. Schenato,Sinopoli B.,Franceschetti M.,Poolla K.,Sastry S.S.,Foundations of Controland Estimation Over Lossy Networks,Proc. of IEEE,95(1):163-187,2007.
    [21] Y. Zhu,Zheng G.,Liu G.,System Architecture Design of Supervisory Software for Net-worked Control Systems,Control Conference,555 - 560,2007.
    [22] Yang Li,Guan Xinping,Luo Xiaoyuan,Ye Caihong,The high performance controller de-sign for Networked Control Systems with Multi-packet Transmission,Proceedings of the 27thChinese Control Conference July 16-18,2008,Kunming,Yunnan,China,Page(s):511-515
    [23] Yang T.C.,Fei M.R.,Xue D.Y.,Yu,H.N.,Some Issues in the Study of Networked Con-trol System Yang,Decision and Control,2006 45th IEEE Conference on 13-15 Dec. 2006Page(s):5604 - 5608
    [24]张韬,IP QoS集成服务模型和区分服务模型的分析与研究.湖南冶金职业技术学院学报.6(2):234-237
    [25]李晓莉,郭宇春. QoS技术中令牌桶算法实现方式比较.中兴通讯技术2007年月第13卷第3期
    [26] S.BLAKE,D.Black,M.Carlson. An Architecture for Differentiated Services.http://www.faqs.org/rfcs/ rfc2475.htm. December 1998.
    [27] J. Heinanen and Guerin R., IETF RFC 2697: As ingle rate three color marker[R]. Philadel-phia,PA,USA: University of Pennsylvania,1999.
    [28] Seok-Kyu Kweon, Cho M.G.,Shin K.G., Soft real-time communication over Ethernet withadaptive traffic smoothing. Parallel and Distributed Systems,IEEE Transactions on Volume15,Issue 10,Oct. 2004 Page(s):946 - 959.
    [29] Seok-Kyu Kweon,Shin K.G., Statistical real-time communication over Ethernet . Parallel andDistributed Systems,IEEE Transactions on Volume 14,Issue 3,March 2003 Page(s):322 -335.
    [30] Rene L. Cruz, A Calculus for Network Delay,Part I: Network Elements in Isolation. IEEETRANSACTIONS ON INFORMATION THEORY,VOL. 37. NO. I ,JANUARY 1991 p114-131.
    [31] Rene L. Cruz, A Calculus for Network Delay,Part II: Network Analysis. IEEE TRANSAC-TIONS ON INFORMATION THEORY. 37(I):132-141,1991
    [32] Lo Bello L.,Mirabella O.,Analysis and comparison of different interconnection solutions forswitched Ethernet networks. Factory Communication Systems,2000. Proceedings. 2000 IEEEInternational Workshop on 6-8 Sept. 2000 Page(s):221 - 230,2000.
    [33] G.C. Walsh,Asymptotic behavior of nonlinear networked control systems,IEEE Transactionson Automatic Control,46(7):1093-1097,2001.
    [34] Siemens. SPPA-T3000 User Guide. 2006.
    [35]国务院,国务院关于加快振兴装备制造业的若干意见,2006年3月.
    [36]国家发展与改革委员会,核电中长期发展规划(2005-2020),2007年11月.
    [37]对等网络编写组,对等网络(P2P),人民邮电出版社,2007.
    [38]郑纬民,胡进锋,代亚非等,对等计算研究概论,技术发展年度报告,中国计算机学会2004. http://www.ccf.org.cn
    [39] Napster Inc. http://www.napster.com
    [40] Freenet Project http://freenet.sourceforge.net
    [41] Gnutella Project http://www.gnutelliums.com
    [42] eDonkey http://www.edonkey.com
    [43] KaZaA,http://www.kazaa.com
    [44] Inc B.Bittorent http://www.bittorrent.com
    [45] D. P. Anderson,Cobb J.,Korpella E.,et al. SETI@home: an experiment in public-resourcecomputing. Communications of ACM 2002,45(11):56-61,2002.
