Computer Science ›› 2018, Vol. 45 ›› Issue (6): 156-160.doi: 10.11896/j.issn.1002-137X.2018.06.027

• Software & Database Technology • Previous Articles     Next Articles

Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph

ZHAO Pei-hai, WANG Mi-mi   

  1. Department of Computer Science and Technology,Tongji University,Shanghai 201804,China;
    The Key Laboratory of Embedded System and Service Computing,Ministry of Education,Tongji University,Shanghai 200092,China
  • Received:2018-01-06 Online:2018-06-15 Published:2018-07-24

Abstract: In the similarity analysis process of business process models,sometimes there may be loop structure in the business process model.Existing methods do not consider the loop structure,and ignore the influence of loop on consistency.A behavior consistency measure method was proposed based on transition multi-sets of Petri nets.Firstly,this paper analyzed five kinds of behavior relations of transitions,and proposed a three-dimensional behavior relation graph based on Petri net branching processes to compare the behavior relations between two models.Secondly,by analyzing the relations between two three-dimensional behavior relation graphs,this paper proposed a consistency measure method based on three-dimensional behavior relation graphs.The theoretical analysis and specific examples show that the me-thod is very effective.

Key words: Consistency measure, Loop, Petri net, Three-dimensional behavior relation graph, Transition multi-set

CLC Number: 

  • TP391.9
[1]MURATA T.Petri nets:Properties,analysis and applications[J].Proceedings of the IEEE,1989,77(4):541-580.
[2]WANG M,LIU G,JIANG C,et al.Computation of Secure Consistency for Real Systems[C]//International Conference on Security,Privacy and Anonymity in Computation,Communication and Storage.Springer,Cham,2016:84-97.
[3]LIU X,FANG X,WANG M,et al.The Behavior Trustworthiness Analysis Methods of Composite Web Services Based on Process Mining [J].Applied Mathematics and Information Sciences,2013,7(5):1985-1992.
[4]FANG X,WANG M,YIN Z.Behavior Consistency Analysis Based on the Behavior Profile about Transition Multi-Set of Petri Net [J].Przeglad Elektrotechniczny(Electrical Review),2013,89(1b):171-173.
[5]DIJKMAN R,DUMAS M,VAN DONGEN B,et al.Similarity of business process models:Metrics and evaluation [J].Information Systems,2011,36(2):498-516.
[6]WALSHE B.Identifying complex semantic matches[M]//The Semantic Web:Research and Applications.Springer,Berlin:Heidelberg,2012:849-853.
[7]SCHÖNBERGER A,WIRTZ G.Taxonomy on Consistency Requirements in the Business Process Integration Context[C]//Proceedings of 2008 Conference on Software Engineering and Knowledge Engineering(SEKE’2008).2008:593-598.
[8]ROZINAT A,VAN DER AALST W M P.Conformance checking of processes based on monitoring real behavior [J].Information Systems,2008,33(1):64-95.
[9]TINI S,LARSEN K G,GEBLER D.Compositional bisimulation metric reasoning with probabilistic process calculi[J].Logical Methods in Computer Science,2017,12(4):1-38.
[10]POLYVYANYY A,WEIDLICH M,CONFORTI R,et al.The 4C spectrum of fundamental behavioral relations for concurrent systems[C]//International Conference on Applications and Theory of Petri Nets and Concurrency.Springer,Cham,2014:210-232.
[11]ARMAS-CERVANTES A,BALDAN P,DUMAS M,et al. Diagnosing behavioral differences between business process mo-dels:An approach based on event structures [J].Information Systems,2016,56(C):304-325.
[12]WEIDLICH M,MENDLING J.Perceived consistency between process models [J].Information Systems,2012,37(2):80-98.
[13]WEIDLICH M,MENDLING J,WESKE M.Efficient consistency measurement based on behavioral profiles of process models [J].IEEE Transactions on Software Engineering,2011,37(3):410-429.
[14]ARMAS-CERVANTES A,DUMAS M,GARCíA-BAÑUELOS L,et al.On the suitability of generalized behavioral profiles for process model comparison [M]//Web Services,Formal Me-thods,and Behavioral Types.Springer,Cham,2014:13-28.
[15]POLYVYANYY A,ARMAS-CERVANTES A,DUMAS M, et al.On the expressive power of behavioral profiles[J].Formal Aspects of Computing,2016,28(4):597-613.
[16]ENGELFRIET J.Branching processes of Petri nets [J].Acta Informatica,1991,28(6):575-591.
[17]COUVREUR J M,POITRENAUD D,WEIL P.Branching processes of general Petri nets[J].Fundamenta Informaticae,2013,122(1/2):31-58.
[1] WU Gong-xing, Sun Zhao-yang, JU Chun-hua. Closed-loop Supply Chain Network Design Model Considering Interruption Risk and Fuzzy Pricing [J]. Computer Science, 2022, 49(7): 220-225.
[2] LU Hao-song, HU Yong-hua, WANG Shu-ying, ZHOU Xin-lian, LI Hui-xiang. Study on Hybrid Resource Heuristic Loop Unrolling Factor Selection Method Based on Vector DSP [J]. Computer Science, 2022, 49(6A): 777-783.
[3] LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301.
[4] ZHOU Qin, LUO Fei, DING Wei-chao, GU Chun-hua, ZHENG Shuai. Double Speedy Q-Learning Based on Successive Over Relaxation [J]. Computer Science, 2022, 49(3): 239-245.
[5] ZHANG Jie, YUE Shao-hua, WANG Gang, LIU Jia-yi, YAO Xiao-qiang. Multi-agent System Based on Stackelberg and Edge Laplace Matrix [J]. Computer Science, 2021, 48(8): 253-262.
[6] TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104.
[7] LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602.
[8] NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618.
[9] FU Tian-hao, TIAN Hong-yun, JIN Yu-yang, YANG Zhang, ZHAI Ji-dong, WU Lin-ping, XU Xiao-wen. Performance Skeleton Analysis Method Towards Component-based Parallel Applications [J]. Computer Science, 2021, 48(6): 1-9.
[10] HU Wei-fang, CHEN Yun, LI Ying-ying, SHANG Jian-dong. Loop Fusion Strategy Based on Data Reuse Analysis in Polyhedral Compilation [J]. Computer Science, 2021, 48(12): 49-58.
[11] WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180.
[12] CHI Hao-yu, CHEN Chang-bo. Prediction of Loop Tiling Size Based on Neural Network [J]. Computer Science, 2020, 47(8): 62-70.
[13] YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63.
[14] WANG Dan, SHI Chao-xia, WANG Yan-qing. Loop Closure Detection Method Based on Unsupervised Deep Learning [J]. Computer Science, 2020, 47(10): 228-232.
[15] SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!