1. Introduction
Embedded systems are used in diverse contexts from automobiles to communication systems, home appliances, and the Internet of Things, and are becoming more and more complex with increasing requirements. Therefore, higher requirements are put forward for the reliability, correctness, and timing of the embedded system, so it is important to focus on both how to model embedded systems and how to guarantee their correctness.
In the literature, there exist many models to represent embedded systems [
1,
2], such as finite state machines [
3], data flow graphs [
4], Petri nets [
5], and communicating processes [
6], etc. These formal modeling methods describe the characteristics of embedded systems from different aspects, but do not form a unified standard. Petri net has a formal mathematical definition and standardized derivation rules, which is a more standardized formal modeling method.
Ordinary Petri nets can describe systems with features such as concurrency, conflict, and uncertainty. However, there are several drawbacks when it comes to modeling embedded systems: ordinary Petri nets have no hierarchical structure, lack the notion of time, and have a limited ability to describe data flows. In order to overcome these drawbacks, several extended Petri nets for an embedded system’s modeling have been proposed, such as colored Petri net [
7], logical delay Petri net, time Petri net [
8], hybrid Petri net, fuzzy Petri net, PRES+ (Petri net-based Representation for Embedded Systems) [
9], etc. These extended forms of Petri nets start from different application requirements and improve the ability to model and analyze embedded systems.
Among them, PRES+ is an extended Petri net, and has previously been presented to represent embedded systems. Based on PRES+, Cortés et al. [
9] proposed a computation model for embedded systems and gave a method to solve the formal verification problem of the PRES+ model. Karlsson et al. [
10] proposed a verification approach for the PRES+ by using a divide-and-conquer approach. In order to enhance the verification effectiveness of PRES+, Xia [
11] presented transition refinement method. A sharing synthesis approach for PRES+ is presented in [
12]. Under certain constraints, the synthesis PRES+ will preserve boundedness and liveness. A more formal successor marking definition of PRES+ is proposed in [
13]. In order to analyze complex embedded systems, Xia et al. [
14] proposed two kinds of transition synthesis methods for PRES+.
Although PRES+ can represent the embedded system at different levels, capture the real-time information of the embedded system, and describe the uncertainty of the system, the PRES+ model cannot describe the priority of events, and cannot fully express the complex data flow and control flow.
Adding inhibitor arcs to Petri nets can improve the analysis ability of Petri nets [
15]. The Petri net with inhibitor arcs not only has the ability of zero detection, but also can simulate any random access machine. Inhibitor arcs can be used to control the sequence of transitions and describe the priority relationship between events. In embedded systems, some transitions occur successively under certain conditions, which affect the expression of data flow and control flow. Therefore, it is necessary to introduce inhibitor arcs. In order to improve the modeling and analysis ability of PRES+, we add inhibitor arcs into PRES+, and obtain PIRES+ (Petri net with Inhibitor arcs-based Representation for Embedded Systems).
However, when large complex embedded systems are modeled by PIRES+, the state space explosion problem is a major disadvantage for PIRES+. In the literature, many authors have investigated Petri net transformation methods to mitigate the problem of state space explosion. The three popular transformations of Petri net are refinement [
11,
16,
17,
18,
19,
20,
21,
22,
23,
24,
25,
26,
27,
28,
29], reduction [
30,
31,
32,
33], and synthesis [
12,
14,
34,
35,
36,
37,
38,
39].
Petri net-based refinement is an important method to system design and verification. As for refinement, Huang et al. [
16] presented several refinement conditions to preserve 19 properties for Place/Transition Petri nets. Padberg et al. [
17] provided a thorough survey of refinements based on several nets, namely place/transition nets, predicate/transition nets, and elementary nets. For colored Petri nets (CPNs), Lakos et al. [
18] gave three types of refinement: node refinement, type refinement, and subnet refinement. Mejía et al. [
19] presented a refinement process for extended attribute time place Petri nets. For workflow nets, Hee et al. [
20] proposed several refinement rules which preserve soundness under certain conditions. Li et al. [
21] defined algebraic steps for refinement and reduction, and investigated the Petri net property preservation. Xia [
22] proposed a place type refinement method for ordinary Petri nets. Under certain conditions, liveness, boundedness, and reversibility of these refined nets are preserved.
