DOI QR코드

DOI QR Code

Process Evaluation Model based on Goal-Scenario for Business Activity Monitoring

  • Baek, Su-Jin (Department of Computer Engineering, KyungHee University) ;
  • Song, Young-Jae (Department of Computer Engineering, KyungHee University)
  • Received : 2011.06.04
  • Accepted : 2011.07.18
  • Published : 2011.08.31

Abstract

The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. However, the current monitoring process of business activities decides whether to apply warnings or not by assuming a fixed environment and showing expressions based on the design rules. Also, warnings are applied by carrying out the measuring process when the event attribute values are inserted at every point. Therefore, there is a limit for distinguishing the range of occurrence and the level of severity in regard to the new external problems occurring in a complicated environment. Such problems cannot be ed. Also, since it is difficult to expand the range of problems which can be possibly evaluated, it is impossible to evaluate any unexpected situation which could occur in the execution period. In this paper, a process-evaluating model based on the goal scenario is suggested to provide constant services through the current monitoring process in regard to the service demands of the new scenario which occurs outside. The new demands based on the outside situation are analyzed according to the goal scenario for the process activities. Also, by using the meta-heuristic algorithm, a similar process model is found and identified by combining similarity and interrelationship. The process can be stopped in advance or adjusted to the wanted direction.

Keywords

References

  1. Dresner, H. "Business Activity Monitoring: BAM Architecture", Gartner Symposium ITXPO, Cannes, France, November 2003.
  2. Anand Ranganathan, Roy H. Campbell, "An infrastructure for context-awareness based on first order logic", Personal and Ubiquitous Computing, Vol. 7 no.6, pp.353-364, 2003. https://doi.org/10.1007/s00779-003-0251-x
  3. Camci, F. and Chinnam, R. B., "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10), 3021-3034, 2008. https://doi.org/10.1016/j.patcog.2008.04.001
  4. Grigori, D., Casati, F., Castellanos, M., Dayal, U., sayal, M., and Shan, M-C, "Business Process Intelligence", Computers in Industry, 53, 321-343, 2004. https://doi.org/10.1016/j.compind.2003.10.007
  5. Abadeh, M. S., Habibi, J., Barzegar, Z, and Sergi, M, "A parallel gentic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8), 1058-1069, 2007. https://doi.org/10.1016/j.engappai.2007.02.007
  6. Sharma, A., Pujari, A. K., and Paliwal, K. K. "Intrusion detection using text processing techniques with a kernel based similarity measure", Computers and Security, 26, 488-495, 2007. https://doi.org/10.1016/j.cose.2007.10.003
  7. Srinivasan, s., Krishna, V., Holmes, S., "Web-log-driven business activity monitoring," IEEE Computer, Vol. 38(3), pp 61-68, 2005.
  8. Sonnen, D., Morris, H.D., Businessfactor : Event-driven business performance management White paper. IDC, 2004.
  9. FileNet, Filenet process analyzer, FileNet, 2006.
  10. IDS Scheer, ARIS process performance manage, IDS Scheer, 2006.