<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">JIHPP</journal-id>
<journal-id journal-id-type="nlm-ta">JIHPP</journal-id>
<journal-id journal-id-type="publisher-id">JIHPP</journal-id>
<journal-title-group>
<journal-title>Journal of Information Hiding and Privacy Protection</journal-title>
</journal-title-group>
<issn pub-type="epub">2637-4226</issn>
<issn pub-type="ppub">2637-4234</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">26440</article-id>
<article-id pub-id-type="doi">10.32604/jihpp.2022.026440</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>SPN-Based Performance Analysis of Multiple Users&#x2019; Behaviors for SNS</article-title>
<alt-title alt-title-type="left-running-head">SPN-Based Performance Analysis of Multiple Users&#x2019; Behaviors for SNS</alt-title>
<alt-title alt-title-type="right-running-head">SPN-Based Performance Analysis of Multiple Users&#x2019; Behaviors for SNS</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Hong</surname><given-names>Zhiguo</given-names></name><xref ref-type="aff" rid="aff-1">1</xref><email>hongzhiguo@cuc.edu.cn</email></contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Wang</surname><given-names>Yongbin</given-names></name><xref ref-type="aff" rid="aff-2">2</xref>
<xref ref-type="aff" rid="aff-3">3</xref></contrib>
<contrib id="author-3" contrib-type="author">
<name name-style="western"><surname>Shi</surname><given-names>Minyong</given-names></name><xref ref-type="aff" rid="aff-4">4</xref></contrib>
<aff id="aff-1"><label>1</label><institution>School of Data Science and Media Intelligence, Communication University of China</institution>, <addr-line>Beijing, 100024</addr-line>, <country>China</country></aff>
<aff id="aff-2"><label>2</label><institution>Collaborative Innovation Center, Communication University of China</institution>, <addr-line>Beijing, 100024</addr-line>, <country>China</country></aff>
<aff id="aff-3"><label>3</label><institution>State Key Laboratory of Media Convergence and Communication, Communication University of China</institution>, <addr-line>Beijing, 100024</addr-line>, <country>China</country></aff>
<aff id="aff-4"><label>4</label><institution>School of Computer and Cyber Sciences, Communication University of China</institution>, <addr-line>Beijing, 100024</addr-line>, <country>China</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>&#x002A;</label>Corresponding Author: Zhiguo Hong. Email: <email>hongzhiguo@cuc.edu.cn</email></corresp>
</author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-06-16"><day>16</day>
<month>06</month>
<year>2022</year></pub-date>
<volume>4</volume>
<issue>1</issue>
<fpage>1</fpage>
<lpage>13</lpage>
<history>
<date date-type="received"><day>27</day><month>12</month><year>2021</year></date>
<date date-type="accepted"><day>29</day><month>1</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2022 Hong et al.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Hong et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_JIHPP_26440.pdf"></self-uri>
<abstract>
<p>With the rapid development of various applications of Information Technology, big data are increasingly generated by social network services (SNS) nowadays. The designers and providers of SNS distribute different client applications for PC, Mobile phone, IPTV etc., so that users can obtain related service via mobile or traditional Internet. Good scalability and considerably short time delay are important indices for evaluating social network systems. As a result, investigating and mining the principle of users&#x2019; behaviors is an important issue which can guide service providers to establish optimal systems with SNS. On the basis of analyzing the characteristics of social network system, this paper constructed a Stochastic Petri Net (SPN) model for describing the behaviors of three users for SNS. Moreover, the scalability of users&#x2019; behaviors of SNS was studied by extending the SPN model of three users to the one of four users. Furthermore, average time delay was chosen as the performance index to evaluate the performance of these two constructed SPN models with Stochastic Petri Net Package (SPNP) 6.0. For different parameters of number of connections, traffic load and buffer size, various trends and numerical results are derived thereby. The methodology of modeling and simulation in this paper can be further used to study the performance of SNS.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Social network</kwd>
<kwd>petri nets</kwd>
<kwd>performance analysis</kwd>
<kwd>traffic load</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1"><label>1</label><title>Introduction</title>
<sec id="s1_1"><label>1.1</label><title>State of the art</title>
<p>The evolution of smartphones, social network services (SNS) [<xref ref-type="bibr" rid="ref-1">1</xref>,<xref ref-type="bibr" rid="ref-2">2</xref>] and cloud compuing has led to big data era [<xref ref-type="bibr" rid="ref-3">3</xref>]. Social network sites play an important role in connecting various users via networks. By using SNS, people all over the world can share their information and opinion with each other very easily and conveniently [<xref ref-type="bibr" rid="ref-4">4</xref>]. They chat with each other and exchange data through social network systems. Among those systems, skype and twitter are successful examples. Reference [<xref ref-type="bibr" rid="ref-4">4</xref>] proposed user profile data ontology for SNS. That is, by considering Age, Gender, Education, Interesting, Use friendly, Club and Blog as the factors in their work, one user profile data ontology for SNS was proposed. Further, petri-net based user profile data ontology for SNS was constructed, which gave a brief process and specification for user profile data ontology. However, quantitative analysis of social network systems would be more instructive for SNS providers and it has been an important and urgent issue to better the experiences for users. Good scalability and considerably short time delay are key indices for evaluating social network systems.</p>
