Detecting Data-model-oriented Anomalies in Parallel Business Process

Author(s):  
Ning Yin ◽  
Shanshan Wang ◽  
Hongyan Li ◽  
Lilue Fan
Keyword(s):  
2018 ◽  
Vol 2 (4-2) ◽  
pp. 349
Author(s):  
Ivaylo Kamenarov ◽  
Katalina Grigorova

This paper describes the internal data model for a business process generator. Business process models are stored in an Event-driven process chain notation that provides a natural way to link the individual elements of a process. There is a software architecture that makes it easy to communicate with users as well as external systems.


2017 ◽  
Vol 15 (4) ◽  
pp. 729-736 ◽  
Author(s):  
Carla Sepulveda ◽  
Ania Cravero ◽  
Carlos Cares

2021 ◽  
pp. 25-32
Author(s):  
Andrey Belikov ◽  

In this paper the existing in PDM-system business-process of design documentation shop-to-shop routing and its study on technological effectiveness at SRC «Progress» is considered. General approach to the organization of dual paper-electronic process at the enterprise is described. This approach allows quick study of design documentation depending on its type (paper or electronic). The analysis of the existing process with definition of its merits and demerits is carried out. Considering analysis results, proposals on process modernization are developed. The project documentation and work plan were prepared. Software is developed for the modernized process. During the tests of process its working capacity was already confirmed and essential decrease in creation time of objects in PDM-system is revealed. As a result this fact will allow to reduce users’ working time. In this particular work the need for the special software is considered, which will automatically translate the existing information objects in PDM-system from old data model to new data model. The direction for business process digitalization and exception of enterprise employees labor costs on paper documentation movement between departments is defined.


2013 ◽  
Vol 2013 ◽  
pp. 1-12 ◽  
Author(s):  
Satoshi Kubota ◽  
Ichizou Mikami

The primary objective of this paper is to develop the product data models, in which systematic information is defined for accumulating, exchanging, and sharing in the maintenance of concrete highway bridges. The information requirement and existing issues and solutions were analyzed based on the life cycle and the standardization for sharing. The member data models and business data models that defined design and construction information and accumulated results information were developed. The maintenance business process in which project participants utilize the product data model was described as utilization scenario. The utilization frameworks which define information flow were developed.


Author(s):  
Montserrat Estañol ◽  
Ángel Varela-Vaca ◽  
María Gómez-López ◽  
Ernest Teniente ◽  
Rafael Gasca

The inclusion of security aspects in organizations is a crucial aspect to ensure compliance with both internal and external regulations. Business process models are a well-known mechanism to describe and automate the activities of the organizations, which should include security policies to ensure the correct performance of the daily activities. Frequently, these security policies involve complex data which cannot be represented using the standard Business Process Model Notation (BPMN). In this paper, we propose the enrichment of the BPMN with a UML class diagram to describe the data model, that is also combined with security policies defined using the UCONABC framework annotated within the business process model. The integration of the business process model, the data model, and the security policies provides a context where more complex reasoning can be applied about the satisfiability of the security policies in accordance with the business process and data models. To do so, we transform the original models, including security policies, into the BAUML framework (an artifact-centric approach to business process modelling). Once this is done, it is possible to ensure that there are no inherent errors in the model (verification) and that it fulfils the business requirements (validation), thus ensuring that the business process and the security policies are compatible and that they are aligned with the business security requirements.


2004 ◽  
Vol 124 (9) ◽  
pp. 1827-1833
Author(s):  
Isao Yamada ◽  
Satoshi Kumagai ◽  
Toyohiko Hirota

2010 ◽  
Vol 33 (8) ◽  
pp. 1349-1358 ◽  
Author(s):  
Zhi-Qiang LIU ◽  
Hong-Yan LI ◽  
Lei WANG ◽  
Qiang QU

Sign in / Sign up

Export Citation Format

Share Document