簡易檢索 / 詳目顯示

研究生: 賴冠霖
Guan-Lin Lai
論文名稱: 企業流程邏輯法則之探勘與應用
Workflow Pattern mining and Its applications
指導教授: 歐陽超
Chao Ou-Yang
口試委員: 王孔政
Kung-Jeng Wang
阮業春
Yeh-Chun Juan
學位類別: 碩士
Master
系所名稱: 管理學院 - 工業管理系
Department of Industrial Management
論文出版年: 2010
畢業學年度: 98
語文別: 中文
論文頁數: 89
中文關鍵詞: 企業法則流程探勘
外文關鍵詞: Business rules, Process Mining
相關次數: 點閱:173下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報

流程導向ERP系統在運行時會將執行活動之過程記錄在事件記錄檔(Event Logs)中。而這些作業活動往往有相互之關聯性,吾人可稱其為企業作業法則(business activity rules)。但是企業主管面對龐大且未經整理的企業活動資料,往往不易分析出其間所隱含之企業法則。因此若能從龐大事件記錄檔當中探勘出相關之企業作業法則,對於企業管理或稽核人員將會有所幫助。
本研究以基因流程探勘方法(Genetic Process Mining Algorithm)以及Alpha流程探勘方法(Alpha Process Mining Algorithm)為基,運用其探勘事件記錄檔所產生之因果矩陣,發展一套分析作業邏輯關聯法則之方法,最後並產生以Petri Net為基之企業邏輯法則(Business rules),本文中簡稱為企業法則。
研究方法主要包含概念分析階段、設計階段以及實作階段。在概念分析階段本研究將探討企業流程活動、事件記錄檔、基因流程探勘方法、Alpha流程探勘方法以及企業法則。在設計階段將提出本研究所發展之演算方法以及如何應用該方法自因果矩陣中分析出單階與多階之企業法則。在實作階段,本研究第一個案例以國內某一電子上市公司之申購簽核流程事件記錄檔為例,使用本研究發展之方法,希望能探勘出企業在執行作業時的企業法則以作為管理人員決策之參考。第二個案例我們以國內某知名醫院之急性中風就診住院流程事件記錄檔為例,希望能探勘出該醫院執行急性中風就診住院醫療流程時是否存在不符合標準流程參考模型之特殊活動作業。


Process oriented ERP system will store the activities records in the event logs. In general, there exist certain interrelationships among these activities called “business activities rules”. However, it would be difficult for manager to identify these embedded business rules from the event logs. Therefore, if a mining approach can be developed to discover these rules, it can be used as reference information in the management level function such as auditing.
In this research, an approach based on genetic process mining algorithm to discover the business rules will be developed. The logical relationships among the process activities will be identified based on the causal matrix generated from genetic mining algorithm. The identified relationships will then be transformed to Petri-net based business activities rules.
A three-level developing framework will be proposed. In the conceptual level, the relationships among the process activities, event logs, genetic mining and business activities rules will be discussed, as well as the types of logical relationships among the activities will be studied. Then, in the design specification level, an algorithm will be proposed to discover the single-level and multi-level business rules from the causal matrix. In the implementation level, an event log for activity changing process from SAP R/3 will be used to as an empirical test. It is expected that certain business rules about the changing activities can be discovered.

