Introduction. Process Mining post-execution analysis Process Simulation what-if analysis
|
|
- Florence Hubbard
- 5 years ago
- Views:
Transcription
1
2 Process mining Process mining is the missing link between model-based process analysis and dataoriented analysis techniques. Through concrete data sets and easy to use software the process mining provides data science knowledge that can be applied directly to analyze and improve processes in a variety of domains.
3 Problem
4 Introduction Correctness, effectiveness and efficiency of business processes are vital to an organization Significant gap between what is prescribed and what actually happens Process owners have limited info about what is actually happening Model-based (static) analysis Validation Verification (correctness of a model) Performance analysis Process Mining post-execution analysis Process Simulation what-if analysis 4
5 Preliminaries: Data Logging Keeping track of execution data Activities that have been carried out Timestamps (Start and end times of activities) esources involved Data Purposes Audit trails Disaster recovery Monitoring Data Mining Process Mining Process Simulation 5
6 Preliminaries: Process Mining Event logs (recorded actual behaviors) Covers a wide-range of techniques Provide insights into control flow dependencies data usage resource involvement performance related statistics etc. Identify problems that cannot be identified by inspecting a static model alone 6
7 Preliminaries: Process Simulation Develop a simulation model at design time Carry out experiments under different assumptions Used for process reengineering decisions Data input is time-consuming and error-prone equires careful interpretation Abstraction of the actual behavior Different assumptions made Inaccurate or Incomplete data input Starts from an empty initial state 7
8 Process Mining Process discovery: "What is really happening?" Conformance checking: "Do we do what was agreed upon?" Performance analysis: "Where are the bottlenecks?" Process prediction: "Will this case be late?" Process improvement: "How to redesign this process?" Etc. 8
9 Example: mining student data Process discovery: "What is the real curriculum?" Conformance checking: "Do students meet the prerequisites?" Performance analysis: "Where are the bottlenecks?" Process prediction: "Will a student complete his studies (in time)?" Process improvement: "How to redesign the curriculum?" 9
10 Process mining: Linking events to models world business processes people machines components organizations models analyzes supports/ controls specifies configures implements analyzes software system records events, e.g., messages, transactions, etc. process/ system model discovery conformance event logs 10
11 Where to start? process control diagnosis process mining process enactment process design implementation/ configuration 11
12 esource Analysis 12
13 Performance analysis showing bottlenecks flow time from A to B bottlenecks throughput time 13
14 Dotted chart analysis short cases time (relative) events case s long cases 14
15 Log examples <Process id="payment_subprocess.ywl"> <ProcessInstance id="3f9dfc e7-b9f7-329b5c6f0ded"> <AuditTrailEntry> <WorkflowModelElement>Check_PrePaid_Shipments_10</WorkflowModelElement> <EventType>start</EventType> <Timestamp> T10:11: :00</Timestamp> <Originator>JohnsI</Originator> </AuditTrailEntry> <AuditTrailEntry> <Data><Attribute name="prepaidshipment">true</attribute></data> <WorkflowModelElement>Check_PrePaid_Shipments_10</WorkflowModelElement> <EventType>complete</EventType> <Timestamp> T10:11: :00</Timestamp> <Originator>JohnsI</Originator> </AuditTrailEntry> </ProcessInstance> </Process> 15
16 Starting point: event logs YAWL logs or other event logs, audit trails, databases, message logs, etc. unified event log (MXML) 16
17 Linking process mining to simulation Gather process statistics using process mining techniques Calibrate simulation experiments with this data Analyze simulation logs in the same way as execution logs 17
18 Data sources for process characteristics Design (Workflow and Organizational Models) Control and data flow Organizational model Initial data values ole assignments Historical (Event logs) Data value range distributions Execution time distributions Case arrival rate esource availability patterns State (Workflow system) Progress state Data values for running cases Busy resources un time for cases 18
19 Alpha algorithm α
20 Process log Minimal information in log: case id s and task id s. Additional information: event type, time, resources, and data. In this log there are three possible sequences: ABCD ACBD EF case 1 : task A case 2 : task A case 3 : task A case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task A case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D
21 >,,,# relations Direct succession: x>y iff for some case x is directly followed by y Causality: x y iff x>y and not y>x Parallel: x y iff x>y and y>x Choice: x#y iff not x>y and not y>x case 1 : task A case 2 : task A case 3 : task A case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task A case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D A>B A>C B>C B>D C>B C> D E>F B C C B A B A C B D C D E F
22 Basic idea (1) x y x y
23 Basic idea (2) y x z x y, x z, and y z
24 Basic idea (3) y x z x y, x z, and y#z
25 Basic idea (4) x z y x z, y z, and x y
26 Basic idea (5) x z y x z, y z, and x#y
27 It is not that simple: Basic alpha algorithm Let W be a workflow log over T. a(w) is defined as follows. 1. T W = { t T $ s W t s}, 2. T I = { t T $ s W t = first(s) }, 3. T O = { t T $ s W t = last(s) }, 4. X W = { (A,B) A T W B T W " a A " b B a W b " a1,a2 A a 1 # W a 2 " b1,b2 B b 1 # W b 2 }, 5. Y W = { (A,B) X " (A,B ) X A A B B (A,B) = (A,B ) }, 6. P W = { p (A,B) (A,B) Y W } {i W,o W }, 7. F W = { (a,p (A,B) ) (A,B) Y W a A } { (p (A,B),b) (A,B) Y W b B } { (i W,t) t T I } { (t,o W ) t T O }, and 8. a(w) = (P W,T W,F W ). The alpha algorithm has been proven to be correct for a large class of free-choice nets.
