business processes modelling bpm - 295aa - 48h (6 cfu...
TRANSCRIPT
![Page 1: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/1.jpg)
Business Processes Modelling BPM - 295AA - 48h (6 cfu)
(1st sem., project + oral exam)
(borrowed from DSBI)
Roberto Bruni http://www.di.unipi.it/~bruni
!1
![Page 2: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/2.jpg)
2
Business process management
Giving shape to ideas, organizations, processes, collaborations, practices
To communicate them to others
To analyse them
To change them if needed
![Page 3: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/3.jpg)
3
![Page 4: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/4.jpg)
Objectives
4
Key issues in Business Process Management
(patterns, architectures, methodologies,…)
Graphical languages (BPMN, EPC, BPEL, ...)
Structural properties, behavioural properties and
problematic issues (dead tasks, deadlocks, ...)
Formal models (automata, Petri nets,
workflow nets, YAWL, ...)
Analysis techniques and correctness by construction
(soundness, boundedness, liveness, free-choice,…)
Tool-supported verification (WoPeD, YAWL, ProM, ...)
Performance analysis (bottlenecks, simulation,
capacity planning,…)
Process mining (discovery, conformance
checking, enhancement,…)
![Page 5: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/5.jpg)
5
Business Process Modeling Notation, v2.0 311
Figure 12.3 - A Collaboration diagram logistics example
The scenario modeled in Figure 12-4 entails shipment planning for the next supply replenishment variations: the Supplier
confirms all previously accepted variations for delivery with the Retailer; the Retailer sends back a number of further
possible variations; the Supplier requests to the Shipper and Consignee possible changes in delivery; accordingly, the
Retailer interacts with the Supplier and Consignee for final confirmations.
A problem with model interconnections for complex Choreographies is that they are vulnerable to errors –
interconnections may not be sequenced correctly, since the logic of Message exchanges is considered from each partner
at a time. This in turn leads to deadlocks. For example, consider the PartnerRole of Retailer in Figure 12.4 and
assume that, by error, the order of Confirmation Delivery Schedule and Retailer Confirmation received (far right) were
swapped. This would result in a deadlock since both, Retailer and Consignee would wait for the other to send a
Message. Deadlocks in general, however, are not that obvious and might be difficult to recognize in a Collaboration.
Figure 12.4 shows the Choreography corresponding to the Collaboration of Figure 12.3 above.
Sh
ipp
er
Sh
ipp
er
Planned
Order
Variations
Co
nsig
ne
e
Re
taile
r
Receive
Message
Send
Message
Receive
Message
Send
Message
Send
Message
Receive
Message
Send
Message
Receive
Message
Send
Message
Receive
Message
Receive
Message
Send
Message
Receive
Message
Send
Message
Receive
Message
Send
Message
Send
Message
Receive
Message
Receive
Message
Send
Message
Receive
Message
Send
Message
Send
Message
Send
Message
Receive
Message
Receive
Message
Order &
Delivery
Variations
Deliver
Checkpoint
Request
Shipment
Plan
Variation
Proposed
Plan & Cost
Variation
Delivery
Plan
Variation
Proposed
Plan & Cost
Variation
Updated PO
& Delivery
Schedule
PO &
Delivery
Modifications
PO &
Delivery
Schedule
Confirma-
tion of
Schedule
Confirma-
tion
Received
Finalized
Schedule
A sample BPMN model
![Page 6: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/6.jpg)
1.3 Process Mining 9
Fig. 1.4 Positioning of the three main types of process mining: discovery, conformance, and en-hancement
However, most information systems store such information in unstructured form,e.g., event data is scattered over many tables or needs to be tapped off from sub-systems exchanging messages. In such cases, event data exist but some efforts areneeded to extract them. Data extraction is an integral part of any process miningeffort.
Let us assume that it is possible to sequentially record events such that eachevent refers to an activity (i.e., a well-defined step in the process) and is related toa particular case (i.e., a process instance). Consider, for example, the handling ofrequests for compensation modeled in Fig. 1.1. The cases are individual requestsand per case a trace of events can be recorded. An example of a possible traceis ⟨register request, examine casually, check ticket, decide, reinitiate request, checkticket, examine thoroughly, decide, pay compensation⟩. Here activity names are usedto identify events. However, there are two decide events that occurred at differenttimes (the fourth and eighth event of the trace), produced different results, and mayhave been conducted by different people. Obviously, it is important to distinguishthese two decisions. Therefore, most event logs store additional information aboutevents. In fact, whenever possible, process mining techniques use extra informationsuch as the resource (i.e., person or device) executing or initiating the activity, thetimestamp of the event, or data elements recorded with the event (e.g., the size of anorder).
Event logs can be used to conduct three types of process mining as shown inFig. 1.4.
1.5 Play-in, Play-out, and Replay 19
Fig. 1.8 Three ways of relating event logs (or other sources of information containing examplebehavior) and process models: Play-in, Play-out, and Replay
than 56 cigarettes tend to die young”) and association rules (“people that buy di-apers also buy beer”). Unfortunately, it is not possible to use conventional datamining techniques to Play-in process models. Only recently, process mining tech-niques have become readily available to discover process models based on eventlogs.
Replay uses an event log and a process model as input. The event log is “re-played” on top of the process model. As shown earlier it is possible to replay trace⟨a, b, d, e,h⟩ on the Petri net in Fig. 1.5; simply “play the token game” by forc-ing the transitions to fire (if possible) in the order indicated. An event log may bereplayed for different purposes:
• Conformance checking. Discrepancies between the log and the model can bedetected and quantified by replaying the log. For instance, replaying trace⟨a, b, e,h⟩ on the Petri net in Fig. 1.5 will show that d should have happenedbut did not.
1.5 Play-in, Play-out, and Replay 19
Fig. 1.8 Three ways of relating event logs (or other sources of information containing examplebehavior) and process models: Play-in, Play-out, and Replay
than 56 cigarettes tend to die young”) and association rules (“people that buy di-apers also buy beer”). Unfortunately, it is not possible to use conventional datamining techniques to Play-in process models. Only recently, process mining tech-niques have become readily available to discover process models based on eventlogs.
Replay uses an event log and a process model as input. The event log is “re-played” on top of the process model. As shown earlier it is possible to replay trace⟨a, b, d, e,h⟩ on the Petri net in Fig. 1.5; simply “play the token game” by forc-ing the transitions to fire (if possible) in the order indicated. An event log may bereplayed for different purposes:
• Conformance checking. Discrepancies between the log and the model can bedetected and quantified by replaying the log. For instance, replaying trace⟨a, b, e,h⟩ on the Petri net in Fig. 1.5 will show that d should have happenedbut did not.
Process mining
![Page 7: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/7.jpg)
7
Learning outcomesUnderstand a concrete instance of the problem
Abstract modeling and generalization: Visual notation, informal, intuitive; Mathematical notation, rigorous
General solutions from formal reasoning: provably correct
Implementation and application to concrete instances: Formal models used in prescriptive manner (correctness by design)
![Page 8: Business Processes Modelling BPM - 295AA - 48h (6 cfu ...calvados.di.unipi.it/storage/marcod/BPM-presentazione-2019.pdf · 1.3 Process Mining 9 Fig. 1.4 Positioning of the three main](https://reader035.vdocument.in/reader035/viewer/2022070916/5fb631c2fe2822508c7c1802/html5/thumbnails/8.jpg)
8
ThesesPartner synthesis in collaboration diagrams Tools for efficient analysis of soundnessBehavioural mining…