A top-down methodology achieves a formal specification of the logic control structure, refines the model so that more system operation details can be included, and consequently implements the control at a physical level [
23]. Choppy et al. [
24] investigated a refinement method of colored Petri net subclass and proved the correctness of this method. For a kind of well-behaved Petri net, Ding et al. [
25] proposed a refinement approach. Wang et al. [
26] proposed a refinement approach which may not require reachability analysis. For systems specified in Elementary Net Systems, Bernardinello et al. [
27] presented a refinement method for distributed systems. Lacheheub et al. [
28] focused on analyzing the transformation of the business process (BP) to the Petri net and gave the transition refinement operation to verify soundness, liveness, and boundedness. Based on the UML state machine and the Petri net model, Łabiak et al. [
29] presented a design of digital controllers. Petri nets were applied for macroplaces’ hierarchy and some elements of modularity.
Cortés et al. [
9] extended PRES+ by introducing the definition of hierarchy and proposed some concepts of equivalence for the PRES+ model. A strong refinement and a wake refinement of a certain transition were presented. These refinements preserve equivalence. In [
11], we extended the concepts of refinement in [
9] and investigated transition refinement approaches for PRES+.
In order to model, analyze, and verify large complex embedded systems, and to resolve PIRES+’s state space explosion problem, the main contributions of this work include: (1) refinement methods for PIRES+ are proposed; (2) the property preservation of the refinement methods is investigated.
Compared with several refinement methods for ordinary Petri nets [
16,
22], Colored Petri nets [
18], and PRES+ [
9,
11], the refinement methods for PIRES+ can nicely describe the characteristics of embedded systems.
Specifically, we first give the refinement approaches for PIRES+, and then investigate their property preservations. Under some constraints, reachability, timing, functionality, liveness, and boundedness of PIRES+ are preserved. Since these refinement methods can preserve these important properties, there is no need for using reachability analysis when the PIRES+ model is expanded. Thus, these refinement approaches can mitigate PRES+’s state space explosion problem.
The rest of the paper is structured as follows. Basic notions of PIRES+ are presented in
Section 2.
Section 3 proposes the refinement methods of PIRES+.
Section 4 investigates reachability, functionality, and timing preservation.
Section 5 studies the preservation of boundedness and liveness of PIRES+.
Section 6 illustrates the efficiency of the PIRES+ refinement methods with an applicable example. We conclude by summarizing the contributions of the refinement technique in
Section 7.
2. Basic Notions of PIRES+
In the following, we add inhibitor arcs into PRES+, and obtain PIRES+. The PIRES+ model can capture an embedded system’s timing aspects and obtain both control and data information which fully express complex data flow and control flow.
Definition 1. A Petri net with inhibitor arcs is a five-tuple, whererepresents a net,is the initial marking,is a set of inhibitor arcs,.
Figure 1 shows an example of the Petri net with inhibitor arcs. For example, there are inhibition arcs
in
Figure 1. The initial marking is [1,0,1,0,0,0]
T. At the initial marking
, for transitions
and
,
. Since
and
,
is not an enabled transition. At the same time,
, and
,
is an enabled transition.
Definition 2. Ref. [
9]
A PRES+ model is , where , , ……, is a finite non-empty set of places, , ,……, is a finite non-empty set of transitions, is a finite non-empty set of input arcs, is a finite non-empty set of output arcs, and is the initial marking, is a token, where is the token value, and is the token time. The inhibitor arcs are added to the PRES+, the PIRES+ (PRES+ with inhibitor arcs) is obtained.
Definition 3. is a PIRES+ model, where,, ……,is a finite non-empty set of places,,,……,is a finite non-empty set of transitions,is a finite non-empty set of input arcs,is a finite non-empty set of output arcs,is a set of inhibitor arcs, andis the initial marking.