<p>Nowadays, methodologies of performance evaluation for collaborative system mainly take three ways, which are direct measurement, mathematic modeling [<xref ref-type="bibr" rid="ref-5">5</xref>,<xref ref-type="bibr" rid="ref-6">6</xref>], and simulation. Mathematic modeling and simulation are undoubted useful methodologies. Consequently, how to model and evaluate the behaviors of participants is an important issue which offers theoretical foundations for building and deploying manage systems for entertainment performance chains. Petri nets, which was first developed in 1962 by C.A. Petri in his PhD. dissertation, is powerful in modeling concurrent, distributed, asynchronous behaviors of a system [<xref ref-type="bibr" rid="ref-7">7</xref>]. With algebra theory and the net theory as its mathematical basis, the Petri nets theory has been successfully employed to describe various relations and behaviors of the discrete event system and communication networks [<xref ref-type="bibr" rid="ref-8">8</xref>,<xref ref-type="bibr" rid="ref-9">9</xref>].</p>
<p>Social network analysis is a process of analyzing networked structure using graph theory [<xref ref-type="bibr" rid="ref-10">10</xref>]. Consequently, the properties of network&#x2019;s topology can be studied as performance indices, such as density, degree, betweenness, closeness. Reference [<xref ref-type="bibr" rid="ref-11">11</xref>] presented an algorithm for the automatic generation of hypothetical Sociograms (Social Network Graphs). Reference [<xref ref-type="bibr" rid="ref-12">12</xref>] utilized topological indices to analyze social networks. Besides, Reference [<xref ref-type="bibr" rid="ref-13">13</xref>] used graph theory and network science to make link prediction of social networks.</p>
<p>However, these related works on Social Network Systems only focus on the static performances and lack the detailed interactions among users and systems. As a result, they didn&#x2019;t take the dynamic behaviors of users into account.</p>
<p>For this, we concern on the dynamic and parallel behaviors of users in this paper.</p>
</sec>
<sec id="s1_2"><label>1.2</label><title>Comparison of Some Formal Methods of Performance Evaluation</title>
<p>There are some commonly used formal methods to evaluate the performance of computer networks and systems. Here, comparison of four conventional formal methods, which are Stochastic Process, Queuing Theory, Stochastic Process Algebra and Stochastic Petri Net [<xref ref-type="bibr" rid="ref-14">14</xref>], is listed in <xref ref-type="table" rid="table-1">Tab. 1</xref>.</p>
<table-wrap id="table-1"><label>Table 1</label><caption><title>Comparison of four conventional formal methods of performance evaluation table caption</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">Aspects</th>
<th align="left">Stochastic process</th>
<th align="left">Queuing theory</th>
<th align="left">Stochastic process algebra</th>
<th align="left">Stochastic petri Net</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">Advantages</td>
<td align="left">Is applicable to small scaled system with a few nodes</td>
<td align="left">Doesn&#x2019;t exist the problem of &#x201C;State Space Explosion&#x201D; in the case of product-form solution</td>
<td align="left">Is based on description of &#x201C;algebraic text form&#x201D; and can conduct strict deduction and proof</td>
<td align="left">&#x2022; Has more powerful ability of modeling and can deal with performance analysis of distributed and parallel systems<break/>&#x2022; There are some tools to model and evaluate SPN models, such as SPNP, SHARPE, CPN tools, GreatSPN etc.</td>
</tr>
<tr>
<td align="left">Short-comings</td>
<td align="left">Is hard to model in the corresponding stochastic process with Markov-based analysis</td>
<td align="left">&#x2022; Can&#x2019;t deal with discrete-time queuing model since the model has non-product-form solution<break/>&#x2022; Has the limitations of describing complex phenomena such as synchronization, blocking and splitting of customers</td>
<td align="left">Lacks tools to support; there are only a few tools which are TIPPTOOL, PEPA-Workbench and TWOTOWERS</td>
<td align="left">Will encounter the problem of &#x201C;State Space Explosion&#x201D; with the increase of elements (number of places, transitions and tokens etc.) in the SPN models</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Therefore, this paper conducted Petri-net based performance analysis of multiple users&#x2019; behaviors for SNS. The remainder of this paper is organized as follows. In Section 2, we study the interactive process among three users for SNS and give the timing diagram for these users&#x2019; behaviors. In Section 3, we construct two Stochastic Petri Net (SPN) [<xref ref-type="bibr" rid="ref-15">15</xref>] models of behaviors for SNS in the case of three users and four users respectively. In Section 4, by choosing average time delay as the performance index, performance evaluations of these constructed SPN models are made with Stochastic Petri Net Package (SPNP) 6.0 [<xref ref-type="bibr" rid="ref-16">16</xref>]. For different parameters of message number, traffic load and bandwidth of shared links, various trends are derived through numerical analysis thereby. Finally, Section 5 concludes this paper.</p>
</sec>
</sec>
<sec id="s2"><label>2</label><title>Interaction Process Among Three Users for SNS</title>
<p>All For typical social network systems, there are a number of interactive relationships among users and the systems. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> gives the timing diagram of interaction process among three users and social network system. Here User<sub>1</sub>, User<sub>2</sub> and User<sub>3</sub> are used to symbolize the three users. Besides, let <italic>K</italic><sub>2</sub> represent available bandwidth of shared links.</p>
<p>As <xref ref-type="fig" rid="fig-1">Fig. 1</xref> demonstrates, the whole interaction process can be divided into three phases, which are preparation procedure, critical transmission one and shared transmission one.</p>
<p>Here we introduce the detailed steps in the interaction process as follows.