28 W Example case 1 : task A case 2 : task A case 3 : task A case 3 : task B case 1 : task B case 1 : task C case 2 : task C case 4 : task A case 2 : task B case 2 : task D case 5 : task E case 4 : task C case 1 : task D case 3 : task C case 3 : task D case 4 : task B case 5 : task F case 4 : task D A E B C F D a(w)
29 DEMO Alpha algorithm B L get review 1 get review X C M time-out 1 D time-out X K invite additional reviewer A get review 2 G H I invite reviewers E time-out 2 collect reviews decide accept J F reject get review 3 G time-out 3 48 cases 16 performers
30 Logging system Nlog NLog can process diagnostic messages emitted from any.net language (such as C# or Visual Basic), augment them with contextual information (such as date/time, severity, thread, process, environment enviroment), format them according to your preference and send them to one or more targets such as file or database.
31 Supported targets Files - single file or multiple, with automatic file naming and archival Event Log - local or remote Database - store your logs in databases supported by.net Network - using TCP, UDP, SOAP, MSMQ protocols Command-line console - including color coding of messages - you can receive s whenever application errors occur ASP.NET trace... and many more
32 Conclusions Introduction Concise assessment of reality needed for processes Preliminaries Data logging, Process Mining, Process Simulation Process mining with ProM Understanding process characteristics Process simulation Operational decision support Utilizing log info for simulation experiments Tools: YAWL, ProM & CPN Tools Payment example Conclusion 32
33 Log 33
34 Process model mined from log 34
35 What we can do? Inspecting and Cleaning an Event Log Mining the Control-Flow Perspective of a Process - Alpha algorithm Social networks 35
36 Questions? 36 36
Vea haldus ja logiraamat hajutatud süsteemides Enn Õunapuu.
Vea haldus ja logiraamat hajutatud süsteemides Enn Õunapuu enn.ounapuu@ttu.ee Millest tuleb jutt? Kuidas ma näen, millises sammus erinevad protsessid parasjagu on? Kuidas ma aru saan, kas protsess töötab
More informationPart II Workflow discovery algorithms
Process Mining Part II Workflow discovery algorithms Induction of Control-Flow Graphs α-algorithm Heuristic Miner Fuzzy Miner Outline Part I Introduction to Process Mining Context, motivation and goal
More informationProM 4.0: Comprehensive Support for Real Process Analysis
ProM 4.0: Comprehensive Support for Real Process Analysis W.M.P. van der Aalst 1, B.F. van Dongen 1, C.W. Günther 1, R.S. Mans 1, A.K. Alves de Medeiros 1, A. Rozinat 1, V. Rubin 2,1, M. Song 1, H.M.W.
More informationDiscovering Concurrency Learning (Business) Process Models from Examples
Discovering Concurrency Learning (Business) Process Models from Examples Invited Talk CONCUR 2011, 8-9-2011, Aachen. prof.dr.ir. Wil van der Aalst www.processmining.org Business Process Management? PAGE
More informationBusiness Process Management
Business Process Management Paolo Bottoni Lecture 11: Process Mining Adapted from the slides for the book : Dumas, La Rosa, Mendling & Reijers: Fundamentals of Business Process Management, Springer 2013
More informationPublished in: Petri Nets and Other Models of Concurrency - ICATPN 2007 (28th International Conference, Siedcle, Poland, June 25-29, 2007)
ProM 4.0 : comprehensive support for real process analysis van der Aalst, W.M.P.; van Dongen, B.F.; Günther, C.W.; Mans, R.S.; Alves De Medeiros, A.K.; Rozinat, A.; Rubin, V.A.; Song, M.S.; Verbeek, H.M.W.;
More informationProcess Mining: Using CPN Tools to Create Test Logs for Mining Algorithms
Process Mining: Using CPN Tools to Create Test Logs for Mining Algorithms A.K. Alves de Medeiros and C.W. Günther Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600
More informationTypes of Process Mining
1 Types of Process Mining 2 Types of Mining Algorithms 3 Types of Mining Algorithms 4 Control-Flow Mining 1. Start 2. 1. Get Ready Start 1. 3. 2. Start Travel by Get Train Ready 1. 2. 4. Start 3. Get Beta
More informationReality Mining Via Process Mining
Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, M. M. MohieEl-Din Department of Mathematics, Facility of Science Al-Azhar University Cairo, Egypt {ohassan, farag.sayed, mmeldin}@azhar.edu.eg
More informationMining CPN Models. Discovering Process Models with Data from Event Logs. A. Rozinat, R.S. Mans, and W.M.P. van der Aalst
Mining CPN Models Discovering Process Models with Data from Event Logs A. Rozinat, R.S. Mans, and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,
More informationCSE Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100
CSE 30321 Computer Architecture I Fall 2011 Homework 07 Memory Hierarchies Assigned: November 8, 2011, Due: November 22, 2011, Total Points: 100 Problem 1: (30 points) Background: One possible organization
More informationModule 1 Topic C Lesson 14 Reflections
Geometry Module 1 Topic C Lesson 14 Reflections The purpose of lesson 14 is for students to identify the properties of reflection, to use constructions to find line of reflection, get familiar with notations
More informationCIS-331 Exam 2 Spring 2016 Total of 110 Points Version 1
Version 1 1. (20 Points) Given the class A network address 121.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 8,100 subnets? b. (5 Points) What is
More informationCSE Computer Architecture I Fall 2009 Homework 08 Pipelined Processors and Multi-core Programming Assigned: Due: Problem 1: (10 points)
CSE 30321 Computer Architecture I Fall 2009 Homework 08 Pipelined Processors and Multi-core Programming Assigned: November 17, 2009 Due: December 1, 2009 This assignment can be done in groups of 1, 2,
More informationReality Mining Via Process Mining
Reality Mining Via Process Mining O. M. Hassan, M. S. Farag, and M. M. Mohie El-Din Abstract Reality mining project work on Ubiquitous Mobile Systems (UMSs) that allow for automated capturing of events.
More informationCIS-331 Exam 2 Fall 2015 Total of 105 Points Version 1
Version 1 1. (20 Points) Given the class A network address 117.0.0.0 will be divided into multiple subnets. a. (5 Points) How many bits will be necessary to address 4,000 subnets? b. (5 Points) What is
More informationProcess Mining Tutorial
Anne Rozinat Christian W. Günther 26. April 2010 Web: http://fluxicon.com Email: anne@fluxicon.com Phone: +31(0)62 4364201 Copyright 2010 Fluxicon Problem IT-supported business processes are complex Lack
More informationCIS-331 Final Exam Spring 2015 Total of 115 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationEindhoven University of Technology MASTER. Context analysis of business processes based on event logs. Airlangga Adi Hermawan, A.
Eindhoven University of Technology MASTER Context analysis of business processes based on event logs Airlangga Adi Hermawan, A. Award date: 2013 Link to publication Disclaimer This document contains a
More informationBusiness Intelligence & Process Modelling
Business Intelligence & Process Modelling Frank Takes Universiteit Leiden Lecture 9 Process Modelling & BPMN & Tooling BIPM Lecture 9 Process Modelling & BPMN & Tooling 1 / 47 Recap Business Intelligence:
More information1. Query and manipulate data with Entity Framework.