Figure 2 gives an example of a PIRES+ model, where
,
,
,
),
, (
,
(
,
.
Definition 4. A token in PIRES+ is, whereis the token value, andis the token time, which is a nonnegative real number describing the time stamp of the token.
In
Figure 2, for instance, the token of place
is
, where the token value is 3 and the time stamp is 0.
Definition 5. For every transition, there is transition function , where is a type function, ,
For instance, in
Figure 2,
has the function
, where
is the value of the token that will appear in
, and after
fires, the value of the token in
will be the value of the token in
plus 3.
Definition 6. For every transition, there are, whereis a minimum delay,is a maximum delay, andis the non-negative real number set.
For instance, in
Figure 2, the delay of
is [
2,
5].
Definition 7. A transitionmay have a guard:, where
The guard is an important factor to determine whether
can be enabled. In
Figure 2, transition
has guard
if
, where
and
are the values of the tokens in places
and
, respectively.
Definition 8. is a binding of transition, where.
Definition 9. Ref. [
9]
For an enabled transition , there exists the enabling time , where is the time instant at which becomes enabled and is given by the maximum token time of the tokens in the binding. Definition 10. For an enabled transition, there exists the earliest trigger timeand the latest trigger time.
As in P/T Petri nets, when a transition is enabled in the PIRES+ model, it can be fired.
Definition 11. The firing of transitionfor a bindingchangesinto a new marking:
- (i)
Tokens fromare removed, i.e.,.
- (ii)
A new token is put into each place of, i.e., for every .
- (iii)
The marking of places different from • and • remain unchanged, i.e., .
3. Refinement Operations for PIRES+
In this section, we will investigate the refinement operation for the PIRES+ model. First, several relevant concepts will be proposed. Then, we propose the refinement operations.
Definition 12. Supposeis a PIRES+ model.) is called a place subnet ofif and only if:
- (i)
and;
- (ii)
and;
- (iii)
;
- (iv)
;
- (v)
is connected,, whereis the only input place of,is the only output place of;
- (vi)
,(where,});
- (vii)
,, whereis a minimum delay,is a maximum delay,is the set of non-negative real numbers, and.
Definition 13 For the transition setof, there is a minimum delayand a maximum delay, i.e.,such that.
Definition 14. For the transition setof, there exists a transition set function, i.e.,, whereand.
In order to investigate property preservations in
Section 4 and
Section 5, we propose the following supposition for the PIRES+ subnet.
Supposition 1. Suppose that PIRES+ subnetsatisfies:
- (i)
In a process, i.e., tokens flow from outside ofinto, through, then flow out from, the tokens’ number flowing intois equal to that flowing out from.
- (ii)
is the unique place ofwhich may contain tokens.
In this subsection, we present the PIRES+ refinement operations.
Definition 15. PIRES+ refinement operation Re: let the refined PIRES+ be obtained from using , to replace where,
- (i)
;;;
- (ii)
If, then; If, then;
- (iii)
If, then; If, then;
- (iv)
(whereis the projection ofon, andis 0-vector of);
- (v)
;
- (vi)
,;,.
Note that, although in Definition 15, only of is replaced by a subnet , this refinement operation can be extended to the place set refinement operation. Let the place set have a finite number of places. Every place of may not be in conflict with other places of , i.e., , = and = (where ). In other words, every place of may not share output transitions and input transitions with other places of .
Supposition 2. Suppose (i)is a place set of, with=and=for(where); (ii), whereis the subnet of.
Definition 16. PIRES+ place set refinement operation Re: let the refined PIRES+be obtained fromusing place subnetsto replaceof, respectively.
Note that, since every place of may not share output transitions and input transitions with other places of , the specific execution process of this place set operation is as follows. First, let be obtained from ) using to replace of ; second, let be obtained from using to replace of ; …; last, let be obtained from using to replace of .