研究摘要…………………………………………………………………………………………Ⅰ Abstract…………………………………………………………………………………………Ⅱ 致謝………………………………………………………………………………………………Ⅲ 目錄………………………………………………………………………………………………Ⅳ 圖目錄……………………………………………………………………………………………Ⅵ 表目錄……………………………………………………………………………………………Ⅷ 第一章緒論……………………………………………………………………………………1 1.1研究背景………………………………………………………………………………1 1.2研究目的………………………………………………………………………………3 第二章文獻探討與背景介紹…………………………………………………………………4 2.1商業流程模型…………………………………………………………………………4 2.2預先流程探勘作業……………………………………………………………………6 2.3流程模型相關定義……………………………………………………………………9 2.4流程探勘技術…………………………………………………………………………14 2.5企業法則………………………………………………………………………………18 第三章研究方法架構…………………………………………………………………………20 3.1概念分析階段…………………………………………………………………………23 3.1.1  企業活動………………………………………………………………………………23 3.1.2   流程探勘………………………………………………………………………………23 3.1.3   定義企業法則…………………………………………………………………………24 3.1.4  企業法則………………………………………………………………………………30 3.2設計階段………………………………………………………………………………32 3.2.1  事件記錄檔……………………………………………………………………………33 3.2.2  流程探勘方法…………………………………………………………………………34 3.2.3  差異作業………………………………………………………………………………34 3.2.4   因果矩陣轉換企業法則方法…………………………………………………………37 3.2.4.1 因果矩陣轉換企業法則方法之目的與概念…………………………………………39 3.2.4.2 因果矩陣轉換企業法則方法之操作方法……………………………………………41 3.2.5  案例解析………………………………………………………………………………53 第四章實作研究………………………………………………………………………………57 4.1系統架構………………………………………………………………………………57 4.1.1  ProM流程探勘工具……………………………………………………………………57 4.1.2  使用者介面……………………………………………………………………………58 4.1.3  實作環境………………………………………………………………………………58 4.1.4  實作研究限制…………………………………………………………………………58 4.2   個案實作………………………………………………………………………………59 4.2.1  個案實作『申購簽核流程』…………………………………………………………59 4.2.2  個案實作『急性中風就診住院流程』………………………………………………69 第五章結論與建議……………………………………………………………………………82 5.1結論……………………………………………………………………………………82 5.2   研究貢獻………………………………………………………………………………82 5.3   未來研究建議…………………………………………………………………………83 參考文獻…………………………………………………………………………………………85

[1]W.M.P. van der Aalst, K.M. van Hee, “Workflow Management: Models, Methods, and Systems”, MIT press, Cambridge, MA, 2002
[2]W.M.P. van der Aalst, “Formalization and Verification of Even-driven Process Chains”, Information and Software Technology, Vol. 41, pp.639-650, 1999
[3]T. Murata, “Petri Nets: Properties, Analysis and Applications”, Proceedings of the IEEE, Vol. 77, No. 4, pp.541-580, 1989
[4]K. Yamalidou, J.O. Moody, M.D. Lemmon, P.J. Antsaklis, “Feedback Control of Petri Nets Based on Place Invariants”, Automatica, Vol. 32, No. 1, pp.15-28, 1996
[5]T.H. Davenport, J.E. Short, “The New Industrial Engineering: Information Technology and Business Redesign”, Sloan Management Review, Vol. 31, No. 4, pp.11-27, 1990
[6]J. Mendling, G. Neumann, M. Nüttgens, “Yet Another Event-Driven Process Chain”, BPM 2005, Lecture Notes in Computer Science 3649, Springer-Verlag , Nancy, France, pp. 428-433, 2005
[7]J. Mendling, G. Neumann, M. Nüttgens, “Towards Workflow Pattern Support of Event-Driven Process Chains (EPC)”, BTW 2005, Karlsruhe, Germany, CEUR Workshop Proceedings, Vol. 145, pp. 23-38, 2005
[8]J. Mendling, M. Moser, G. Neumann, “Transformation of yEPC Business Process Models to YAWL”, SAC 2006, Dijon, France, Vol. 2, pp. 1262-1267, 2006
[9]J. Mendling, J. Ziemann, “Transformation of BPEL Processes to EPCs”, EPK 2005, Hamburg, Germany, Vol. 167, pp. 41-53, 2005
[10]J. Mendling, W.M.P. van der Aalst, B.F. van Dongen, H.M.W. Verbeek, “ Errors in the SAP Reference Model”, BPTrends, pp. 1-5, 2006
[11]J. Mendling, M. Moser, G. Neumann, H.M.W. Verbeek, B.F. van Dongen, W.M.P. van der Aalst, “Faulty EPCs in the SAP Reference Model”, BPM 2006, Vienna, Austria, Vol. 4102, pp.451-457, 2006
[12]R. David, H. Alla, “Modeling of Dynamic Systems by Petri Nets”, 1st European Control Conf., Grenoble, pp.136-147, 1991
[13]W.M.P. van der Aalst, “The Application of Petri Nets to Workflow Management”, The Journal of Circuits, Systems and Computers, Vol. 8, No. 1, 1998, pp. 21-66.
