Font Size: a A A

Analyzing The Change Of The Business Process Model Based On Event Log

Posted on:2016-04-17Degree:MasterType:Thesis
Country:ChinaCandidate:J J WangFull Text:PDF
GTID:2298330467989773Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
Business process management includes process design and implementation, model establishment and analysis, and execution, etc. The development trend of information technology of work-flow management system and software system makes business process management become more and more important. In the field of business process management process model is the foundation, the process model can not only configuration information system, but also can analyze the change process and improve the process. So analyzing the change of the process model and constructing the process model is of great importance to the development of the business process in the field of business process management (BPM).At present, process model is studied from the structure and behavior those two aspects. The study of process behavior and structure is achieved by the analysis of change region, mining and configuration of process model. Change analysis research is mainly based on the known original model and target model, and the changes of the original model that are given. For the absence of the original process model and change point, analyzing the change of model have limitations. At the same time, the process mining methods mostly depend on a algorithm mine models through the event log, but less person study the process mining about behavior constraint. The paper researches the behavior and the structure based on behavior profile, event log and configuration constraints, mainly includes the following two aspects:(1)For unknown original model and process model, change domain analysis method of process model based on behavior profile and log is put forward. Process model change domain research mainly on the basis of the static analysis, according to the given changes node, original model and target model, the scope of the change is searched through changes propagated theory, but this method has limitations. The behavior profile relations of process model are presented to the event log, and the transitions in event log are categorized to determine the relationship between transitions. Then transitions between event log and target model will be matched through the complex corresponding relationship, based thereon, the change region can be confirmed. Finally, an example verifies that the method is effectively.(2) Process mining is a hot spot in research of business process management, and the existing mining algorithms, such as the a algorithm, mine process model based on process profile relations of Petri net and structural properties of the process model. However, the excavated process model covers the general behavior of log, for hidden changes in behavior constraints problem, the existing mining methods have limitations. For the implicit transformation behavior constraint problems, the paper proposes the mining method of business process model based on configuration constraints. The core of the method is excavated configurable business process model, and depending on the order relationship of the log, the behavior relationship among transitions and the flow relationship between transitions and places can be determined, after this, preliminary process model is established. According to quality dimensions we can make measure on the model and improve the model by incremental log. Then the configurable model is mined by combining the configuration constraints. The method fully considers the behavior constraint of model mining, and it is useful to improve the accuracy of the model.
Keywords/Search Tags:event log, Petri net, configured constrain, process model, change region
PDF Full Text Request
Related items