4. Preservation of Reachability, Timing, and Functionality for PIRES+
In this section, we investigate the preservation of reachability, functionality, and timing of the refined PIRES+ model by using the refinement operations. First, we propose the concepts of the property preservations of PIRES+. Second, we study the reachability, timing, and functionality preservations of PIRES+.
Definition 17. PIRES+ subnetsandare said to have the same reachability iff:
- (i)
The input place’s number and the output place’s number ofare the same as those of;
- (ii)
The tokens’ number within the input places ofis equal to that of, and when these tokens go through and, respectively, the number of tokens of is the same as that of.
Definition 18. PIRES+ subnetsandare said to have the same functionality iff:
- (i)
The reachability ofis the same as that of;
- (ii)
If when the token type of tokens in the input places of is equal to that of, then the token type of tokens in the output places ofis equal to that of.
Definition 19. PIRES+ subnetsandare said to have the same timing iff:
- (i)
The reachability ofis the same as that of;
- (ii)
The token time of tokens in the input places ofis equal to that of, and the token time of tokens in the output places ofis equal to that of.
In the following, reachability, functionality, and timing preservations of these refinement operations will be investigated.
Theorem 1. Let PIRES+be obtained fromusing PIRES+ refinement operation Re. Then,andhave the same reachability, functionality, and timing.
Proof. Suppose subnet , where (), , , , , , .
Suppose subnet where , , , , . If , then . If , then . □
We can see that and have the same input places and output places. According to Definition 15, the number of tokens in input places of is the same as that of . Since PIRES+ is obtained from by using to replace , by Supposition 1, Definitions 12, 15, the number of tokens in output places of is the same as that of . By Definition 17, and have the same reachability.
According to Definition 15, the type of tokens in input places of is the same as that of . Since , , then the type of tokens in output places of is the same as that of . By Definition 18, and have the same functionality.
By Definition 15, the time of tokens in input places of is the same as that of . Since , , and , by Definition 15, the time of tokens in output places of is the same as that of . By Definition 19, and have the same timing.
Since , then and have the same reachability, functionality, and timing. □
Note that, by Supposition 2, Definitions 15, 16, and Theorem 1, we can analyze the reachability, timing, and functionality preservations of the place set refinement operation.
Theorem 2. Suppose() is the place set of PRES+, and(where),=and=. Letbe obtained fromusing place set refinement operation Re. Then,andhave the same reachability, functionality, and timing.
Proof. Since () is the place set of , and (where ), = and = , we can refine these places one by one. First, let be obtained from using to replace of , by the proof process of Theorem 1, and have the same reachability, functionality, and timing. Second, let be obtained from using to replace of , by the proof process of Theorem 1, and have the same reachability, functionality, and timing. In the case of , we can prove it in the same way. Thus, and have the same reachability, functionality, and timing. □
5. Preservation of Liveness and Boundedness for PIRES+
In Petri net system, liveness and boundedness are the two important behavior properties. The liveness reflects that the net system can complete any part of work in any state. This means that there is no local deadlock in the Petri net system. The boundedness reflects the overflow resistance of the Petri net system.
Some studies have been conducted in the field of Petri net refinement aiming to realize the preservation of liveness and boundness [
11,
16,
17,
22]. Huang et al. [
16] proposed several refinement approaches for Place/Transition Petri nets to preserve liveness and boundedness. Xia [
22] presented a refinement operation for ordinary Petri nets and investigated the preservation of reversibility, boundedness, and liveness of the refined nets. In [
11], we analyzed a kind of transition refinement method for PRES+ to preserve liveness and boundedness.
In this section, we investigate the refinement method of PIRES+, and propose certain constraints to preserve liveness and boundedness of PIRES+.
To explore the preservation of liveness and boundedness of the refinement approaches, the concepts of the state, liveness, and boundedness of PIRES+ should be presented.
Definition 20. is said to be a state of PIRES+ model, where(whereis the marking reachable set), and(wheredenotes the unusable status).
Definition 21. with(wheredenotes the weight function on) is called the initial state of.
