Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: Supplementary 8, Pages: 1-7
Sungho Sim1 and Sujin Baek2*
For surviving in their complex and dynamic environments, organizations should be adaptable and interoperable with these environments. However, there is a limit for distinguishing the range of occurrence and the level of severity in regard to the new external problems occurring in a complicated environment. In addition, they lack system servitization for dynamic business model processing and system integration. Therefore, a study upon the handling of service requirements by users, which could occur dynamically, needs a new concept of process mining to redesign a process to fit adaptation measure after analyzing the scope of problem recognition to change. The existing studies of process mining have been aimed to extract the information of redesigning business process at the level of simple field of database; examine dependency relation; and create a complete process model. Therefore, they lack in ways to analyze and evaluate business process of new requirements for external situations and solve the problems of dynamic reconfiguration. In this respect, the present study is aimed to analyze goal scenario so as to provide the service requirements of new scenarios that occurs dynamically and propose the process mining method that uses goal heuristic algorithm to analyze and evaluate process variable information. When a new requirement comes out, business process changes by goal on the basis of context information and searches a fit process model from existing goal scenarios and new goal scenario by goal heuristic algorithm. And then the similarity, importance, association of the process models are evaluated and analyzed for the purpose. The information analyzed in this way is capable of finding out problems resulting from change in requirements when necessary, determining the needs of adaptation and reconfiguring to keep providing services.
Keywords: Contextual Situation Adaptation, Process Mining, Reconfiguration, Security Policy Models
Subscribe now for latest articles and news.