<list list-type="roman-upper">
<list-item><label>I.</label><p>Three users are ready for delivering data packets.</p></list-item>
<list-item><label>II.</label><p>During the critical transmission procedure, only one of three users can gain the right of data transmission. Each user is requesting links for transmission with q units of bandwidth.</p></list-item>
<list-item><label>III.</label><p>Then the social network system checks if there are available bandwidth of critical links. When &#x201C;available bandwidth of critical links &#x2265; <italic>q</italic>&#x201D; satisfies, q units of bandwidth are set aside for one of triple users. At the same time the other two users are queued.</p></list-item>
<list-item><label>IV.</label><p>The user who has gained the access of critical links delivers data packets.</p></list-item>
<list-item><label>V.</label><p>After the phase of critical transmission, the user releases q units of bandwidth. At the same time, the critical links of social network system are recovered to be available.</p></list-item>
<list-item><label>VI.</label><p>During the shared transmission procedure, some or all of three users can deliver data packets according to the size of shared links&#x2019; available bandwidth. Each user is requesting links for transmission with q units of bandwidth.</p></list-item>
<list-item><label>VII.</label><p>Then the social network system examines if there are available bandwidth of shared links.</p></list-item>
<list-item><label>VIII.</label><p>Once &#x201C;<italic>q</italic>&#x2009;&#x2264;&#x2009;<italic>K</italic><sub>2</sub>&#x2009;&#x003C;&#x2009;2<italic>q</italic>&#x201D; holds, q units of bandwidth are offered for one of triple users. When &#x201C;2<italic>q</italic>&#x2009;&#x2264;&#x2009;<italic>K</italic><sub>2</sub>&#x2009;&#x003C;&#x2009;3<italic>q</italic>&#x201D; satisfies, q units of bandwidth are offered for two of triple users respectively. On the &#x201C;<italic>K</italic><sub>2</sub>&#x2009;&#x2265;&#x2009;3<italic>q</italic>&#x201D; exists, each of triple users can obtain sufficient bandwidth for delivering data packets.</p></list-item>
<list-item><label>IX.</label><p>After the phase of shared transmission, the users release q units of bandwidth correspondingly. Meanwhile, the shared links of social network system are recovered to be available.</p></list-item>
<list-item><label>X.</label><p>Three users are ready for the next round&#x2019;s data transmission.</p></list-item>
</list></p>
<fig id="fig-1"><label>Figure 1</label><caption><title>The timing diagram of interaction process among three users and social network system</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-1.png"/></fig>
</sec>
<sec id="s3"><label>3</label><title>SPN Model of Three Users&#x2019; Behaviors for SNS</title>
<p>Places and transitions are two basic types of elements of Petri net. The connection between place and place or between transition and transition is not allowed. A directed arc connecting a place (transition) to a transition (place) is called an input arc (output arc) of the transition. The number of tokens in a place is zero or positive integer. And a positive number can also be assigned to the multiplicity of corresponding input arc. The corresponding transition is enabled if each of its input places&#x2019; tokens is no less than the multiplicity of an input arc.</p>
<p>Here, we assume that &#x201C;the behaviors of three users&#x2019; arrivals are independent of each other, and follow the Poisson process&#x201D;. Further, we assume that the topology of SNS to be network structure. We can model real users&#x2019; interactions with a different order of magnitude by setting different arrival rates which are symbolized with <italic>&#x03BB;</italic>. In order to reflect the phenomena of high load when users acquire bandwidth, we use the weighted arcs with the value of <italic>q</italic>. We constructed the SPN model as shown in <xref ref-type="fig" rid="fig-2">Fig. 2</xref>.</p>
<fig id="fig-2"><label>Figure 2</label><caption><title>SPN model of three users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-2.png"/></fig>
<p>Let &#x201C;&#x0023;&#x201D; symbolize the token number of a certain transition. The firing condition of <italic>T</italic><sub>2</sub> is formalized as follows: <inline-formula id="ieqn-1"><mml:math id="mml-ieqn-1"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow><mml:mspace width="thinmathspace" /><mml:mo>&#x003E;</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>16</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>q</mml:mi><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>8</mml:mn></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>13</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>. Similarly, the firing condition of <italic>T</italic><sub>7</sub> is formulated as follows: <inline-formula id="ieqn-2"><mml:math id="mml-ieqn-2"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>7</mml:mn></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>16</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>q</mml:mi><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>13</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>. Likewise, the firing condition of <italic>T</italic><sub>12</sub> is expressed as follows: <inline-formula id="ieqn-3"><mml:math id="mml-ieqn-3"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>12</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>16</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>q</mml:mi><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>3</mml:mn></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>8</mml:mn></mml:msub></mml:mrow><mml:mo>=</mml:mo><mml:mn>0</mml:mn></mml:math></inline-formula>.</p>
<p>As mentioned above, during the Critical Transmission Procedure, only one user can obtain the right of transmission. Therefore, as <xref ref-type="fig" rid="fig-2">Fig. 2</xref> demonstrates, six arcs are used to express mutual exclusion among three users, which are the arc from <italic>P</italic><sub>3</sub> to <italic>T</italic><sub>7</sub>, the one from <italic>P</italic><sub>3</sub> to <italic>T</italic><sub>12</sub>, the one from <italic>P</italic><sub>8</sub> to <italic>T</italic><sub>2</sub>, the one form <italic>P</italic><sub>8</sub> to <italic>T</italic><sub>12</sub>, the one from <italic>P</italic><sub>13</sub> to <italic>T</italic><sub>2</sub> and the one from <italic>P</italic><sub>13</sub> to <italic>T</italic><sub>7</sub>.</p>
<p>As <xref ref-type="fig" rid="fig-2">Fig. 2</xref> symbolizes, 12 arcs reflect the phenomena of competition in using the shared bandwith (buffer) with different resource needs. For the Criticital Transimisson Procedure, six arcs are connected among place <italic>P</italic><sub>16</sub> and transitions <italic>T</italic><sub>2</sub>, <italic>T</italic><sub>3</sub>, <italic>T</italic><sub>7</sub>, <italic>T</italic><sub>8</sub>, <italic>T</italic><sub>12</sub>, <italic>T</italic><sub>13</sub>. In the same way, for the Shared Transimisson Procedure, another six arcs are jointed among place P<sub>17</sub> and transitions <italic>T</italic><sub>4</sub>, <italic>T</italic><sub>5</sub>, <italic>T</italic><sub>9</sub>, <italic>T</italic><sub>10</sub>, <italic>T</italic><sub>14</sub>, <italic>T</italic><sub>15</sub>.</p>