Definition 22. Letbe the skeleton of. (where) is called the PIRES+ net system of.
Definition 23. Letbe a reachable state, and. If, such that, thenis said to be live. If,is live, thenis said to be live.
Definition 24. If(),(whereis a natural number) such that, thenis called bounded. For, ifis bounded, then the PIRES+ net systemis said to be bounded.
In order to investigate liveness and boundedness preservations of the refinement operations, the concept of the PIRES+ place-closed net system should be proposed.
Definition 25. = (,) is called a place-closed PIRES+ net system if we add a transition(where its transition delay is, and the transition function is) and arcs, toand the marking ofis preserved.
In the following, the preservation of liveness and boundedness for PIRES+ will be studied.
Theorem 3. Suppose PIRES+ net system is obtained from by the refinement operation Re . If , then is live iff and = (, ) are live.
Proof. (If) there exists or in . According to Supposition 1, for (where ), there exists and . If , according to Definition 23, , for . According to Definition 23, Definition 15, and Supposition 1, , such that (where ). So, in , is live. If , according to Definition 23, , such that . According to Definition 23, Definition 15, and Supposition 1, , such that . Then, is live in .
(Only-if) Let be live. Suppose that is not live, that is, , , such that . Suppose , where , and is the projection of on . Next, we add corresponding transition step of and obtain , . According to Definition 23, Definition 15, and Supposition 1, , the projection of on is , then , , such that . That conflicts with the liveness of . Hence, there exist , such that obtained from () is live and obtained from () is live. Since , then and = (, ) are live. □
Theorem 4. Suppose that the PIRES+ net system is obtained from by refinement operation Re . is bounded iff and = (, ) are bounded.
Proof. (If) Since is bounded, such that . Obviously, . Since = (, ) is bounded, then for every , such that Let , by Definitions 12–15 and Supposition 1, By Definition 24, is bounded.
(Only-if) Without loss of generality, suppose is not bounded, such that . By Definitions 12–14, and Supposition 1, . That conflicts with the fact that is bounded.
Note that, by Supposition 2, Definitions 15, 16, and Theorems 3 and 4, we can investigate the preservation of liveness and boundedness of the PIRES+ place set refinement operation. □
Theorem 5. Suppose is the PIRES+ place set of , and (where ), = and = . Let be obtained from using the PIRES+ place set refinement operation Re. If (where ), then is live if and only if and (where ) are live.
Proof. Since is the place set of , and (where ), = and = , we can refine the places of one by one. First, let be obtained from using to replace of . Since , by the proof process of Theorem 3, is live if and only if and are live. Second, let be obtained from using to replace of . Since , by the proof process of Theorem 3, is live if and only if and are live. In the case of , we can prove it in the same way. So, is live if and only if and (where ) are live. □
Theorem 6. Suppose is the place set of , and (where ), = and = . Let be obtained from using the PIRES+ place set refinement operation Re. is bounded if and only if and (where ) are bounded.
Proof. Since is the place set of , and (where ), = and = , we can refine these places one by one. First, let be obtained from using to replace of . By the proof process of Theorem 4, is bounded if and only if and are bounded. Second, let be obtained from using to replace of . By the proof process of Theorem 4, is bounded if and only if and are bounded. In the case of , we can prove it in the same way. So, is bounded if and only if and (where ) are bounded. □
6. Application
The contribution of this work is to propose the place refinement operation and the place set refinement operation and verify the relevant important properties. To demonstrate the effectiveness of these refinement approaches, we use the refinement approaches for PIRES+ to model and analyze an embedded control system.
With the rapid development of communication technology, the frequency of communication technology innovation is gradually accelerating. 5G, as a new generation cellular mobile network, has its advantages of excellent wide area coverage, good mobility, low price, and high sharing of WLAN. In the actual network, cellular communication network and WLAN are two independent systems.