COLLEGE OF INFORMATION TECHNOLOGY DEPARTMENT OF MULTIMEDIA SCIENCE COURSE SYLLABUS/SPECIFICATION CODE & TITLE: ITMS 434 Developing Windows Azure and Web Services (MCSD 20486) WEIGHT: 2-2-3 PREREQUISITE:
More informationApplicability of Process Mining Techniques in Business Environments
Applicability of Process Mining Techniques in Business Environments Annual Meeting IEEE Task Force on Process Mining Andrea Burattin andreaburattin September 8, 2014 Brief Curriculum Vitæ 2009, M.Sc. Computer
More informationDriving the Next Generation of Audit and Compliance Solutions with Zero Trust Networks. Kevin Saucier Compliance Practice Lead Conventus Corporation
Driving the Next Generation of Audit and Compliance Solutions with Zero Trust Networks Kevin Saucier Compliance Practice Lead Conventus Corporation About Me Compliance Practice Lead at Conventus Corporation
More informationEmpAnADa Project. Christian Lange. June 4 th, Eindhoven University of Technology, The Netherlands.
EmpAnADa Project C.F.J.Lange@tue.nl June 4 th, 2004 Eindhoven University of Technology, The Netherlands Outline EmpAnADa introduction Part I Completeness and consistency in detail Part II Background UML
More informationDealing with Artifact-Centric Systems: a Process Mining Approach
Dealing with Artifact-Centric Systems: a Process Mining Approach Guangming Li and Renata Medeiros de Carvalho 2 Abstract: Process mining provides a series of techniques to analyze business processes based
More informationCIS-331 Fall 2014 Exam 1 Name: Total of 109 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. Router A Router B Router C Router D Network Next Hop Next Hop Next Hop Next
More informationCIS-331 Fall 2013 Exam 1 Name: Total of 120 Points Version 1
Version 1 1. (24 Points) Show the routing tables for routers A, B, C, and D. Make sure you account for traffic to the Internet. NOTE: Router E should only be used for Internet traffic. Router A Router
More informationDEFINITIONS. Perpendicular Two lines are called perpendicular if they form a right angle.
DEFINITIONS Degree A degree is the 1 th part of a straight angle. 180 Right Angle A 90 angle is called a right angle. Perpendicular Two lines are called perpendicular if they form a right angle. Congruent
More informationSub-process discovery: Opportunities for Process Diagnostics
Sub-process discovery: Opportunities for Process Diagnostics Raykenler Yzquierdo-Herrera 1, Rogelio Silverio-Castro 1, Manuel Lazo-Cortés 1 1 Faculty 3, University of the Informatics Sciences. Habana,
More informationProcess Mining Discovering Workflow Models from Event-Based Data
Process Mining Discovering Workflow Models from Event-Based Data A.J.M.M. Weijters W.M.P van der Aalst Eindhoven University of Technology, P.O. Box 513, NL-5600 MB, Eindhoven, The Netherlands, +31 40 2473857/2290
More informationCIS-331 Exam 2 Fall 2014 Total of 105 Points. Version 1
Version 1 1. (20 Points) Given the class A network address 119.0.0.0 will be divided into a maximum of 15,900 subnets. a. (5 Points) How many bits will be necessary to address the 15,900 subnets? b. (5
More informationMining Process Performance from Event Logs
Mining Process Performance from Event Logs The BPI Challenge 2012 Case Study A. Adriansyah and J.C.A.M Buijs Department of Mathematics and Computer Science Eindhoven University of Technology P.O. Box 513,
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 1370 Windows Client Operating System - Windows 10 Course Syllabus Summer 2017
More information19. Business Process Automation in YAWL Fabiano Dalpiaz. Organizational Information Systems Based on slides from
19. Business Process utomation in Fabiano Dalpiaz Organizational Information Systems 2011-2012 Based on slides from www.yawlfoundation.org 1 Business Process utomation In order to fully capitalize on modeling
More informationOracle Database 12c R2: Backup and Recovery Workshop Ed 3
Oracle University Contact Us: +386 1 588 88 13 Oracle Database 12c R2: Backup and Recovery Workshop Ed 3 Duration: 5 Days What you will learn In this Oracle Database 12c R2: Backup and Recovery Workshop,
More informationProcess Mining. CS565 - Business Process & Workflow Management Systems. University of Crete, Computer Science Department
CS565 - Business Process & Workflow Management Systems Process Mining 1 Process Mining 2 Process Mining n Workflow diagnosis aims at exploiting runtime information to assist in business process re-engineering
More informationOracle Database 12c R2: Backup and Recovery Workshop Ed 3
Oracle University Contact Us: Toll Free: 0008004401672 Oracle Database 12c R2: Backup and Recovery Workshop Ed 3 Duration: 5 Days What you will learn In this Oracle Database 12c R2: Backup and Recovery
More informationBest Practices for PCI DSS Version 3.2 Network Security Compliance
Best Practices for PCI DSS Version 3.2 Network Security Compliance www.tufin.com Executive Summary Payment data fraud by cyber criminals is a growing threat not only to financial institutions and retail
More informationUNIVERSITY AUTHORISED EDUCATION PARTNER (WDP)
Audience Data Warehouse Administrator Database Administrators Support Engineer Technical Administrator Technical Consultant Related Training Required Prerequisites Knowledge of Oracle Database 12c Knowledge
More informationOracle Database 12c R2: Backup and Recovery Workshop Ed 3
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c R2: Backup and Recovery Workshop Ed 3 Duration: 5 Days What you will learn In this Oracle Database 12c R2: Backup and Recovery Workshop,
More informationParsing. Earley Parsing. Laura Kallmeyer. Winter 2017/18. Heinrich-Heine-Universität Düsseldorf 1 / 39
Parsing Earley Parsing Laura Kallmeyer Heinrich-Heine-Universität Düsseldorf Winter 2017/18 1 / 39 Table of contents 1 Idea 2 Algorithm 3 Tabulation 4 Parsing 5 Lookaheads 2 / 39 Idea (1) Goal: overcome
More informationOracle Database 12c R2: Backup and Recovery Workshop Ed 3
Oracle University Contact Us: Toll Free: 0008004401672 Oracle Database 12c R2: Backup and Recovery Workshop Ed 3 Duration: 5 Days What you will learn In this Oracle Database 12c R2: Backup and Recovery
More informationA brief history of time for Data Vault
Dates and times in Data Vault There are no best practices. Just a lot of good practices, and even more bad practices. This is especially true when it comes to handling dates and times in Data Warehousing,
More informationConformance Checking of Processes Based on Monitoring Real Behavior
Conformance Checking of Processes Based on Monitoring Real Behavior Seminar - Multimedia Retrieval and Data Mining Aljoscha Steffens Data Management and Data Exploration Group RWTH Aachen University Germany
More informationCIS-331 Final Exam Spring 2016 Total of 120 Points. Version 1
Version 1 1. (25 Points) Given that a frame is formatted as follows: And given that a datagram is formatted as follows: And given that a TCP segment is formatted as follows: Assuming no options are present
More informationRecords Retention Schedule
Retention Schedule Form C must Record Title Storage 1. Page 18 of 104 106 Category 2: Electronic Data Processing Section 2.1 Automated Applications 2.1.001 38 Automated Files - Processing Files Machine-readable
More informationProcess Discovery: Capturing the Invisible
Process Discovery: Capturing the Invisible Wil M. P. van der Aalst Department of Mathematics and Computer Science, Technische Universiteit Eindhoven, The Netherlands. W.M.P.v.d.Aalst@tue.nl Abstract. Processes
More informationData Streams in ProM 6: A Single-Node Architecture
Data Streams in ProM 6: A Single-Node Architecture S.J. van Zelst, A. Burattin 2, B.F. van Dongen and H.M.W. Verbeek Eindhoven University of Technology {s.j.v.zelst,b.f.v.dongen,h.m.w.verbeek}@tue.nl 2
More informationN4115 an alternative encoding for geometric shapes
P R Chastney for geometric shapes This document proposes alternative encodings for some of the geometric shapes in ISO/IEC JTC1/SC2/WG2 N 4115, Proposal to add Wingdings and Webdings Symbols. Only graduated
More informationCS145: INTRODUCTION TO DATA MINING
CS145: INTRODUCTION TO DATA MINING Sequence Data: Sequential Pattern Mining Instructor: Yizhou Sun yzsun@cs.ucla.edu November 27, 2017 Methods to Learn Vector Data Set Data Sequence Data Text Data Classification
More informationOracle - Oracle Database 12c: Backup and Recovery Workshop Ed 2
Oracle - Oracle Database 12c: Backup and Recovery Workshop Ed 2 Code: Lengt h: URL: 12cDB-BR 5 days View Online This Oracle Database 12c: Backup and Recovery Workshop will teach you how to evaluate your
More informationCisco Prime Collaboration Deployment Configuration and Administration
Cisco Prime Collaboration Deployment Configuration and Administration Services, page 1 Limitations and Restrictions, page 5 Services After the installation of the Cisco Prime Collaboration Deployment platform,
More information1. Name of Course: Oracle Database 12c: Backup and Recovery Workshop
ITSW 2037 Course Syllabus 1. Name of Course: Oracle Database 12c: Backup and Recovery Workshop 2. Number of Clock Hours: 60 hours 3. Course Description: Students will gain an understanding of Oracle database
More informationOracle Database 12c: Backup and Recovery Workshop Ed 2 NEW
Oracle University Contact Us: 0845 777 7711 Oracle Database 12c: Backup and Recovery Workshop Ed 2 NEW Duration: 5 Days What you will learn This Oracle Database 12c: Backup and Recovery Workshop will teach
More informationSEG3201 Basics of the Requirements Process
SEG3201 Basics of the Requirements Process Based on material from: I Bray: An introduction to Requirements Engineering Gerald Kotonya and Ian Sommerville: Requirements Engineering Processes and Techniques,
More informationChanging the way companies run their data centers
Infrastructure Management & Monitoring for Business-Critical Continuity TM Changing the way companies run their data centers The Aperture TM Suite Optimize performance of your data center without COmpromising
More informationNon-Dominated Bi-Objective Genetic Mining Algorithm
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 6 (2017) pp. 1607-1614 Research India Publications http://www.ripublication.com Non-Dominated Bi-Objective Genetic Mining
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: ab Houston Community College ITMT 2301 - Windows Server 2008 Network Infrastructure Configuration Administering
More informationProject 1: Network Penetration Testing
Project 1: Network Penetration Testing October 11, 2004 This is a seven week project in which you will explore, test, and verify the presence of known vulnerabilities from the bottom to the top of OSI
More informationConformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm
Conformance Checking Evaluation of Process Discovery Using Modified Alpha++ Miner Algorithm Yutika Amelia Effendi and Riyanarto Sarno Department of Informatics, Faculty of Information and Communication
More informationTHE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW
THE SELECTION OF THE ARCHITECTURE OF ELECTRONIC SERVICE CONSIDERING THE PROCESS FLOW PETERIS STIPRAVIETIS, MARIS ZIEMA Institute of Computer Control, Automation and Computer Engineering, Faculty of Computer
More informationCore Solutions of Microsoft Lync Server 2013 (NI110) 40 Hours
Core Solutions of Microsoft Lync Server 2013 (NI110) 40 Hours Outline This instructor-led course teaches IT professionals how to plan, design, deploy, configure, and administer a Microsoft Lync Server
More information22ND CENTURY_J1.xls Government Site Hourly Rate
Escalation rate 000 AA0 Administrative Assistant Level I 000 AA0 Administrative Assistant Level II 000 AB0 Application Engineer Level I 000 AB0 Application Engineer Level II 000 AC0 Application Programmer
More informationirods for Data Management and Archiving UGM 2018 Masilamani Subramanyam
irods for Data Management and Archiving UGM 2018 Masilamani Subramanyam Agenda Introduction Challenges Data Transfer Solution irods use in Data Transfer Solution irods Proof-of-Concept Q&A Introduction
More informationDetect, Diagnose and Solve Problems with Application Insights
Detect, Diagnose and Solve Problems with Application Insights Vishesh Oberoi Technical Evangelist, Microsoft @ovishesh visho@microsoft.com The Cloud for Modern Business Vishesh Oberoi Technical Evangelist,
More informationB. Pack -domain=c:\oracle\user_projects\domains\mydomain.jar -template=c:\oracle\userj:emplates\mydomain -template_name=nmy WebLogic Domain"
Volume: 73 Questions Question No : 1 As a best practice, what would you change in the following command line to create successful domain template "My WebLogic Domain"? Pack -domain=c: \oracle\user_projects\domains\mydomain
More informationLezione 14 Model Transformations for BP Analysis and Execution
Lezione 14 Model Transformations for BP Analysis and Execution Ingegneria dei Processi Aziendali Modulo 1 - Servizi Web Unità didattica 1 Protocolli Web Ernesto Damiani 1 Università di Milano 1 Business
More informationAtmoCONTROL FDA EDITION IQ DOCUMENTATION OQ DOCUMENTATION 100% ATMOSAFE. MADE IN GERMANY.
AtmoCONTROL FDA EDITION IQ DOCUMENTATION OQ DOCUMENTATION 100% ATMOSAFE. MADE IN GERMANY. www.memmert.com www.atmosafe.net Manufacturer and customer service Memmert GmbH + Co. KG Willi-Memmert-Straße 90
More informationA ProM Operational Support Provider for Predictive Monitoring of Business Processes
A ProM Operational Support Provider for Predictive Monitoring of Business Processes Marco Federici 1,2, Williams Rizzi 1,2, Chiara Di Francescomarino 1, Marlon Dumas 3, Chiara Ghidini 1, Fabrizio Maria
More informationLSN 4 Boolean Algebra & Logic Simplification. ECT 224 Digital Computer Fundamentals. Department of Engineering Technology
LSN 4 Boolean Algebra & Logic Simplification Department of Engineering Technology LSN 4 Key Terms Variable: a symbol used to represent a logic quantity Compliment: the inverse of a variable Literal: a
More informationAPD tool: Mining Anomalous Patterns from Event Logs
APD tool: Mining Anomalous Patterns from Event Logs Laura Genga 1, Mahdi Alizadeh 1, Domenico Potena 2, Claudia Diamantini 2, and Nicola Zannone 1 1 Eindhoven University of Technology 2 Università Politecnica
More informationAppendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site
Appendix 5-1: Attachment J.1 Pricing Table -1: IMS Ceiling Loaded Rates at Contractor Site Escalation rate 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 4.6% 0001 AA01 Administrative Assistant Level I $51.00
More informationAuditing in an Automated Environment: Appendix B: Application Controls
Accountability Modules Auditing in an Automated Environment: Initials Date Agency Prepared By Reviewed By Audit Program - Application W/P Ref Page 1 of 1 The SAO follows control objectives established
More informationDiscovering a Process Flow in Priority ERP
Discovering a Process Flow in Priority ERP Service Calls Handling Author: Dafna Levy Service Calls Hypothetical Process Model BPM Flow Chart for Service Calls in Priority Statuses, paths and rules are
More informationCIS-331 Spring 2016 Exam 1 Name: Total of 109 Points Version 1
Version 1 Instructions Write your name on the exam paper. Write your name and version number on the top of the yellow paper. Answer Question 1 on the exam paper. Answer Questions 2-4 on the yellow paper.
More informationCode No: R Set No. 1
Code No: R059210504 Set No. 1 II B.Tech I Semester Supplementary Examinations, February 2007 DIGITAL LOGIC DESIGN ( Common to Computer Science & Engineering, Information Technology and Computer Science
More informationCOURSE 10964: CLOUD & DATACENTER MONITORING WITH SYSTEM CENTER OPERATIONS MANAGER
ABOUT THIS COURSE This course equips students with the skills they require to deploy and configure System Center 2012 R2 Operations Manager. Using hands-on labs, students learn the following: How to architect
More informationICONICS OPC UA Quality codes
Description: A quick introduction to the qualities and subqualities used by OPC UA. OS Requirement: Windows Server 2003 x64/vista x64/ Server 2008 x64/windows 7 x64/ Server 2008 R2 x64 General Requirement:
More information2015 International Conference on Computer, Control, Informatics and Its Applications
2015 International Conference on Computer, Control, Informatics and Its Applications Business Process Optimization from Single Timestamp Event Log Riyanarto Sarno *, Fitrianing Haryadita, Kartini, Sarwosri
More informationA Probabilistic Approach for Process Mining in Incomplete and Noisy Logs
A Probabilistic Approach for Process Mining in Incomplete and Noisy Logs Roya Zareh Farkhady and Seyyed Hasan Aali Abstract Process mining techniques aim at automatically generating process models from
More informationProcess Mining Put Into Context
Process Mining Put Into Context Wil M.P. van der Aalst 1,2 and Schahram Dustdar 3 1 Eindhoven University of Technology 2 Queensland University of Technology 3 Technical University of Vienna Abstract. Process
More informationMulti-phase Process mining: Building Instance Graphs
Multi-phase Process mining: Building Instance Graphs B.F. van Dongen, and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513, NL-5600 MB, Eindhoven,
More information4. Specifications and Additional Information
4. Specifications and Additional Information AGX52004-1.0 8B/10B Code This section provides information about the data and control codes for Arria GX devices. Code Notation The 8B/10B data and control
More informationBBS654 Data Mining. Pinar Duygulu. Slides are adapted from Nazli Ikizler