<p>In the same manner, during the Shared Transimisson Procedure, three users request for using shared bandwidth (buffer) simultaneously. The related transition can be fired if the available bandwidth (buffer) is enough to utilize. Otherwise, the user has to be queued until the firing condition is satisfied.</p>
<p>Additionally, the firing condition of T<sub>4</sub> is formalized as follows: <inline-formula id="ieqn-4"><mml:math id="mml-ieqn-4"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>4</mml:mn></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>17</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>q</mml:mi></mml:math></inline-formula>. Similarly, the firing condition of T9 is formulated as follows: <inline-formula id="ieqn-5"><mml:math id="mml-ieqn-5"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mn>9</mml:mn></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>17</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>q</mml:mi></mml:math></inline-formula>. Likewise, the firing condition of T14 is expressed as follows: <inline-formula id="ieqn-6"><mml:math id="mml-ieqn-6"><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>14</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x003E;</mml:mo><mml:mn>0</mml:mn><mml:mo>&#x2227;</mml:mo><mml:mi mathvariant="normal">&#x0023;</mml:mi><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mn>17</mml:mn></mml:mrow></mml:msub></mml:mrow><mml:mo>&#x2265;</mml:mo><mml:mi>q</mml:mi></mml:math></inline-formula>. The objects of the SPN model are listed in <xref ref-type="table" rid="table-2">Tab. 2</xref>. Moreover, User1, User2 and User3 represent the first user, the second one and the third one respectively.</p>
<table-wrap id="table-2"><label>Table 2</label><caption><title>List of objects of SPN model of three users&#x2019; behaviors for SNS</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">No.</th>
<th align="left">Name</th>
<th align="left">Meaning</th>
<th align="left">Markings</th>
<th align="left">Rate</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left"><italic>P</italic><sub>1</sub>, <italic>P</italic><sub>6</sub>, <italic>P</italic><sub>11</sub></td>
<td align="left">Data packets arriving from User<sub>1</sub>, User<sub>2</sub>, User<sub>3</sub></td>
<td align="left"><italic>N</italic></td>
<td align="center"/>
</tr>
<tr>
<td align="left">2</td>
<td align="left"><italic>T</italic><sub>1</sub>, <italic>T</italic><sub>6</sub>, <italic>T</italic><sub>11</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>1</sub></td>
</tr>
<tr>
<td align="left">3</td>
<td align="left"><italic>P</italic><sub>2</sub>, <italic>P</italic><sub>7</sub>, <italic>P</italic><sub>12</sub></td>
<td align="left">Acquiring the critical links for transmission</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">4</td>
<td align="left"><italic>T</italic><sub>2</sub>, <italic>T</italic><sub>7</sub>, <italic>T</italic><sub>12</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>2</sub></td>
</tr>
<tr>
<td align="left">5</td>
<td align="left"><italic>P</italic><sub>3</sub>, <italic>P</italic><sub>8</sub>, <italic>P</italic><sub>13</sub></td>
<td align="left">Ready to transmit</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">6</td>
<td align="left"><italic>T</italic><sub>3</sub>, <italic>T</italic><sub>8</sub>, <italic>T</italic><sub>13</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>3</sub></td>
</tr>
<tr>
<td align="left">7</td>
<td align="left"><italic>P</italic><sub>4</sub>, <italic>P</italic><sub>9</sub>, <italic>P</italic><sub>14</sub></td>
<td align="left">Acquiring the shared links for transmission</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">8</td>
<td align="left"><italic>T</italic><sub>4</sub>, <italic>T</italic><sub>9</sub>, <italic>T</italic><sub>14</sub></td>
<td align="left">Acquiring the shared links for transmission</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>4</sub></td>
</tr>
<tr>
<td align="left">9</td>
<td align="left"><italic>P</italic><sub>5</sub>, <italic>P</italic><sub>10</sub>, <italic>P</italic><sub>15</sub></td>
<td align="left">Ready to transmit</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">10</td>
<td align="left"><italic>T</italic><sub>5</sub>, <italic>T</italic><sub>10</sub>, <italic>T</italic><sub>15</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>5</sub></td>
</tr>
<tr>
<td align="left">11</td>
<td align="left"><italic>P</italic><sub>16</sub></td>
<td align="left">Buffer size of the critical links</td>
<td align="left"><italic>K</italic><sub>1</sub></td>
<td align="center"/>
</tr>
<tr>
<td align="left">12</td>
<td align="left"><italic>P</italic><sub>17</sub></td>
<td align="left">Buffer size of the critical links</td>
<td align="left"><italic>K</italic><sub>2</sub></td>
<td align="center"/>
</tr>
</tbody>
</table>
</table-wrap>
<p>Moreover, the scalability of users&#x2019; behaviors of SNS is studied by extending the SPN model of three users to the one of four users.</p>
</sec>
<sec id="s4"><label>4</label><title>SPN Model of Four Users&#x2019; Behaviors for SNS</title>
<p>For the same, by making similar assumptions and analyzing the interaction process among four users, the SPN model of four users&#x2019; behaviors for SNS as <xref ref-type="fig" rid="fig-3">Fig. 3</xref> shows.</p>
<fig id="fig-3"><label>Figure 3</label><caption><title>SPN model of four users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-3.png"/></fig>
<p>The objects of this SPN model are listed in <xref ref-type="table" rid="table-3">Tab. 3</xref>.
<table-wrap id="table-3"><label>Table 3</label><caption><title>List of objects of SPN model of four users&#x2019; behaviors for SNS</title></caption>
<table frame="hsides">
<colgroup>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
<col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left">No.</th>
<th align="left">Name</th>
<th align="left">Meaning</th>
<th align="left">Markings</th>
<th align="left">Rate</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1</td>
<td align="left"><italic>P</italic><sub>1</sub>, <italic>P</italic><sub>6</sub>, <italic>P</italic><sub>11</sub>, <italic>P</italic><sub>16</sub></td>
<td align="left">Data packets arriving from User<sub>1</sub>, User<sub>2</sub>, User<sub>3</sub>, User<sub>4</sub></td>
<td align="left"><italic>N</italic></td>
<td align="center"/>
</tr>
<tr>
<td align="left">2</td>
<td align="left"><italic>T</italic><sub>1</sub>, <italic>T</italic><sub>6</sub>, <italic>T</italic><sub>11</sub>, <italic>T</italic><sub>16</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>1</sub></td>
</tr>
<tr>
<td align="left">3</td>
<td align="left"><italic>P</italic><sub>2</sub>, <italic>P</italic><sub>7</sub>, <italic>P</italic><sub>12</sub>, <italic>P</italic><sub>17</sub></td>
<td align="left">Acquiring the critical links for transmission</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">4</td>
<td align="left"><italic>T</italic><sub>2</sub>, <italic>T</italic><sub>7</sub>, <italic>T</italic><sub>12</sub>, <italic>T</italic><sub>17</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>2</sub></td>
</tr>
<tr>
<td align="left">5</td>
<td align="left"><italic>P</italic><sub>3</sub>, <italic>P</italic><sub>8</sub>, <italic>P</italic><sub>13</sub>, <italic>P</italic><sub>18</sub></td>
<td align="left">Ready to transmit</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">6</td>
<td align="left"><italic>T</italic><sub>3</sub>, <italic>T</italic><sub>8</sub>, <italic>T</italic><sub>13</sub>, <italic>T</italic><sub>18</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>3</sub></td>
</tr>
<tr>
<td align="left">7</td>
<td align="left"><italic>P</italic><sub>4</sub>, <italic>P</italic><sub>9</sub>, <italic>P</italic><sub>14</sub>, <italic>P</italic><sub>19</sub></td>
<td align="left">Acquiring the shared links for transmission</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">8</td>
<td align="left"><italic>T</italic><sub>4</sub>, <italic>T</italic><sub>9</sub>, <italic>T</italic><sub>14</sub>, <italic>T</italic><sub>19</sub></td>
<td align="left">Acquiring the shared links for transmission</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>4</sub></td>
</tr>
<tr>
<td align="left">9</td>
<td align="left"><italic>P</italic><sub>5</sub>, <italic>P</italic><sub>10</sub>, <italic>P</italic><sub>15</sub>, <italic>P</italic><sub>20</sub></td>
<td align="left">Ready to transmit</td>
<td align="left">0</td>
<td align="center"/>
</tr>
<tr>
<td align="left">10</td>
<td align="left"><italic>T</italic><sub>5</sub>, <italic>T</italic><sub>10</sub>, <italic>T</italic><sub>15</sub>, <italic>T</italic><sub>20</sub></td>
<td align="left">Delivering data packets</td>
<td align="center"/>
<td align="left"><italic>&#x03BB;</italic><sub>5</sub></td>
</tr>
<tr>
<td align="left">11</td>
<td align="left"><italic>P</italic><sub>21</sub></td>
<td align="left">Buffer size of the critical links</td>
<td align="left"><italic>K</italic><sub>1</sub></td>
<td align="center"/>
</tr>
<tr>
<td align="left">12</td>
<td align="left"><italic>P</italic><sub>22</sub></td>
<td align="left">Buffer size of the critical links</td>
<td align="left"><italic>K</italic><sub>2</sub></td>
<td align="center"/>
</tr>
</tbody>
</table>
</table-wrap></p>
</sec>
<sec id="s5"><label>5</label><title>Performance Evaluation</title>
<sec id="s5_1"><label>5.1</label><title>Performance Evaluation of two SPN Models</title>
<p>In this part, we will conduct performance evaluation of two constructed SPN model of three users&#x2019; behaviors and four users&#x2019; ones for SNS respectively.</p>
<p>Based on the analysis of multiple users&#x2019; behaviors for SNS, we concern average time delay of social network system for each user as a key performance index. Further, through SPN reachability analysis and isomorphic continuous time Markov process equations with SPNP 6.0 software, we can calculate average time delay of the constructed SPN model by applying Little&#x2019;s theorem and principle of balance [<xref ref-type="bibr" rid="ref-17">17</xref>]. Additionally <italic>N</italic> represents the value of tokens, which means the number of data packets to be delivered for each</p>
<p>Further, due to the symmetry of three users&#x2019; behaviors and four users&#x2019; ones, the firing rates of related transitions are set to be the same in these constructed SPN models. Consequently, the average time delays of three users or four users for SNS are also identical. Then four experiments are designed to study different parameters&#x2019; effects on average time delay.</p>
<p><bold><italic>Case</italic> 1</bold>: In the case of <italic>q</italic>&#x2009;&#x003D;&#x2009;2, <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;2, <italic>&#x03BB;</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>3</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>4</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>5</sub>&#x2009;&#x003D;&#x2009;0.25, the effect of number of data packets, buffer size of the shared links on average time delay is shown in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>. For the different parameters of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2, 4 and 6, three corresponding series are depicted.</p>
<fig id="fig-4"><label>Figure 4</label><caption><title>Effect of number of data packets, buffer size of the shared links on average time delay for the SPN model of four users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-4.png"/></fig>
<p>Due to the increase of data packets to be delivered, it can be seen that in general for each user average time delay becomes bigger with the addition of <italic>N</italic>. Also &#x201C;<italic>q</italic>&#x2009;&#x003D;&#x2009;2&#x201D; reveals that each user&#x2019;s traffic load is in a relatively low level. What&#x2019;s more, three users competes with each other in using shared links to gain the right of transmitting data packets. For the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2, it satisfies the equation of <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;q, which means only one of three users can deliver data packets at the same time. Thus, two other users will be queued until the shared links are available. For the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;4, it satisfies the equation of <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;2q, which means only two of three users can send data packets meanwhile. Threefore, another user has to be waited until the shared links are free. For the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;6, it satisfies the equation of <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;3q, which means all of three users can deliver data packets simultaneously. This is the reason why we can observe that for a certain <italic>N</italic>, average time delay of the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2 is much bigger than that of the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;4. Also, for a certain <italic>N</italic>, average time delay of the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;4 is slightly higher than that of the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;6.</p>
<p><bold><italic>Case</italic> 2<italic>:</italic></bold> In the case of <italic>N</italic>&#x2009;&#x003D;&#x2009;3, <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;5, <italic>&#x03BB;</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>3</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>4</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>5</sub>&#x2009;&#x003D;&#x2009;0.25, the effect of traffic load, buffer size of the shared links on average time delay is illustrated in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. For the different parameters of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;5, 8, 10, 13, 15 and 18, six corresponding series are plotted.</p>
<fig id="fig-5"><label>Figure 5</label><caption><title>Effect of traffic load, buffer size of the shared links on average time delay for the SPN model of three users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-5.png"/></fig>
<p>Due to the uprise of traffic load of each user in the social network system, it can be observed that as a whole average time delay increases with the augment of <italic>q</italic>. Moreover, with the rise of traffic load for each user average time delay become bigger gradually in the form polygonal line. Besides, for a certain traffic load q, larger buffer size of the shared links would lead to smaller average time delay. Further, take the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;5 for instance, average time delay of <italic>q</italic>&#x2009;&#x003D;&#x2009;3 is much bigger than that of <italic>q</italic>&#x2009;&#x003D;&#x2009;2. Still, there exist two jump points in the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;8 which are the dots when <italic>q</italic>&#x2009;&#x003D;&#x2009;3 and <italic>q</italic>&#x2009;&#x003D;&#x2009;5 respectively.</p>
<p>In order to explore the mechanism of <italic>K</italic><sub>2</sub>&#x2019;s accurate affections on average time delay for each user, we can find that there exists a regular mode about jump points. With regard to these points, average time delay increase drastically relative to former points. Since shorter average time delay play an important role in improving user&#x2019;s experience on SNS, one key principle of designing social network system is to minimize the chance of conflicts in using shared links to the utmost. That is, the best and optimal condition is that the buffer size of the shared links is large enough for all users to deliver data packets in parallel. Still, the better condition is that the buffer size of the shared links is sufficient for some users to transmit data packets at the same time. And the worst condition is that the the buffer size of the shared links can only offer the right of transferring data for just one user at one time. In short, queue delay will take a large proportion of average time delay for the better condtion and the worst one. More exactly, these jump points in <xref ref-type="fig" rid="fig-4">Fig. 4</xref> will appear when <inline-formula id="ieqn-7"><mml:math id="mml-ieqn-7"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mn>3</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-8"><mml:math id="mml-ieqn-8"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>.</p>
<p><bold><italic>Case</italic> 3</bold>: In the case of <italic>q</italic>&#x2009;&#x003D;&#x2009;2, <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;2, <italic>&#x03BB;</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>3</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>4</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>5</sub>&#x2009;&#x003D;&#x2009;0.25, the effect of number of data packets, buffer size of the shared links on average time delay is shown in <xref ref-type="fig" rid="fig-6">Fig. 6</xref>. For the different parameters of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2, 4, 6 and 8, four corresponding series are displayed.</p>
<fig id="fig-6"><label>Figure 6</label><caption><title>Effect of number of data packets, buffer size of the shared links on average time delay for the SPN model of four users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-6.png"/></fig>
<p>Due to the augment of data packets to be delivered, it can be observed that for each user average time delay tends to become bigger with the addition of <italic>N</italic>. In this case, <italic>q</italic> is set to be 2. Additionally, four users compete with each other in using shared links to gain the chance of transmitting data packets. For the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2, it satisfies the equation of <italic>K</italic><sub>2</sub>&#x003D;<italic>q</italic>, which means that only one of four users can deliver data packets at the same time. Consequently, three other users will be queued until the shared links are available. For the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;4, it satisfies the equation of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2<italic>q</italic>, which means that only two of four users can send data packets simultaneously. Therefore, another two users have to be waited until the shared links are available for transmission. For the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;6, it satisfies the equation of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;3<italic>q</italic>, which shows that among four users, three users can deliver data packets for this time. Still, for the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;8, it satisfies the equation of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;4<italic>q</italic>, which signs that all these four users can deliver data packets at that time. This is the reason why we can observe that for a certain N, average time delay of the curves appear to decline with the increase of <italic>K</italic><sub>2</sub>.</p>
<p><bold><italic>Case</italic> 4</bold>: In the case of <italic>N</italic>&#x2009;&#x003D;&#x2009;3, <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;5, <italic>&#x03BB;</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>3</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>4</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>5</sub>&#x2009;&#x003D;&#x2009;0.25, the effect of traffic load, buffer size of the shared links on average time delay is illustrated in <xref ref-type="fig" rid="fig-7">Fig. 7</xref>. For the different parameters of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;5, 8, 10, 12, 15, 16, 20 and 23, eight corresponding series are charted.</p>
<fig id="fig-7"><label>Figure 7</label><caption><title>Effect of traffic load, buffer size of the shared links on average time delay for the SPN model of four users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-7.png"/></fig>
<p>Due to the increase of traffic load of every user in the social network system, it can be noticed that average time delay gradually increases with the raise of <italic>q</italic>. Besides, with the augment of traffic load for each user average time delay become bigger generally in the form polygonal line which is very similar to the pattern demonstrated in <xref ref-type="fig" rid="fig-5">Fig. 5</xref>. Still, for a certain traffic load <italic>q</italic>, larger buffer size of the shared links would lead to smaller average time delay. Further, take the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;10 for example, average time delay of <italic>q</italic>&#x2009;&#x003D;&#x2009;3 is much bigger than that of <italic>q</italic>&#x2009;&#x003D;&#x2009;2. Additionally, there exist three jump points in the curve of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;10 which are the dots when <italic>q</italic>&#x2009;&#x003D;&#x2009;2, <italic>q</italic>&#x2009;&#x003D;&#x2009;3 and <italic>q</italic>&#x2009;&#x003D;&#x2009;4 respectively.</p>
<p>In the same way, the jump points in <xref ref-type="fig" rid="fig-7">Fig. 7</xref> will occur when <inline-formula id="ieqn-9"><mml:math id="mml-ieqn-9"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mn>4</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>4</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-10"><mml:math id="mml-ieqn-10"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mn>3</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-11"><mml:math id="mml-ieqn-11"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mrow><mml:mrow><mml:msub><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:msub></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>.</p>
<p>Theoretically, the methodology of SPN model-based modeling and performance evaluation in this paper can further be extended under the condition of the number of users being more than five. However, because of the complexity of SPN model and interactions among elements (i.e., places and transitions) the solution of the model will encounter the problem of state explosion.</p>
</sec>
<sec id="s5_2"><label>5.2</label><title>The Problem of State Explosion</title>
