Development of the technology for changing the sequence of access to shared resources of business processes for process management support
DOI:
https://doi.org/10.15587/1729-4061.2020.198527Keywords:
business process, process management, resource, event, event log, case, delay in access to resourcesAbstract
The model of the event log of the information system has been improved. The model contains the sequences of events consistent with implemented sequences of management actions within both the process approach and functional management approach. A strict linear order in time was assigned for each pair of events belonging to the same process. The model is designed to describe the prototype of the as-is business process.
A case-based model of a business process, describing the features of its known implementations, reflected in the event log, has been proposed. The model combines a set of implemented sequences of operations of each process and takes into consideration the time to implement these operations, as well as the resources they need. When describing the time to implement the operations of a process, delays in accessing the company’s shared resources are taken into consideration. The model makes it possible to predict the terms of completing the set of business processes competing for the resources when removing or adding new processes to this set.
The technology for changing the sequence of access to resources for a set of business processes competing for these resources within the process management was developed. The proposed technology uses the case-based model of a business process to calculate the order of access to resources. The technology provides an opportunity to calculate the total reduction in delays over the implementation time in relation to the implementation terms when processes are competing for resources. The technology makes it possible to choose how to access resources with the least delay in relation to operations completion deadlines for the known variants of a business process implementation. This enables a DM to assess the possibility of launching new processes that use shared resources by reducing the waiting time when accessing these resourcesReferences
- Van der Aalst, W. M. P. (2013). Business Process Management: A Comprehensive Survey. ISRN Software Engineering, 2013, 1–37. doi: https://doi.org/10.1155/2013/507984
- Vom Brocke, J., Rosemann, M. (Eds.) (2015). Handbook on Business Process Management 1. Introduction, Methods, and Information Systems. Springer. doi: https://doi.org/10.1007/978-3-642-45100-3
- Smirnov, S., Weidlich, M., Mendling, J. (2010). Business Process Model Abstraction Based on Behavioral Profiles. Lecture Notes in Computer Science, 1–16. doi: https://doi.org/10.1007/978-3-642-17358-5_1
- Maddern, H., Smart, P. A., Maull, R. S., Childe, S. (2013). End-to-end process management: implications for theory and practice. Production Planning & Control, 25 (16), 1303–1321. doi: https://doi.org/10.1080/09537287.2013.832821
- Frye, D. W., Gulledge, T. R. (2007). End‐to‐end business process scenarios. Industrial Management & Data Systems, 107 (6), 749–761. doi: https://doi.org/10.1108/02635570710758707
- Davis, R. (2011). Processes in Practice: It’s the Customer Journey that Counts. BPTrends.
- Van der Aalst, W. M. P. (2011). Mining: Discovery, Conformance and Enhancement of Business Processes. Springer. doi: https://doi.org/10.1007/978-3-642-19345-3
- Müller, D., Reichert, M., Herbst, J. (2007). Data-Driven Modeling and Coordination of Large Process Structures. Lecture Notes in Computer Science, 131–149. doi: https://doi.org/10.1007/978-3-540-76848-7_10
- Van der Aalst, W. M. P. (2019). 20 Years of Process Mining Research – Accomplishments, Challenges, and Open Problems. 1st International Conference on Process Mining.
- Van der Aalst, W. M. P. (2014). Process Mining in the Large: A Tutorial. Lecture Notes in Business Information Processing, 33–76. doi: https://doi.org/10.1007/978-3-319-05461-2_2
- Gunther, C. W., Ma, S. R., Reichert, M., Aalst, W. M. P. V. D., Recker, J. (2008). Using process mining to learn from process changes in evolutionary systems. International Journal of Business Process Integration and Management, 3 (1), 61. doi: https://doi.org/10.1504/ijbpim.2008.019348
- Sergii, C., Ihor, L., Aleksandr, P., Ievgen, B. (2018). Causality-based model checking in business process management tasks. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). doi: https://doi.org/10.1109/dessert.2018.8409176
- Kalenkova, A. A., van der Aalst, W. M. P., Lomazova, I. A., Rubin, V. A. (2015). Process mining using BPMN: relating event logs and process models. Software & Systems Modeling, 16 (4), 1019–1048. doi: https://doi.org/10.1007/s10270-015-0502-0
- Levykin, V., Chala, O. (2018). Development of a method for the probabilistic inference of sequences of a business process activities to support the business process management. Eastern-European Journal of Enterprise Technologies, 5 (3 (95)), 16–24. doi: https://doi.org/10.15587/1729-4061.2018.142664
- Kalynychenko, O., Chalyi, S., Bodyanskiy, Y., Golian, V., Golian, N. (2013). Implementation of search mechanism for implicit dependences in process mining. 2013 IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS). doi: https://doi.org/10.1109/idaacs.2013.6662657
- Bodyanskiy, Y., Kulishova, N., Chala, O. (2018). The Extended Multidimensional Neo-Fuzzy System and Its Fast Learning in Pattern Recognition Tasks. Data, 3 (4), 63. doi: https://doi.org/10.3390/data3040063
- Kuchuk, N., Mozhaiev, O., Mozhaiev, M., Kuchuk, H. (2017). Method for calculating of R-learning traffic peakedness. 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T). doi: https://doi.org/10.1109/infocommst.2017.8246416
- Chalyi, S., Pribylnova, I. (2019). The method of constructing recommendations online on the temporal dynamics of user interests using multilayer graph. EUREKA: Physics and Engineering, 3, 13–19. doi: https://doi.org/10.21303/2461-4262.2019.00894
- Chalyi, S., Leshchynskyi, V., Leshchynska, I. (2019). Method of forming recommendations using temporal constraints in a situation of cyclic cold start of the recommender system. EUREKA: Physics and Engineering, 4, 34–40. doi: https://doi.org/10.21303/2461-4262.2019.00952
- Chala, O., Novikova, L., Chernyshova, L. (2019). Method for detecting shilling attacks in e-commerce systems using weighted temporal rules. EUREKA: Physics and Engineering, 5, 29–36. doi: https://doi.org/10.21303/2461-4262.2019.00983
- Pavlenko, V., Shostak, I., Morozova, O., Danova, M. (2018). Information support for business processes at virtual enterprises with multi-agent technologies. 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT). doi: https://doi.org/10.1109/dessert.2018.8409189
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Serhii Chalyi, Ihor Levykin, Andrii Biziuk, Aleksandr Vovk, Ievgen Bogatov
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.