    [46] Bellini P.,Bruno I.,Cenni D.,Nesi P.,Rogai D.,P2P Architecture for Automated B2BCross Media Content Distribution,Automated Production of Cross Media Content for Multi-Channel Distribution,2007. AXMEDIS’07. Third International Conference on 28-30 Nov. 2007Page(s):105 - 112
    [47] Min Yang,Yuanyuan Yang,An efficient hybrid peer-to-peer system for distributed data shar-ing,Parallel and Distributed Processing,2008. IPDPS 2008. IEEE International Symposium on14-18 April 2008 Page(s):1 - 10
    [48] Kothapalli K.,Scheideler C.,Supervised peer-to-peer systems,Parallel Architec-tures,Algorithms and Networks,2005. ISPAN 2005. Proceedings. 8th International Sym-posium on 7-9 Dec. 2005 Page(s):6,2005.
    [49] M. Ulrich,Y. Matt,G. Alain,Running the Windows P2P Infrastructure on Mo-bile Phones,Peer-to-Peer Computing,Seventh IEEE International Conference,2-5:245-246,2007.
    [50] H. Sumino,Ishikawa N.,Kato T.,Design and implementation of P2P protocol for mobilephones,Pervasive Computing and Communications Workshops,Fourth Annual IEEE Interna-tional Conference,13-17:6,2006.
    [51] S. Androutsellis-Theotokis and D. A. Spinellis,Survey of peer-to-peer File Sharing Technolo-gies. White paper,Electronic Trading Research Unit(ELTRUN),Athens University of Eco-nomics and Business,2002. http://citeseer.ist.psu.edu/androutsellis-theoto02survey.html
    [52] S. Ratnasamy,Francis P.,Handley M.,Karp R. and Shenker S. A. Scalable Content-Addressable Network,Proceddings of the ACM SIGCOMM 2001 Conference on Applica-tions,Technologies,Architectures,and Protocols for Computer Communication,161-172.San Diego,CA,ACM Press,2001.
    [53] S.M.Lui and S.H.Kwok. Interoperability of peer-to-peer file sharing protocols. ACM SIGecomExchanges,3(3):25-33,August 2002.
    [54] Schloss H.,Botev J.,Hohfeld A.,Scholtes I.,Oechsle R.,Esch M.,HiOPS overlay - ef-ficient provision of multicast in peer-to-peer systems,Networks,2008. ICON 2008. 16th IEEEInternational Conference on 12-14 Dec. 2008 Page(s):1-6,2008.
    [55] Donghua Pan,Jiangning Wu,Zhijiang Wang,A query routing scheme based on the hierar-chically indexed DHT for hybrid peer-to-peer search,Information and Automation,2008. ICIA2008. International Conference on 20-23 June 2008 Page(s):743 - 748 2.3.
    [56] Zhou S.,Rogers G.,Hogan M.,Ardon S.,Hu T.,Seneviratne A.,An Incentive BasedRouting Algorithm for Improving Message Forwarding in Structured Peer-to-Peer Networks Wire-less Broadband and Ultra Wideband Communications,2007. AusWireless 2007. The 2nd Inter-national Conference on 27-30 Aug. 2007 Page(s):58 - 58,2007.
    [57] Koo S.G.M., Lee C.S.G.,Kannan K.,A genetic-algorithm-based neighbor-selection strategyfor hybrid peer-to-peer networks,Computer Communications and Networks,2004. ICCCN2004. Proceedings. 13th International Conference on 11-13 Oct. 2004 Page(s):469 - 474
    [58] Michael Dougherty,Haklin Kimm,Ho-sang Ham,Implementation of the DistributedHash Tables on Peer-to-peer Networks,Sarnoff Symposium,2008 IEEE 28-30 April2008,Page(s):1 - 5
    [59] Jimeno M.,Christensen K.,P2P directory search: Signature Array Hash Table Local Com-puter Networks,2008. LCN 2008. 33rd IEEE Conference on 14-17 Oct. 2008 Page(s):506 - 508
    [60] I. Stoica,R.Morris,D. Karger,M.F.Kaashoek,and H. Balakrishman,Chord: A scalablepeer-to-peer lookup service for Internet applications,IEEE/ACM Transactions on Network-ing,11(1):17-32,2003
    [61] Antony Rowstron and Peter Druschel,Pastry: Scalable,distributed object location androuting for large-scale peer-to-peer systems,In Proceedings of IFIP/ACM Middleware2001,Heidelberg,Germany,Nov. 2001
    [62] B.Y.Zhao,J.D.Kubiatowicz,and A.D. Joseph,Tapestry: An infrastructure for fault resilientwide-area location and routing Technical Report UCB//CSD-01-1141,U.C.Berkeley,2001.