[14]S. Christensen, L. Petrucci, ”Modular Analysis of Petri Nets”, The Computer Journal, Vol. 43, No. 3, pp. 224-242, 2000
[15]L. Petrucci, “Modularity Petri Nets”, ISPS’2005, Algiers, Algeria, pp. 7-9, 2005
[16]S. Hinz, K. Schmidt, C. Stahl, “Transforming BPEL to Petri Nets”, BPM2005, Nancy, France, pp. 220-235, 2005
[17]F.B. Vernadat, “Enterprise Modeling and Integration - Principles and Applications”, Chapman and Hall, 1996
[18]W.M.P. van der Aalst, A.H.M. ter Hofstede, B. Kiepuszewski, A.P. Barros, “Workflow Patterns”, Distributed and Parallel Databases, Vol. 14, No. 1, pp. 5-51, 2003
[19]N. Russell, A.H.M. ter Hofstede, D. Edmond, W.M.P. van der Aalst, “Workflow Data Patterns”, QUT Technical report, Brisbane, 2004
[20]N. Russell, A.H.M. ter Hofstede, D. Edmond, W.M.P. van der Aalst, “Workflow Resource Patterns”, BETA Working Paper Series , EUT, Eindhoven, 2004
[21]N. Russell, W.M.P. van der Aalst, A.H.M. ter Hofstede, “Workflow Exception Patterns”, CAiSE'06, Vol. 4001, Berlin, pp. 288-302, 2006
[22]E. Oren, A. Haller, “Formal Frameworks for Workflow Modelling”, DERI Technical Report, pp. 1-21, 2005
[23]R. Liu, A. Kumar, “An Analysis and Taxonomy of Unstructured Workflows”, BPM2005, Nancy, France, pp. 268-284, 2005
[24]J.E. Ingvaldsen, J.A. Gulla, “Preprocessing Support for Large Scale Process Mining of SAP Transactions”, Business Process Management Workshops 2007 pp.30-41, 2007
[25]W.M.P. van der Aalst, A.K. Alves de Medeiros, A.J.M.M. Weijters, “Genetic Process Mining”, Lecture Notes in Computer Science, Vol.3536, pp.48-69, 2005
[26]A.K. Alves de Medeiros, A.J.M.M. Weijters, W.M.P. van der Aalst, “Using Genetic Algorithms to Mine Process Models:Representation, Operators and Results”, Beta Working Paper, Eindhoven University of Technology, 2004
[27]A.K. Alves de Medeiros, A.J.M.M. Weijters, W.M.P. van der Aalst, “Genetic Process Mining:An Experimental Evaluation”, Data Mining and Knowledge Discovery,Vol.14, pp.245-304, 2007
[28]A.K. Alves de Medeiros, A.J.M.M. Weijters, W.M.P. van der Aalst, “Genetic Process Mining:A Basic Approach and its Challenges”, Lecture Notes in Computer Science, Vol.3812, pp.203-215, 2006
[29]A.J.M.M. Weijters, W.M.P. van der Aalst, “Rediscovering Workflow Models from Event-Based Data using Little Thumb”, Integrated Computer-Aided Engineering, Vol.10, pp.151-162, 2003
[30]Business Process Modeling Notation Version 1.0(BPMN), http://www.bpmn.org/, 2004
[31]Gerhard Knolmayer, Rainer Endl, Marcel Pfahrer, “Modeling Processes and Workflows on Business Rules”, Lecture Notes in Computer Science, Vol.1806, pp.201-245, 2000
[32]H. Herbst, G.Knolmayer, T. Myrach, M. Schlesinger, “The specification of business rules: A comparison of selected methodologies”, In A.Verrijn-Stuart and T. Olle, editors Methods and Associated Tools for the Information System Life Cycle, Amsterdam, 1994