<p>We take &#x201C;tangible markings&#x201D; (abbr. Markings) and &#x201C;marking-to-marking transitions&#x201D; (abbr. Transitions) as two performance indices to investigate the complexity of SPN model of four users&#x2019; behaviors for SNS. Once the number of such performance indices becomes considerably large, it would cost much time of solving related model with SPNP software.</p>
<p><bold><italic>Case</italic> 5</bold>: In the case of <italic>q</italic>&#x2009;&#x003D;&#x2009;2, <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;2, <italic>&#x03BB;</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>3</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>4</sub>&#x2009;&#x003D;&#x2009;<italic>&#x03BB;</italic><sub>5</sub>&#x2009;&#x003D;&#x2009;0.25, the effect of number of data packets, buffer size of the shared links on the number of the model&#x2019;s states is illustrated in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. For the different parameters of <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;2, 4 6 and 8, eight corresponding series are plotted.</p>
<fig id="fig-8"><label>Figure 8</label><caption><title>The number of Reachable Graph States for the SPN model of four users&#x2019; behaviors for SNS</title></caption><graphic mimetype="image" mime-subtype="png" xlink:href="JIHPP_26440-fig-8.png"/></fig>
<p>From <xref ref-type="fig" rid="fig-8">Fig. 8</xref> we can observe that with the enlargement of <italic>N</italic>, the number of reachable graph states for the SPN model increases drastically and has the tendency of exponential growth. Moreover, the phenomenon is rather obvious by comparing the adjacent dots of various series of curves when <italic>N</italic>&#x2009;&#x003D;&#x2009;3 and <italic>N</italic>&#x2009;&#x003D;&#x2009;4. Still, it can be noticed that the number of Markings nearly reaches 24,000,000 which signs a large amount of states.</p>
<p>Besides, we make an in-depth experiment to calculate the average time delay of the SPN model of four users&#x2019; behaviors for SNS for the parameters of <italic>N</italic>&#x2009;&#x003D;&#x2009;5, <italic>q</italic>&#x2009;&#x003D;&#x2009;2, <italic>K</italic><sub>1</sub>&#x2009;&#x003D;&#x2009;2 and <italic>K</italic><sub>2</sub>&#x2009;&#x003D;&#x2009;8. However an exception occurs with the hint of &#x201C;EXIT: not enough memory&#x201D;. That is to say, for the SPN model of multiple users above five, we can hardly solve the model since this would be beyond the limitation of SPNP software&#x2019;s computation.</p>
</sec>
<sec id="s5_3"><label>5.3</label><title>General Conclusion on Jump Points of the Curves of Average Time Delay</title>
<p>Let <italic>K</italic> be the buffer size of shared links in social network system. Assume <italic>M</italic> be the number of users who compete in using shared links with each other. Additionally, the users&#x2019; behaviors are alike. Then we can deduce the general conclusion from the specific situation as follows.</p>
<p>The curve, which demonstrates the effect of q, K on average time delay, contains some jump points.</p>
<p>Such jump points arise when <inline-formula id="ieqn-12"><mml:math id="mml-ieqn-12"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mi>K</mml:mi><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mi>K</mml:mi><mml:mi>M</mml:mi></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mi>M</mml:mi></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>, <inline-formula id="ieqn-13"><mml:math id="mml-ieqn-13"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mi>K</mml:mi><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mi>K</mml:mi><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo></mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mi>M</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo></mml:mrow><mml:mn>1</mml:mn></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:mrow></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula>,&#x2026;, <inline-formula id="ieqn-14"><mml:math id="mml-ieqn-14"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mi>K</mml:mi><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mi>K</mml:mi><mml:mn>3</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>3</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> and <inline-formula id="ieqn-15"><mml:math id="mml-ieqn-15"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>&#x230A;</mml:mo><mml:mrow><mml:mrow><mml:mi>K</mml:mi><mml:mrow><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true">/</mml:mo><mml:mrow><mml:mrow><mml:mpadded width="0"><mml:mphantom><mml:mi>K</mml:mi><mml:mn>2</mml:mn></mml:mphantom></mml:mpadded></mml:mrow></mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:mrow><mml:mo>&#x230B;</mml:mo></mml:mrow><mml:mo>+</mml:mo><mml:mn>1</mml:mn></mml:math></inline-formula> where <italic>q</italic>&#x2009;&#x2265;&#x2009;3.</p>
</sec>
</sec>
<sec id="s6"><label>6</label><title>Conclusion</title>
<p>Based on the analysis of social network system&#x2019;s characteristics, this paper constructs two SPN models to evaluate three users&#x2019; behaviors of SNS under the situation of three users and four users respectively. Four case studies are conducted correspondingly to analyze different parameters&#x2019; effects on average time delay for three users and four users by comparison. Also, the problem of State Explosion is discussed which demonstrates the limitation of performance analysis of SPN model for more complex parameters with bigger values with SPNP 6.0 software. Therefore, the trend that average time delay varies with number of data packets, traffic load, buffer size of the shared links are illustrated. Finally, conclusion on some jump points, which reflects dramatic increase of each user&#x2019;s average time delay, is derived thereby. Further works on analysis of social network system can be carried on.</p>
</sec>
</body>
<back>
<fn-group>
<fn fn-type="other"><p><bold>Funding Statement:</bold> The research work was supported by the Excellent Young Teachers Training Project (the second level, Project Number: YXJS201508), Teaching reform projects of Communication University of China (Project Number: JG190033, Project Number: JG22062).</p></fn>
<fn fn-type="conflict"><p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p></fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Daouah</surname></string-name>, <string-name><given-names>A.</given-names> <surname>Abou El Kalam</surname></string-name> and <string-name><given-names>A.</given-names> <surname>Ait Ouahman</surname></string-name></person-group>, &#x201C;<article-title>Social networks services: Survey</article-title>,&#x201D; in <conf-name>Proc. 2013 National Security Days (JNS3)</conf-name>, <conf-loc>Rabat, Morocco</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>4</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Irfan</surname></string-name>, <string-name><given-names>G.</given-names> <surname>Bickler</surname></string-name>, <string-name><given-names>S. U.</given-names> <surname>Khan</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Kolodziej</surname></string-name>, <string-name><given-names>H. X.</given-names> <surname>Li</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Survey on social networking services</article-title>,&#x201D; <source>Networks, IET</source>, vol. <volume>2</volume>, no. <issue>4</issue>, pp. <fpage>224</fpage>&#x2013;<lpage>234</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>J. S.</given-names> <surname>Kim</surname></string-name>, <string-name><given-names>M. H.