A Review Paper on Colored Petri Nets and their Application in Protocol Verification
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 8
Abstract
Colored Petri Nets is a graphical oriented language for design, verification and validation of systems. It is mainly used in systems where concurrency, communication and synchronisation are important. This paper is an attempt to review colored petri nets along with their various properties and applications. A brief introduction to Protocol Engineering and at what stage Colored Petri Nets are used in Protocol Engineering is also presented.
Authors and Affiliations
RichaAgarwal, Ashish Jain
Development of Antirigging Voting System Using Finger Print
Now a days voting process is exercised by using EVM(Electronic voting machine). In this paper we present and use implementation is to implement the development of anti rigging voting system using finger print .The pu...
Dynamic ModelingAnd Control Of Wind/Pv/Battery Sources Integrated For Distributed Energy Production
This paper proposes a cross breed vitality framework comprising of wind, photovoltaic and energy component. Battery stockpiling is intended to supply persistent force and to give the deficiency power when the joined...
Evaluate the Vulnerabilities of Existing Protocols to Routing Layer Resource Depletion Attacks
We describe a Resource Depletion attack as the work of art and transmission of a message that causes more energy to be consumed by the network than if an honest node transmitted a message of identical size to the sam...
Design and Study of Direct Sequence - CDMA RAKE Rx Simulator for Wireless Communication
In this paper, a software wireless communication simulator execute to simulate a Code division Multiple Access (CDMA) as Wireless cellular telephony has been growing at a quicker rate than wired-line telephone networ...
SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES
The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad...