博碩士論文 974401028 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:75 、訪客IP:3.137.221.120
姓名 莊玉成(Yu-Cheng Chuang)  查詢紙本館藏   畢業系所 企業管理學系
論文名稱 以活動層級時間偵測企業異常流程之研究
(Using Contextualized Activity-Level Duration to Discover Irregular Process Instances in Business Operations)
相關論文
★ 在社群網站上作互動推薦及研究使用者行為對其效果之影響★ 以AHP法探討伺服器品牌大廠的供應商遴選指標的權重決定分析
★ 以AHP法探討智慧型手機產業營運中心區位選擇考量關鍵因素之研究★ 太陽能光電產業經營績效評估-應用資料包絡分析法
★ 建構國家太陽能電池產業競爭力比較模式之研究★ 以序列採礦方法探討景氣指標與進出口值的關聯
★ ERP專案成員組合對績效影響之研究★ 推薦期刊文章至適合學科類別之研究
★ 品牌故事分析與比較-以古早味美食產業為例★ 以方法目的鏈比較Starbucks與Cama吸引消費者購買因素
★ 探討創意店家創業價值之研究- 以赤峰街、民生社區為例★ 以領先指標預測企業長短期借款變化之研究
★ 應用層級分析法遴選電競筆記型電腦鍵盤供應商之關鍵因子探討★ 以互惠及利他行為探討信任關係對知識分享之影響
★ 結合人格特質與海報主色以類神經網路推薦電影之研究★ 資料視覺化圖表與議題之關聯
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 高效的時間管理是一個成功企業重要的特徴之一, 對大多數的企業而言,它也是一個必須時時精進與改善的議題。在企業每日營運活動中,異常流程會破壞整體的協同性與敏捷性,甚至會導致重大的損失。
優秀的管理者必須能不斷地找出潛在的異常流程,提前做出預防性的動作以避免發生不正確的流程。本研究採用 k-Nearest Neighbor 演算法,能夠計算出各流程的活動層級時間,並利用這些計算的結果,偵測出企業營運流程中異常的流程實例。
這些活動層級的時間,包括執行時間(execution), 傳遞時間(transmission), 等待時間(queuing) and 延遲時間(procrastination). 除此之外,流程的運行過程中,也會受到代理人如業務人員,生管人員,客戶及其他因素影響。這些影響流程運作的本文訊息(contextual information) ,能夠用模糊集合論的歸屬函數(membership functions)呈現出來,並用以校正活動層級的時間。
此演算法被植入一個全球性的中小企業的資訊系統中,經過一年的運作後,我們擷取該企業的資訊系統日誌並用以偵測異常流程. 實証結果經專家驗証,正確性達 81%
摘要(英) Effective time management is one of the most crucial characteristics of a successful business. For most businesses, time management is an area that can always be improved. Irregularities in execution duration of business processes impede corporate agility and can incur severe consequences, such as project failure and financial loss. Efficient managers must constantly identify potential irregularities in process durations to foresee and avoid process glitches.

This paper proposes a k-nearest neighbor method for systematically detecting irregular process instances in a business by using a comprehensive set of activity-level durations, namely execution, transmission, queue, and procrastination durations. Moreover, because agents, customers, and other variables influence the progress of processes, contextual information is presented using fuzzy values. The values and corresponding membership functions are used to adjust the duration of each activity.

This proposed method was applied to the system logs of a medium-sized logistics company to identify irregularities. Experts confirmed that 81% of the instances identified as irregular were abnormal.
關鍵字(中) ★ 工作流程
★ 活動層級時間
★ 流程異常偵測
★ 流程實例
★ 模糊集合論
關鍵字(英) ★ Workflow
★ Activity-level duration
★ Process irregularities
★ Instances
★ Fuzzy set
論文目次 中文摘要 ..Ⅰ
ABSTRACT Ⅱ
致謝 Ⅲ
INDEX Ⅴ
LIST OF FIGURES Ⅵ
LIST OF TABLES Ⅶ
Chapter 1. Introduction 1
1.1 Research Background Information………………………………………………………................1
1.2 Framework of the Proposed Model ….……………………….....................................................2
1.3 Organization of the Dissertation …………………………………………………………................3
Chapter 2. Literature Review 4
2.1 Enterprise Modeling …….………………………………………………………………………............ 4
2.2 Irregularity Detection in Business Processes …………………………………………............ 5
2.3 Time management ……………………………………………….……………………………….............6
2.4 Durations in Business Process Studies ……………..……………………………………........... 7
Chapter 3. Methodology 10
3.1 Data Derived from eBusiness systems embedded with workflow modules 10
3.2 Outlier Detection based on Activity Level Durations 10
3.3 Identifying Irregular Process Instances 15
Chapter 4. Estmating Activity-Level Durations with Contextual Information 18
4.1 Contextual variables and related fuzzy functions 18
4.2 Estmating Duration with Joined Fuzzy sets 21
4.3 The examples of Estimating durations with joined fuzzy sets 22
Chapter 5. Case Application ………………………………………………………………………………..........26
5.1 Contextual Variables 30
5.2 Evaluation Metrics 31
5.3 The Experiment Result 32
Chapter 6. Conclusion and Future Research 41
6.1 Conclusion 41
6.2 Research Limitation and Futre Research 42
References 43
參考文獻 [1] B. Sherehiy, W. Karwowski, and J. K. Layer, "A review of enterprise agility: Concepts, frameworks, and attributes," International Journal of industrial ergonomics, vol. 37, no. 5, pp. 445-460, 2007.
[2] F. Bezerra and J. Wainer, "Anomaly detection algorithms in business process logs," in Proc. of the Tenth International Conference on Enterprise Information Systems (ICEIS), 2008, pp. 11–18.
[3] R. K. L. Ko, "A computer scientist’s introductory guide to business process management (BPM)," Crossroads, vol. 15, no. 4, pp. 11-18, 2009.
[4] Y.-C. Chuang, P.-Y. Hsu, M.-T. Wang, and S.-C. Chen, "A frequency-based algorithm for workflow outlier mining," in Future Generation Information Technology, 2010, pp. 191-207.
[5] J. Eder and E. Panagos, Managing Time in Workflow Systems, in Workflow Handbook, L. Fischer (Ed.), Future Strategies Inc., USA, 2001.
[6] W. Li and Y. Fan, "A time management method in workflow management system," in IEEE Workshops at the Grid and Pervasive Computing Conference (GPC′09), 2009, pp. 3-10.
[7] J. H. Son and M. H. Kim, “Improving the performance of time-constrained workflow processing,” Journal of Systems and Software, vol. 58, no. 3, pp. 211-219, 2001.
[8] S. Kim, N. W. Cho, Y. J. Lee, S. H. Kang, T. Kim, H. Hwang, and D. Mun, "Application of density-based outlier detection to database activity monitoring," Information Systems Frontiers, vol. 15, no. 1, pp. 55-65, 2010.
[9] M. Song and W. M. P. van der Aalst, "Towards comprehensive support for organizational mining," Decision Support Systems, vol. 46, no. 1, pp. 300-317, 2008.
[10] M.-T. Wang, P.-Y. Hsu and Y.-C. Chuang, “Mining workflow outlier with a frequency-based algorithm,” International Journal of Control and Automation, vol. 4, no. 2, pp. 1-22, 2011.
[11] T. Liu, Y. Cheng, and Z. Ni, “Mining event logs to support workflow resource allocation” Knowledge-Based Systems, vol. 35, pp. 320–331, 2012.
[12] D. R. Ferreira and L. H. Thom, "A semantic approach to the discovery of workflow activity patterns in event logs," International Journal of Business Process Integration and Management, vol. 6, no. 1, pp. 4-17, 2012.
[13] Y. Wen, Z. Chen, J. Liu, and J. Chen, “Mining batch processing workflow models from event logs,” Concurrency and Computation: Practice and Experience, vol. 25, no. 13, pp. 1928-1942, 2013.
[14] L. Bouarfa and J. Dankelman, "Workflow mining and outlier detection from clinical activity logs," Journal of Biomedical Informatics, vol. 45, no. 6, pp. 1185–1190, 2012.
[15] Z. Huang, X. Lu , H. Duan, and W. Fan, "Summarizing clinical pathways from event logs," Journal of Biomedical Informatics, vol. 46, no. 1, pp. 111–127, 2013.
[16] V. R. Jakkula, A. S. Crandall, and D. J. Cook, "Enhancing anomaly detection using temporal pattern discovery," in Advanced Intelligent Environments, 2009, pp. 175-194.