    [63] David Karger,Eric Lehman,Tom Leighton,Matthew Levine,Daniel Lewin,Rina Pani-grahy,Consistent Hashing and Random Trees: Distributed Caching Protocols for Relieving HotSpots on the World Wide Web. Proceedings of the 29th Annual ACM Symposium on Theory ofComputing,pp.654-663.
    [64] Rongmei Zhang,Hu Y.C.,Assisted Peer-to-Peer Search with Partial Indexing,IEEE Trans-actions on Parallel and Distributed Systems,18(8):1146 - 1158,Aug. 2007.
    [65] Bin Dai,Furong Wang,Yun Tian,Improvement of Network Load and Fault-Tolerant of P2PDHT Systems,Information Technology: Research and Education,2006. ITRE’06. Interna-tional Conference on 16-19 Oct. 2006 Page(s):187 - 190,2006.
    [66] Wu C.,Li B.,Diverse: application-layer service differentiation in peer-to-peer communica-tions,Selected Areas in Communications,IEEE Journal on Volume 25,Issue 1,Jan. 2007Page(s):222 - 234,2007.
    [67] T. Chujo,Modeling Internet Traffic for Network Planning and Provisioning,Proc. 7th AsiaPacific Network Operations and Management Symposium(APNOMS’03),Oct. 2003.
    [68] C. Fraleigh,S. Moon,B. Lyles,C. Cotton,M. Khan,R. Rockwell,D. Moll,T.Seely,and C. Diot,Packet-level Traffic Measurements from the Sprint IP Backbone,IEEENetwork Magazine,17(6),pp. 6-16,Nov. 2003.
    [69] B. Cohen,Incentives Build Robustness in Bittorent,Proc. P2P Economics Workshop,2003.
    [70] X. Yang and G. de Veciana,Service Capacity of Peer-to-Peer Networks,Proc. IEEE INFO-COM,2004.
    [71] J. A. Pouwelse,P. Garbacki,D. H. J. Epema,and H.J.Sips,The Bittorrent P2P File-SharingSystem: Measurements and Analysis,Proc. 4th International Workshop on Peer-to-Peer Sys-tems(IPTPS’05),Feb. 2005.
    [72] Chi-Jen Wu,Cheng-Ying Li,Jan-Ming Ho,Improving the Download Time of BitTorrent-Like Systems,Communications,2007. ICC’07. IEEE International Conference on 24-28 June2007 Page(s):1125 - 1129.
    [73] Wu Chehai,Lu Xianliang,Duan Hancong,Tang Hui,Zhou Xu,Zhao Zhijun,Analysis ofContent Availability Optimization in BitTorrent,Hybrid Information Technology,2006. ICHIT’06. International Conference on Volume 1,9-11 Nov. 2006 Page(s):525 - 529
    [74] Minglu Li,Jiadi Yu,Jie Wu,Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Sys-tems: Modeling Analysis and Improvement,Parallel and Distributed Systems,IEEE Transac-tions on Volume 19,Issue 7,July 2008,Page(s):954 - 966.