As we all know, WLAN is the product of the combination of computer network and wireless communication technology. It uses radio frequency technology (RF) to replace the old twisted pair to form a local area network. WLAN has many corresponding access specifications, all of which are in IEEE 802.11 standard. There is mainly a/b/ac/ad/n/ac. At present, 802.11.ac is widely used. When a piece of information is received through the wireless network, these information data are processed and decoded by the physical layer, data link layer, network layer, transport layer, and application layer, then restored to the most original information transmitted by the sender. We have simplified the structure of the transmission process, analyzed the whole information processing process from a macro perspective.
In order to effectively realize the real integration between heterogeneous networks, this section applies the refinement method of PIRES + proposed above to the modeling and analysis of mobile terminal network communication system. The refined operation of the network system can effectively achieve the integration of heterogeneous networks and accurately respond to the system workflow, and facilitate the future improvement and migration of the system. Next, the cellular mobile communication, WLAN network, and digital signal processing process of the mobile terminal network communication system will be modeled and analyzed.
6.1. Constructing a PIRES+ Model
We will construct an embedded control system’s PIRES+ model using the place set refinement operation. First, an abstract PIRES+ model of an embedded control subsystem will be presented. Second, the refined PIRES+ model is obtained using the PIRES+ refinement operations. The embedded control system’s abstract model (
) is illustrated in
Figure 3.
In
Figure 3,
: cellular network signal processing part;
: digital signal processing part;
: WLAN signal processing part.
: convert electromagnetic wave to RF-Radio Frequency;
: the baseband information is obtained by adjusting the filter;
: start digital signal processing;
: finish digital signal processing;
: pulse code modulation;
: verify WLAN signal password;
: the signal received from the antenna is converted into AC signal.
The subsystem
is displayed in
Figure 4.
is the PIRES+ model of cellular network signal processing part.
: adjust audio;
: perform human-computer interaction;
: finish current signal processing and initialize the system;
: the antenna receives the electromagnetic wave signal sent by the base station. There exist transition functions
associated with transitions
,
,
,
, respectively. There exists transition set function
of subnet
, where
. [
], [
], [
], [
], are transition delay intervals associated with transitions
respectively. [
] is the transition delay interval of subnet
, where
,
.
The subsystem
is displayed in
Figure 5.
is the PIRES+ model of the digital signal processing part, where
, represent a series of signal processing processes, such as acquisition, filtering, transformation, spectrum analysis, estimation, recognition, etc. There exist transition functions
,
,
,
,
,
, associated with transitions
,
, respectively. There exists transition set function
of subnet
, where
. [
], [
], [
], [
], [
], [
] are transition delay intervals associated with transitions
,
, respectively. There exists transition delay interval [
] of subnet
, where
.
The subsystem
is displayed in
Figure 6.
is the PIRES+ model of the WLAN signal processing part, where
: human-computer interaction part;
: finish the current signal processing and initialize the system;
: the terminal receives WLAN signals from different sources. There exist transition functions
,
,
, associated with transitions
, respectively. There exists transition set function
of subnet
, where
. There exist transition delay intervals [
], [
], [
] associated with transitions
, respectively. [
] is the transition delay interval of subnet
, where
,
.
The refined PIRES+ model
(
Figure 7) is obtained using the refinement method. Place
,
, and
of
(
Figure 3) are replaced by place subnet
,
,
, respectively.
In
Figure 7, corresponding to place subnet
, the transition function of
is
, where
. There exists a transition delay interval [
] associated with transition
, where
,
, that is
,
. By place subnet
, the transition function of
is
, where
. There exists a transition delay [
] associated with transition
, where
,
, that is,
,
. Corresponding to place subnet
, the transition function of
is
, where
. There exists a transition delay interval [
] associated with transition
, where
,
, that is
,
.
6.2. Property Analysis of the PIRES+ Model
The preservation of several properties will be analyzed in this section.
6.2.1. Preservation of Reachability, Functionality, and Timing
Let PIRES+ subnet
of
(
Figure 3), where
,
,
,
},
,
. Let
, where
,
{
,
,
,
},
)
, (
),(
),
},
,
.