[17] G. Bruno and P. Garza, "Temporal outlier detection by using quasi-functional temporal dependencies," Data & Knowledge Engineering, vol. 69, no. 6, pp. 619-639, 2010.
[18] B. Kang, D. Kim, S. H. Kang, "Real-time business process monitoring method for prediction of abnormal termination using KNNI-based LOF prediction," Expert Systems with Applications, vol. 39, no. 5 , pp. 6061-6068, 2012.
[19] S. B. Needleman and C. D. Wunsch, "A general method applicable to the search for similarities in the amino acid sequence of two proteins," Journal of molecular biology, vol. 48, no. 3, pp. 443-453, 1970.
[20] J. H. Son, J. H. Kim, and M. H. O. Kim, “Deadline allocation in a time-constrained workflow,” International Journal of Cooperative Information Systems, vol. 10, no. 4, pp. 509-530, 2014.
[21] F. Angiulli and F. Fassetti, “Exploiting domain knowledge to detect outliers,” Data Mining and Knowledge Discovery, vol. 28, no. 2, pp. 519–568, 2014.
[22] G. Alonso, D. Agrawal, A. El Abbadi, and C. Mohan, “Functionality and limitations of current workflow management systems,” IEEE Expert, vol. 12, no. 5, 1997.
[23] Y. G. Kim, "Process modeling for BPR: Event-process chain approach," in J. I. DeGross, G. Ariau, C. Beath, R. Hoyer, C. Kemmer (eds) Proc. 16th International Conference on Information Systems (ICIS), 1995, p. 11.
[24] H.-H. Hvolby and A. Barfod, "Modelling customer order processes," in Proc. of the 13th IPS Research Seminar on Design for Integration in Manufacturing, 1998, ISBN, 87-89867.
[25] J. H. Trienekens and H.-H. Hvolby, “Models for supply chain reengineering,” Production Planning & Control, vol. 12, no. 3, pp. 254-264, 2001.
[26] H. D. Kuna, R. García-Martinez, F. R. Villatoro, "Outlier detection in audit logs for application systems," Information Systems, vol. 44, pp. 22–33, 2014.
[27] X. Li, Y. Xue, and B. Malin, “Detecting anomalous user behaviors in workflow-driven Web applications,” in Proc. of the 2012 IEEE 31st Symposium on Reliable Distributed Systems, IEEE Computer Society, 2012, pp. 1-10.
[28] A. V. Deokar and O. F. El-Gayar, "Decision-enabled dynamic process management for networked enterprises," Information Systems Frontiers, vol. 13, no.5, pp. 655-668, 2011.
[29] S. Nurcan1 and M. H. Edme, "Intention-driven modeling for flexible workflow applications," Software Process: Improvement and Practice, vol. 10, no. 4, pp. 363-377, 2005.
[30] S.-K. Lee, B. Kim , M. Huh, S. Cho, S. Park, and D. Lee, "Mining transportation logs for understanding the after-assembly block manufacturing process in the shipbuilding industry," Expert Systems with Applications, vol. 40, no. 1, pp. 83-95, 2013.
[31] J. Eder, E. Panagos, and M. Rabinovich, "Time constraints in workflow systems," in Proc. of the 11th International Conference on Advanced Information Systems Engineering (CAiSE), 1999, pp. 286-300.
[32] M. Bierbaumer, J. Eder, and H. Pichler, "Calculation of delay times for workflows with fixed-date constraints," in Proc. of 7th IEEE International Conference on E-Commerce Technology, 2005, pp. 544 - 547.
[33] B. Weber, B. F. van Dongen, M. Pesic, and C. W. Guenther, “Supporting flexible processes through recommendations based on history,” in Proc. of the 6th International Conference on Business Process Management, 2008, pp. 51-66.
[34] A. Rozinat, R. S. Mans, M. S. Song, W. M. P. van der Aalst, "Discovering colored Petri nets from event logs," International Journal on Software Tools for Technology Transfer, vol. 10, no. 1, pp. 57-74, 2008.
[35] A. Rozinat, R. S. Mans, M. S. Song, W. M. P. van der Aalst, "Discovering simulation models," Information Systems, vol. 34, no. 3, pp. 305-327, 2009.
[36] H. Wang and Q. Zeng, “Modeling and analysis for workflow constrained by resources and nondetermined time: An approach based on Petri nets,” in IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2008, vol. 38, no. 4, pp. 802– 817.
[37] W. M. P. van der Aalst, K. M. van Hee, A. H. ter Hofstede, N. Sidorova, H. M. Verbeek, M. Voorhoeve, and M. T. Wynn, “Soundness of workflow nets: classification, decidability, and analysis,” Formal Aspects of Computing, vol. 23, no. 3, pp. 333-363, 2011.
[38] Y. Liu, H. Zhang, C. Li, and R. J. Jiao, “Workflow simulation for operational decision support using event graph through process mining,” Decision Support Systems, vol. 52, no. 3, pp. 685–697, 2012.
[39] H. Zhuge, T. Cheung, and H. K. Pung, “A timed workflow process model,” Journal of Systems and Software, vol. 55, no. 3, pp. 231-243, 2001.
[40] R. S. Mans, N. C. Russell, W. van der Aalst, P. J. Bakker, and A. J. Moleman, "Simulation to analyze the impact of a schedule-aware workflow management system," Simulation, vol. 86, no. 8-9, pp. 519-541, 2010.
[41] Q. Zeng, S. X. Sun, H. Duan, C. Liu, and H. Wang, “Cross-organizational collaborative workflow mining from a multi-source log,” Decision Support Systems, vol. 54, no. 3, pp. 1280–1301, 2013.
[42] L. Xu, H. Liu, S. Wang, and K. Wang, “Modelling and analysis techniques for cross-organizational workflow systems,” Systems Research and Behavioral Science, vol. 26, no. 3, pp. 367-389, 2009.
[43] X. H. Jiang and Z. X. Nie, "Load-related completion time estimation for business process instances," Computer Integrated Manufacturing Systems, vol. 17, no. 8, pp. 1640-1646, 2011.
[44] S. X. Sun and J. L. Zhao, “Formal workflow design analytics using data flow modeling,” Decision Support Systems, vol. 55, no.1, pp. 270–283, 2013.
[45] C. Earl, The fuzzy systems handbook, A Practitioner′s Guide to Building, Using, and Maintaining Fuzzy Systems, Boston: AP Professional, 1994.
[46] H. Liu, F. Hussain, C. L. Tan, and M. Dash, “Discretization: An enabling technique," Data Mining Knowledge Discovery, vol. 6, no. 4, pp. 393–423, 2002.
[47] O. Shafiq, R. Alhajj, and J. Rokne, "Log based business process engineering using fuzzy web service discovery," Knowledge-Based Systems, vol. 60, pp. 1-9, 2014.
[48] W. M. P. van der Aalst, “Formalization and verification of event-driven process chains,” Information and Software Technology, vol. 41, no. 10, pp. 639-650, 1999.
[49] M. M. Breunig, H.-P. Kriegel, R. T. Ng and J. Sander, "LOF: Identifying density-based local outliers," in ACM sigmod record, 2000, vol. 29, no. 2, pp. 93-104.
[50] B. Kang, S. K. Lee, Y. B. Min, S. H. Kang, and N. W. Cho, "Real-time process quality control for business activity monitoring," in IEEE International Conference on Computational Science and Its Applications (ICCSA′09), 2009. pp. 237-242.
[51] D. Grigori, F. Casati, U. Dayal, and M.-C. Shan, "Improving business process quality through exception understanding, prediction, and prevention," in Proc. of the 27th very large data base endowment conference, 2001, pp. 159–168.
[52] D. Grigori, F. Casati, M. Castellanos, U. Dayal, M. Sayal, and M.-C. Shan, "Business process intelligence," Computers in Industry, vol. 53, no. 3, pp. 321–343, 2004.
[53] V. Bhatt, K. G. Sharma, A. Ram, "An enhanced approach for LOF in data mining," in IEEE International Conference on Green High Performance Computing (ICGHPC), 2013, p. 1-3.
[54] Y. Ma, H. Shi, H. Ma, and M. Wang, "Dynamic process monitoring using adaptive local outlier factor," Chemometrics and Intelligent Laboratory Systems, vol. 127, pp. 89–101, 2013.
[55] D. M. Hawkins, Identification of Outliers, London: Chapman and Hall, 1980.
[56] G. Terzakis, How can we find the k in kNN, http://www.researchgate.net/, 2014.
指導教授 許秉瑜(PingYu Hsu) 審核日期 2015-6-18
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明