    [75] Dale C.,Jiangchuan Liu,A Measurement Study of Piece Population in BitTorrent,GlobalTelecommunications Conference,2007. GLOBECOM’07. IEEE 26-30 Nov. 2007 Page(s):405 -410 Digital Object Identifier 10.1109/GLOCOM.2007.82
    [76] Guo L.,Chen S.,Xiao Z.,Tan E.,Ding X.,Zhang X.,A performance Study ofBotTorrent-like Peer-to-Peer Systems,Selected Areas in Communications,IEEE Journal onVolume 25,Issue 1,Jan. 2007 Page(s):155 - 169
    [77] Jiayin Qi,Hongli Zhang,Zhenzhou Ji,Liu Yun,Analyzing BitTorrent Traffic Across LargeNetwork,Cyberworlds,2008 International Conference on 22-24 Sept. 2008 Page(s):759 - 764
    [78] Costa F,Silva L.,Kelley I.,Fedak G.,BT Optimizing the data distribution layer of BOINCwith BitTorrent,Parallel and Distributed Processing,2008. IPDPS 2008. IEEE InternationalSymposium on 14-18 April 2008 Page(s):1 - 8
    [79] D. Qiu and R. Srikant,Modeling and Performance Analysis of Bittorent-like Peer-to-Peer Net-works,Proc. ACM SIGCOMM,Portland,OR,August 2004.
    [80] Yingchun Lei,Litang Yang,Qi Jiang,Chanle Wu,ShareStorm Experimental Views onNeighbor Selection in BitTorrent,Network and Parallel Computing Workshops,2007. NPCWorkshops. IFIP International Conference on 18-21 Sept. 2007 Page(s):813 - 818
    [81] Harrington,Corey Kuwanoe,Cliff C. Zou,A BitTorrent-driven distributed Denial-of-ServiceAttack,Security and Privacy in Communications Networks and the Workshops,2007. Se-cureComm 2007. Third International Conference on 17-21 Sept. 2007 Page(s):261 - 268.
    [82] Rouibia Soufiane,Vayn Jonathan,Beauvais Olivier,Urvoy-Keller Guillaume,Early StageDenial of Service Attacks in BitTorrent: An Experimental Study,Workshop on Enabling Tech-nologies: Infrastructure for Collaborative Enterprises,2008. WETICE’08. IEEE 17th 23-25 June2008,Page(s):141 - 142.
    [83] Barcellos M.P.,Bauermann D.,Sant’Anna H.,Lehmann M.,Mansilha R.,Protecting Bit-Torrent: Design and Evaluation of Effective Countermeasures against DoS Attacks,ReliableDistributed Systems,2008. SRDS’08. IEEE Symposium on 6-8 Oct. 2008,Page(s):73 -82.
    [84] Baohua Wei, Fedak G., Cappello F.,Collaborative Data Distribution with BitTorrent for Com-putational Desktop Grids Parallel and Distributed Computing,2005. ISPDC 2005. The 4th Inter-national Symposium on 4-6 July 2005 Page(s):250 - 257.
    [85] Ekler P.,Kelenyi I.,Charaf H.,BT BitTorrent at Mobile Phones,Consumer Communica-tions and Networking Conference,2008. CCNC 2008. 5th IEEE 10-12 Jan. 2008 Page(s):1214 -1215.
    [86] Meulpolder M.,Epema D.H.J.,Sips H.J.,Replication in bandwidth-symmetric BitTorrentnetworks,Parallel and Distributed Processing,2008. IPDPS 2008. IEEE International Sympo-sium on 14-18 April 2008 Page(s):1 - 8
    [87] Martin James J.,Westall James M.,Assessing the impact of BitTorrent on DOCSIS net-works,Broadband Communications,Networks and Systems,2007. BROADNETS 2007.Fourth International Conference on 10-14 Sept. 2007 Page(s):423 - 432
    [88] Binbin Ruan,Wei Xiong,Hao Chen,Dejian Ye,Improving Locality of BitTorrent with ISPCooperation,Electronic Computer Technology,2009 International Conference on 20-22 Feb.2009 Page(s):443 - 447
    [89] Costa-Montenegro E.,Burguillo-Rial J.C.,Rodriguez-Hernandez P.S.,Gonzalez-CastanoF.J.,Curras-Parada M.,Gomez-Rana P.,Rey-Souto J.P.,Multi-Agent System Model of aBitTorrent Network,Software Engineering,Artificial Intelligence,Networking,and Paral-lel/Distributed Computing,2008. SNPD’08. Ninth ACIS International Conference on 6-8 Aug.2008 Page(s):586 - 591
    [90] Taddia C.,Mazzini G.,A multicast-anycast based protocol for trackerless BitTor-rent,Software,Telecommunications and Computer Networks,2008. SoftCOM 2008. 16th In-ternational Conference on 25-27 Sept. 2008 Page(s):264 - 268.
