Browse > Article
http://dx.doi.org/10.6109/jicce.2011.9.4.379

Process Evaluation Model based on Goal-Scenario for Business Activity Monitoring  

Baek, Su-Jin (Department of Computer Engineering, KyungHee University)
Song, Young-Jae (Department of Computer Engineering, KyungHee University)
Abstract
The scope of the problems that could be solved by monitoring and the improvement of the recognition time is directly correlated to the performance of the management function of the business process. However, the current monitoring process of business activities decides whether to apply warnings or not by assuming a fixed environment and showing expressions based on the design rules. Also, warnings are applied by carrying out the measuring process when the event attribute values are inserted at every point. Therefore, there is a limit for distinguishing the range of occurrence and the level of severity in regard to the new external problems occurring in a complicated environment. Such problems cannot be ed. Also, since it is difficult to expand the range of problems which can be possibly evaluated, it is impossible to evaluate any unexpected situation which could occur in the execution period. In this paper, a process-evaluating model based on the goal scenario is suggested to provide constant services through the current monitoring process in regard to the service demands of the new scenario which occurs outside. The new demands based on the outside situation are analyzed according to the goal scenario for the process activities. Also, by using the meta-heuristic algorithm, a similar process model is found and identified by combining similarity and interrelationship. The process can be stopped in advance or adjusted to the wanted direction.
Keywords
workflow system; adaptive business process; business activity monitoring;
Citations & Related Records
연도 인용수 순위
  • Reference
1 IDS Scheer, ARIS process performance manage, IDS Scheer, 2006.
2 Dresner, H. "Business Activity Monitoring: BAM Architecture", Gartner Symposium ITXPO, Cannes, France, November 2003.
3 Anand Ranganathan, Roy H. Campbell, "An infrastructure for context-awareness based on first order logic", Personal and Ubiquitous Computing, Vol. 7 no.6, pp.353-364, 2003.   DOI   ScienceOn
4 Camci, F. and Chinnam, R. B., "General support vector representation machine for one-class classification of non-stationary classes," Pattern Recognition, 41(10), 3021-3034, 2008.   DOI   ScienceOn
5 Grigori, D., Casati, F., Castellanos, M., Dayal, U., sayal, M., and Shan, M-C, "Business Process Intelligence", Computers in Industry, 53, 321-343, 2004.   DOI   ScienceOn
6 Abadeh, M. S., Habibi, J., Barzegar, Z, and Sergi, M, "A parallel gentic local search algorithm for intrusion detection in computer networks," Engineering Applications of Artificial Intelligence, 20(8), 1058-1069, 2007.   DOI   ScienceOn
7 Sharma, A., Pujari, A. K., and Paliwal, K. K. "Intrusion detection using text processing techniques with a kernel based similarity measure", Computers and Security, 26, 488-495, 2007.   DOI   ScienceOn
8 Srinivasan, s., Krishna, V., Holmes, S., "Web-log-driven business activity monitoring," IEEE Computer, Vol. 38(3), pp 61-68, 2005.
9 Sonnen, D., Morris, H.D., Businessfactor : Event-driven business performance management White paper. IDC, 2004.
10 FileNet, Filenet process analyzer, FileNet, 2006.