</given-names> <surname>Yang</surname></string-name>, Y. J. Hwang, S. H. Jeon, K. Y. Kim <etal>et al.,</etal></person-group> &#x201C;<article-title>Customer preference analysis based on SNS data</article-title>,&#x201D; in <conf-name>Proc. 2nd Int. Conf. on Cloud and Green Computing (CGC)</conf-name>, <conf-loc>Xiangtan, Hunan, China</conf-loc>, pp. <fpage>609</fpage>&#x2013;<lpage>613</lpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>H. Y.</given-names> <surname>Jeong</surname></string-name>, <string-name><given-names>J. H.</given-names> <surname>Park</surname></string-name>, Y. S. Jeong and D. S. Park</person-group>, &#x201C;<article-title>Petri-net based user profile data ontology for SNS</article-title>,&#x201D; in <conf-name>Proc. 27th Int. Conf. on Advanced Information Networking and Applications Workshops (WAINA)</conf-name>, <conf-loc>Barcelona, Spain</conf-loc>, pp. <fpage>744</fpage>&#x2013;<fpage>748</fpage>, <year>2013</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>S. Y.</given-names> <surname>Kim</surname></string-name></person-group>, &#x201C;<article-title>Modeling and analysis of a web-based collaborative enterprise using petri nets</article-title>,&#x201D; in <conf-name>Proc. IEEE Int. Conf. on Information Reuse and Integration</conf-name>, <conf-loc>Las Vegas, NV, USA</conf-loc>, pp. <fpage>422</fpage>&#x2013;<lpage>428</lpage>, <year>2008</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Kwangyeol</surname></string-name> and <string-name><given-names>E.</given-names> <surname>Yucesan</surname></string-name></person-group>, &#x201C;<article-title>A novel method of modeling collaborative processes in manufacturing</article-title>,&#x201D; in <conf-name>Proc. 9th Int. Conf. on Computer Supported Cooperative Work in Design</conf-name>, <conf-loc>Coventry, UK</conf-loc>, vol. <volume>2</volume>, pp. <fpage>1082</fpage>&#x2013;<lpage>1087</lpage>, <year>2005</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>C. A.</given-names> <surname>Petri</surname></string-name></person-group>, &#x201C;<article-title>Kommunkation mit automaten&#x201D;, Bonn: Institut fur lnstrum entelle mathematik, schriften des IIM Nr. 3(1962). Also English translation, &#x201C;Communication with automata&#x201D;</article-title>. <source>Technical Report RADC-TR-65-377</source>, <publisher-loc>New York</publisher-loc>, <publisher-name>Rome Air Dev. Center</publisher-name>, <year>1966</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Xiong</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Murata</surname></string-name>, and <string-name><given-names>J.</given-names> <surname>Tsai</surname></string-name></person-group>, &#x201C;<article-title>Modeling and simulation of routing protocol for mobile ad hoc networks using colored petri nets, research and practice in information technol</article-title>,&#x201D; <source>Australian Computer Society</source>, vol. <volume>12</volume>, pp. <fpage>145</fpage>&#x2013;<lpage>153</lpage>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="other"><person-group person-group-type="author"><string-name><given-names>J.</given-names> <surname>Wise</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Xia</surname></string-name>, <string-name><given-names>C. K.</given-names> <surname>Chang</surname></string-name>, and <string-name><given-names>J. C.</given-names> <surname>Huang</surname></string-name></person-group>, &#x201C;<article-title>Performance analysis based on requirements traceability</article-title>,&#x201D; <italic>Tech. Rep. 05-04</italic>, <publisher-name>Dept. Computer Science, Iowa State Univ.</publisher-name> <year>2005</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>D.</given-names> <surname>Radha</surname></string-name> and <string-name><given-names>P. T.</given-names> <surname>Nithia</surname></string-name></person-group>, &#x201C;<article-title>A case study on social network analysis: Thesaurus book</article-title>,&#x201D; in <conf-name>Proc. 2nd Int. Conf. on Computational Systems and Information Technology for Sustainable Solution (CSITSS)</conf-name>, <conf-loc>Bangalore</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Ade-Ibijola</surname></string-name></person-group>, &#x201C;<article-title>Synthesis of hypothetical sociograms for social network analysis</article-title>,&#x201D; in <conf-name>Proc. 5th Int. Conf. on Soft Computing &#x0026; Machine Intelligence (ISCMI)</conf-name>, <conf-loc>Nairobi, Kenya</conf-loc>, pp. <fpage>79</fpage>&#x2013;<lpage>83</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="conf-proc"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Laghridat</surname></string-name>, <string-name><given-names>I.</given-names> <surname>Mounir</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Essalih</surname></string-name></person-group>, &#x201C;<article-title>Analyzing friendship&#x2019;s social networks using the topological indices</article-title>,&#x201D; in <conf-name>Proc. 2019 Int. Conf. on Wireless Networks and Mobile Communications (WINCOM)</conf-name>, <conf-loc>Fez, Morocco</conf-loc>, pp. <fpage>1</fpage>&#x2013;<lpage>5</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>H.</given-names> <surname>Yuliansyah</surname></string-name>, <string-name><given-names>Z. A.</given-names> <surname>Othman</surname></string-name> and <string-name><given-names>A. A.</given-names> <surname>Bakar</surname></string-name></person-group>, &#x201C;<article-title>Taxonomy of link prediction for social network analysis: A review</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, pp. <fpage>183470</fpage>&#x2013;<lpage>183487</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Lin</surname></string-name>, <string-name><given-names>Y. J.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>Z. M.</given-names> <surname>Wang</surname></string-name></person-group>, &#x201C;<article-title>Status and development of formal methods for performance evaluation</article-title>,&#x201D; <source>Acta Electronica Sinica</source>, vol. <volume>30</volume>, no. <issue>12A</issue>, pp. <fpage>1917</fpage>&#x2013;<lpage>1922</lpage>, <year>2002</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>M. A.</given-names> <surname>Marson</surname></string-name></person-group>, &#x201C;<chapter-title>Stochastic petri nets: An elementary introduction</chapter-title>,&#x201D; in <source>Lecture Notes in Computer Science</source>, <volume>424</volume>, <publisher-loc>New York</publisher-loc>: <publisher-name>Springer-Verlag</publisher-name>, <year>1989</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Hirel</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Tuffin</surname></string-name>, <string-name><given-names>K. S.</given-names> <surname>Trivedi</surname></string-name></person-group>, &#x201C;<article-title>SPNP: Stochastic petri nets. Version 6.0</article-title>,&#x201D; <source>Lecture Notes in Computer Science</source>, vol. <volume>1786</volume>, pp. <fpage>354</fpage>&#x2013;<lpage>357</lpage>, <year>2000</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><given-names>C.</given-names> <surname>Lin</surname></string-name></person-group>, <italic>Stochastic Petri Nets and System Performance Evaluation.</italic> <publisher-loc>Beijing</publisher-loc>: <publisher-name>Tsinghua University Press</publisher-name>, <year>2005</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>