Computer Science ›› 2020, Vol. 47 ›› Issue (5): 59-63.doi: 10.11896/jsjkx.190500119

Special Issue: Theoretical Computer Scinece

• Theoretical Computer Science • Previous Articles     Next Articles

Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor

YANG Hao-ran, FANG Xian-wen   

  1. School of Mathematics and Big Data,Anhui University of Science & Technology,Huainan,Anhui 232001,China
  • Received:2019-05-21 Online:2020-05-15 Published:2020-05-19
  • About author:YANG Hao-ran,born in 1995,postgra-duate.His main research interests include Petri net and so on.
    FANG Xian-wen,born in 1975,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include Petri net and software credibility.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61402011,61572035),Natural Science Foundation of Anhui Pro-vince,China(1508085MF111,1608085QF149) and Natural Science Foundation of the Higher Education Institutions of Anhui Province,China (KJ2016A208)

Abstract: As one of the important part of business process management,business process consistency analysis has been a hot topic in business process management research in recent years.The existing methods mainly study from two aspects,control flow and data flow.Actually,probability and time factors have a major impact on business processes.As a result,this paper proposes a Petri net business process consistency analysis method based on probability and time factor.First,the definition of control flow Petri net with probability factor and data flow Petri net with time factor are proposed.Then,all the transitions of control flow Petri net with probability factor and data flow Petri net with time factor are respectively mapped to the original business process Petri net,and the respective behavior maps are obtained.Corresponding behavioral compatibility algorithms for the two types of Petri net are proposed,and the consistency degree of business process is measured by the value of behavioral compatibility.Finally,the effectiveness and superiority of the method are demonstrated by an example.

Key words: Behavioral compatibility, Control flow, Data flow, Petri net

CLC Number: 

  • TP391.9
[1]GUPTA C,SINH Y,CHAUHAN D S.A dynamic approach to estimate change impact using type of change propagation[J].Journal of Information Processing Systems,2010,6(4):597-608.
[2]RAJABI B A,LEE S P.Modeling and analysis of change mana-gement in dynamic business process[J].International Journal of Computer and Electrical Engineering,2010,2(6):181-189.
[3]DU H S,DU Y Y.Mining of Block Concurrent Process Based on Incomplete Logs[J].Computer Engineering,2018,44(12):56-61.
[4]OLEG S,SAMPATH K,INSUP L.Simulation-Based GraphSimilarity[C]//Proceedings of the 12th International Confe-rence on Tools and Algorithms for the Construction and Analysis of System.2006:426-440.
[5]TONG Y,LI Z W,ALESSANDRO G.Observation Equivalence of Petri Net Generators[C]//12th IFAC/IEEE Workshop on Discrete Event Systems.2014:338-343.
[6]MATTHIAS W,REMCO D,MATHIAS W.Behaviour Equivalence and Capability of Business Process Models with Complex Correspondences[J].The Computer Journal,2012,55(11):1398-1418.
[7]MOSER S,MARTENS A,GORLACH K,et al.Advanced verification of distributed ws-bpel business processes incorporating cssa-vased data flow analysis[C]//Proceedings of the IEEE International Conference on Services Computing.2007:98-105.
[8]BATCHELDER M,HENDREN L.Obfuscating java:the most pain for the least gain[C]//Proceedings of the 16th Internation Conference on Compiler Construction.2007:96-110.
[9]RUSSELL N,ARTHUR H,HOFSTEDE M,et al.WorkflowData Patterns:Identification,Representation and Tool Support[C]//Proceedings of 24th International Conference on Conceptual Modeling.2005:353-368.
[10]MAYR C,ZDUN U,DUSTDAR S.Enhancing Traceability of Persistent Data Access Flows in Process-Driven SOAs[J].Distributed and Parallel Databases,2013,31(1):1-45.
[11]LIU L.Analysis about the Consistency of Business ProcessModel based on Petri Net[D].Huainan:Anhui University of Science and Technology,2014.
[12]ZHAN Y,FANG X,WANG L.Analysis of Interactive Process Change Propagation Based on Configuration[J].Computer Science,2019,8(8):1-8.
[13]SMIRNOV S,WEIDLICH M,MENDLING J.Business process model abstrcation based on behavioral profiles[C]//Proceedings of the 8th International Conference on Service Oriented Computing.2010:1-16.
[14]ASSY N,CHAN N N,GAALOUL W.An Automated Approach for Assisting the Design of Configurable Process Models[J].IEEE Transactions on Services Computing,2015,8(6):874-888.
[15]FANG X,LIU L,LIU X.Analyzing method of change region in BPM based on module of Petri net[J].Information Technology Journal,2013,12(8):1655-1659.
[16]RINDERLE S,REICHERT M,DADAM P.Correctness criteria for dynamic changes in workflow systems-A survey[J].Data&Knowledge Engineering,2014,50(1):9-34.
[17]HE L,FANG H.Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net[J].Computer Science,2018,6(6):545-567.
[18]MENDLING J,WESKE M,WEIDLICH M.Change Propagation in Process Models Using Behavioural Profiles[C]//IEEE International Conference on Services Computing.2009:33-40.
[19]WU Z H.Petri net theory[M].Beijing:China Machine Press,2006:6-22.
[1] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[2] PANG Xing-long, ZHU Guo-sheng. Survey of Network Traffic Analysis Based on Semi Supervised Learning [J]. Computer Science, 2022, 49(6A): 544-554.
[3] LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301.
[4] TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104.
[5] LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602.
[6] NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618.
[7] QI Yan-rong, ZHOU Xia-bing, LI Bin, ZHOU Qing-lei. FPGA-based CNN Image Recognition Acceleration and Optimization [J]. Computer Science, 2021, 48(4): 205-212.
[8] WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180.
[9] JI Shun-hui, ZHANG Peng-cheng. Test Case Generation Approach for Data Flow Based on Dominance Relations [J]. Computer Science, 2020, 47(9): 40-46.
[10] SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77.
[11] SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321.
[12] SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125.
[13] SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340.
[14] SIDIKE Pa-erhatijiang, MA Jian-feng, SUN Cong. Fine-grained Control Flow Integrity Method on Binaries [J]. Computer Science, 2019, 46(11A): 417-420.
[15] JI Xiu-juan, SUN Xiao-hui, XU Jing. Source Code Memory Leak Static Detection Based on Complex Control Flow [J]. Computer Science, 2019, 46(11A): 517-523.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!