Let PIRES+ subnet
of
(
Figure 3), where
,
,
,
)
; Let
, where
=
},
,
,
,
, (
,
,
,
,
, (
},
,
.
Let PIRES+ subnet
of
(
Figure 3), where
,
},
,
,
,
(
. Let
(
, where
,
,
,
,
)}
, (
,
,
,
.
is obtained from
by the place set refinement method, that is,
is replaced by
,
is replaced by
, and
is replaced by
. According to
Figure 3,
Figure 4,
Figure 5,
Figure 6 and
Figure 7, ①
,
; ②
,
,
,
,
,
; ③
,
,
,
,
,
. By Theorem 2,
and
have the same reachability, functionality, and timing.
6.2.2. Preservation of Liveness and Boundedness
Obviously,
of
(
Figure 3) is live and bounded. According to the PIRES+ place set refinement operation,
of
(
Figure 7) is obtained from
, i.e.,
is replaced by place subnet
,
is replaced by place subnet
, and
is replaced by subnet
. Let
be the place-closed PIRES+ net system of
,
be the place-closed PIRES+ net system of
,
be the place-closed PIRES+ net system of
, By Definition 25 and the characteristics of subnets
,
and
,
,
and
are live and bounded. By Theorem 5 and Theorem 6,
is live and bounded.
6.3. Summary of the Modeling
The above system has clear structural hierarchy, time characteristics, and task priority requirements, so it is difficult to model with ordinary Petri net, colored Petri net, or PRES+. First, this example establishes the overall simplified model of mobile terminal communication network system, cellular mobile communication model based on embedded system, WLAN network model, and other component models. Then, the refinement operation is carried out to obtain the overall system model. Finally, through formal analysis, it is proven that the refined net system preserves the reachability, functionality, timing, liveness, and boundedness of the original net system. This modeling method solves the problem of direct modeling difficulty caused by the complexity of the system and the portability loss of some components in the overall modeling. The example effectively illustrates the feasibility and practicability of the refinement operation proposed in this paper and provides a more practical theoretical basis for the modeling of some embedded systems.
7. Conclusions
Embedded systems are widely used in various devices and are becoming more and more complex with increasing requirements. To facilitate the verification and design of embedded systems, PIRES+ is introduced. PIRES+ has great expressive power and many applications in verification, modeling, and analysis of embedded systems.
However, the problem of state space explosion is a disadvantage for PIRES+’s ability to model, analyze, and verify large, complex systems. In order to resolve the state space explosion of Petri nets, there are three popular transformations in the literature, namely synthesis approach, refinement approach, and reduction approach. In order to model, analyze, and verify large complex embedded systems, and to solve PIRES+’s state space explosion problem, we have proposed the place refinement approach and the place set refinement approach for PIRES+. Compared with refinement methods for ordinary Petri nets, CPNs, and PRES+, these refinement methods can nicely describe certain characteristics of embedded systems. We have also investigated the property preservation of these refinement approaches. During the refining process, under certain constraints, reachability, timing, functionality, liveness, and boundedness will be preserved. The refinement methods for PIRES+ can be used to nicely resolve design problems of embedded systems.
Of course, the refinement operation methods proposed in this paper are only applicable to the operation of place in PIRES+, without considering the refinement operation of transition in PIRES+. At the same time, this paper only carries out qualitative research from the formal aspect, and lacks certain quantitative analysis and system simulation.
In the future, some quantitative analysis and system simulation for the PIRES+’s refinement operation should be studied. Other more general refinement, synthesis, or reduction approaches for PIRES+ should also be investigated, for example, a place-bordered refinement operation, or synthesis operation methods for PIRES+ and their applications.
Fuzzy linear programming [
40,
41] is a generalization of classical linear programming, which blurs the boundary of linear constraints. Under loose constraints, we can obtain the optimization conditions and optimization extremum. The combination of the fuzzy linear programming and the refinement operation may become another interesting research direction in the future.