BBS654 Data Mining Pinar Duygulu Slides are adapted from Nazli Ikizler 1 Sequence Data Sequence Database: Timeline 10 15 20 25 30 35 Object Timestamp Events A 10 2, 3, 5 A 20 6, 1 A 23 1 B 11 4, 5, 6 B
More informationData Curation Profile Human Genomics
Data Curation Profile Human Genomics Profile Author Profile Author Institution Name Contact J. Carlson N. Brown Purdue University J. Carlson, jrcarlso@purdue.edu Date of Creation October 27, 2009 Date
More informationCO Oracle Database 12c: Backup and Recovery Workshop
CO-78850 Oracle Database 12c: Backup and Recovery Workshop Summary Duration 5 Days Audience Data Warehouse Administrators, Database Administrators, Support Engineers, Technical Administrators, Technical
More informationInstalling and Configuring System Center 2012 Operations Manager
Course 55004A: Installing and Configuring System Center 2012 Operations Manager Page 1 of 7 Installing and Configuring System Center 2012 Operations Manager Course 55004A: 4 day; Instructor-Led About the
More informationSparta Systems TrackWise Digital Solution
Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities
More informationA Survey of Contemporary Process Evolutionary Systems
A Survey of Contemporary Process Evolutionary Systems Mr. PaaraanjiMohan Suresh 1, Assistant Professor. Koteswarrao. kadiventi. 2 1M. Tech Student, Department of Computer Science, Audisankara College of
More informationManaging and Maintaining a Microsoft Windows Server 2003 Environment
COURSE OVERVIEW This course combines five days of instructor-led training with additional e-learning content to provide students with the knowledge and skills that are required to manage accounts and resources,
More informationProject Management Pre-Implementation Project status reporting Post Implementation Assessment Phase Solidify Project Scope
Project Management 321 days 10/22/01 01/30/03 Pre-Implementation 14 days 10/22/01 11/08/01 Detailed Scope / Deliverable definition 5 days 10/22/01 10/26/01 Complete Work Breakdown Structure 1 day 10/22/01
More informationUNIT 1 SIMILARITY, CONGRUENCE, AND PROOFS Lesson 6: Defining and Applying Similarity Instruction
Prerequisite Skills This lesson requires the use of the following skills: creating ratios solving proportions identifying congruent triangles calculating the lengths of triangle sides using the distance
More informationAssociation Rule Mining
Association Rule Mining Generating assoc. rules from frequent itemsets Assume that we have discovered the frequent itemsets and their support How do we generate association rules? Frequent itemsets: {1}
More informationComputer Science Technology Department
Computer Science Technology Department Houston Community College Department Phone Number: 713-718-6776 Houston Community College ITMT 2373 - Configuring Advanced Windows Server 2012 Services Course Syllabus
More informationData- and Resource-Aware Conformance Checking of Business Processes
Data- and Resource-Aware Conformance Checking of Business Processes Massimiliano de Leoni, Wil M. P. van der Aalst, and Boudewijn F. van Dongen Eindhoven University of Technology, Eindhoven, The Netherlands
More informationIT 201 Digital System Design Module II Notes
IT 201 Digital System Design Module II Notes BOOLEAN OPERATIONS AND EXPRESSIONS Variable, complement, and literal are terms used in Boolean algebra. A variable is a symbol used to represent a logical quantity.
More informationVendor: SAP. Exam Code: C_HANATEC131. Exam Name: SAP Certified Technology Associate (Edition 2013) -SAP HANA. Version: Demo
Vendor: SAP Exam Code: C_HANATEC131 Exam Name: SAP Certified Technology Associate (Edition 2013) -SAP HANA Version: Demo QUESTION NO: 1 You want to make sure that all data accesses to a specific view will
More informationCloud & Datacenter Monitoring with System Center Operations Manager
Cloud & Datacenter Monitoring with System Center Operations Manager Course 10964C - Five days - Instructor-led - Hands-on Introduction This five day, instructor-led course equips students with the skills
More informationDATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK)
DATA STEWARDSHIP BODY OF KNOWLEDGE (DSBOK) Release 2.2 August 2013. This document was created in collaboration of the leading experts and educators in the field and members of the Certified Data Steward
More information2. BOOLEAN ALGEBRA 2.1 INTRODUCTION
2. BOOLEAN ALGEBRA 2.1 INTRODUCTION In the previous chapter, we introduced binary numbers and binary arithmetic. As you saw in binary arithmetic and in the handling of floating-point numbers, there is
More information