    [91] Zhu Qiang, Chen Kai, and Fei Minrui, Research of Networked Control System Based on P2PNetwork, IEEE ICESS, 2009, Page(s):581-586
    [92] Zhu Qiang, Chen Kai, Fei Minrui, Auto Distribution of Tag Table in P2P Control System, Journalof Donghua University(Eng. Ed.) Vol.27, No.2(2010), Page(s):277-280
    [93]袁崇义,Petri网原理,电子工业出版社,1998.
    [94]吴哲辉,Petri网导论,机械工业出版社,2006.
    [95] T. Mutata,Petri Nets: Properties Analysis and Applications. Proc. Of the IEEE,1989,77(4)
    [96] M. Iordache and Antsaklis P. J.,Supervisory Control of Concurrent Systems A Petri Net Struc-tural Approach. Boston,MA: Birkhauser,2006.
    [97]徐宗昌,保障性工程,北京:兵器工业出版社,2002.
    [98]杜军威,徐中伟,Petri网模型的FTA安全性分析,计算机工程,33(13),Page(s):16-18&48,2007.
    [99]刘心,印桂生,张磊,基于FRPN的水下机器人故障诊断,计算机工程与应用,46(19),Page(s):217-219,2010.
    [100]陈静,陈红梅,高寒,基于Petri网的Tapestry系统性能评价,舰船电子工程,28(12),Page(s):118-120&184,2008.
    [101] Xu Ping,Ma Qishuang,The fault diagnosis of aircraft generator using Fuzzy Petrinet,Power and Energy Engineering Conference (APPEEC),2010 Asia-Pacific ,Page(s):1-4,2010.
    [102] Lan Jingchuan,Ma Min,Fault Diagnosis Method of Power System Based on the AdaptiveFuzzy Petri Net,Testing and Diagnosis,IEEE Circuits and Systems International Conferenceon Digital 2009,Page(s): 1 - 4
    [103] Qunming Li,Ling Zhu,Zhen Xu,Fuzzy Petri-Nets Based Fault Diagnosis for Mechani-cal - electric Equipment,Control and Automation,IEEE International Conference on Digital2007,Page(s): 2539 - 2543
    [104] Chi-Chung Tao,Tsung-Chin Lin,Safety Analysis of Level Crossing Surveillance SystemsUsing Fuzzy Petri Nets,Information Management,Innovation Management and Industrial En-gineering,International Conference on Volume: 1 Digital 2008,Page(s): 354 - 357
    [105] El Meliani J.,Nabli L.,Hassani M.,Monitoring and assistance diagnosis of a centrifugepump by using the fuzzy Petri nets,Computers & Industrial Engineering,International Confer-ence on 2009,Page(s): 1568 - 1573
    [106] Yang Jian-wei,He Zheng-you,Tan Xi-jing,Zeng Qing-feng,A Distributed Fault Diagno-sis Approach in Power System Based on Fuzzy Reasoning Petri Net,Power and Energy Engi-neering Conference (APPEEC), 2010, Page(s): 1 - 4
    [107] Jie Yuan, Chang Liu, Bo Jiang, Yugang Shan, Wenli Shang, A forward concurrent reasoning ap-proach for rule-based systems using fuzzy colored Petri nets, Intelligent Control and Automation(WCICA), 2010 8th World Congress on, Page(s): 1579 - 1584
    [108] Yan Huaizhi, Hu Changzhen, Huimin Huimin, Multi-sensor information intelligence fusionmodel using fuzzy colored Petri Nets, Intelligent Control and Automation, WCICA 2004, Page(s):3072 - 3075 Vol.4