[33]H.M. Sneed, K. Erdos, “Extracting business rules from source code“ Fourth Workshop on Program Comprehension, pp.240-247, 1996
[34]M. He, N. Xu, P. Liu, “Study of Business Rules Mining Modeling and Application”, Proceedings of the IEEE Intermational Conference on Automation and Logistics, pp.18-21, 2007
[35]W. Gaaloul, K. Baina, C. Godart, “Towards Mining Structural Workflow Patterns”, Lecture Notes in Computer Science, Vol.3855, pp.24-33, 2005
[36]J. Shao, C.J. Pound, “Extracting business rules from information systems”, BT Technology Journal, Vol.17, pp.179-186, 1999
[37]W.M.P. van der Aalst, A.J.M.M. Weijters, L.Maruster, “Workflow Mining:Discovering process models from event logs”, Knowledge and Data Engineering , IEEE Transactions on Vol.16, Issue 9, pp.1128-1142, 2004
[38]W.M.P. van der Aalst, B.F. van Dongen, “Discovering Workflow Performance Models from Timed Logs”, Lecture Notes in Computer Science, Vol.2480, pp.107-110, 2002
[39]A.J.M.M. Weijters, W.M.P. van der Aalst, “Rediscovering Workflow Models from Event-Based Data”, Engineering of Intelligent Systems, pp.65-65, 2003
[40]L. Wen, J. Wang, J.G. Sun. “Detecting Implicit Dependencies Between Tasks from Event Logs”, Lecture Notes in Computer Science, Vol.3841, pp.591- 603, 2006
[41]W.M.P. van der Aalst, V. Rubin, B.F. van Dongen, E. Kindler, C.W. Gunther, “Process Mining: A Two-Step Approach using Transition Systems and Regions”, BPM Center Report BPM-06-30, BPMcenter.org, 2006
[42]A. Rozinat, A.K. Alves de Mediros, C.W. Gunther, A.J.M.M. Weijters, W.M.P. van der Aalst, “Towards an Evaluation Framework for Process Mining Algorithms”, Lecture Notes in Computer Science, Vol.4928, pp.84-89, 2008
[43]A. Rozinat, A.K. Alves de Mediros, C.W. Gunther, A.J.M.M. Weijters, W.M.P. van der Aalst, “The Need for a Process Mining Evaluation Framework in Research and Practice”, Lecture Notes in Computer Science, Vol.4928, pp.84-89, 2008
[44]A.J.M.M. Weijters, W.M.P. van der Aalst, A.K. Alves de Medeiros, “Process Mining with HeuristicsMiner Algorithm”, Beta Working Paper Series, WP 166, Eindhoven University of Technology, Eindhoven, 2006
[45]A. Rozinat, W.M.P. van der Aalst, “Conformance Checking of Processes Based on Monitoring Real Behavior”, Accepted for publication in Information Systems: DOI 10.1016/j.is.2007.07.001.
[46]A.K. Alves de Medeiros, “Genetic Process Mining.” PhD thesis, Eindhoven University of Technology, Eindhoven, 2006
[47]B.F. van Dongen, J. Mendling, W.M.P. van der Aalst, “Structural Patterns for Soundness of Business Process Models” In EDOC ’06: Proceedings of the 10th IEEE International Enterprise Distributed Object Computing Conference (EDOC’06), pp.116-128, 2006

QR CODE