Presentation of the paper "Extending Temporal Business Constraints with Uncertainty" at the CAiSE2020 Forum. The paper is available here: https://link.springer.com/chapter/10.1007/978-3-030-58135-0_8
Abstract: Conformance checking is a fundamental task to detect deviations between the actual and the expected courses of execution of a business process. In this context, temporal business constraints have been extensively adopted to declaratively capture the expected behavior of the process. However, traditionally, these constraints are interpreted logically in a crisp way: a process execution trace conforms with a constraint model if all the constraints therein are satisfied. This is too restrictive when one wants to capture best practices, constraints involving uncontrollable activities, and exceptional but still conforming behaviors. This calls for the extension of business constraints with uncertainty. In this paper, we tackle this timely and important challenge, relying on recent results on probabilistic temporal logics over finite traces. Specifically, we equip business constraints with a natural, probabilistic notion of uncertainty. We discuss the semantic implications of the resulting framework and show how probabilistic conformance checking and constraint entailment can be tackled therein.
Presentation of the paper "Extending Temporal Business Constraints with Uncertainty" at the 18th Int. Conference on Business Process Management (BPM 2020). Paper available here: https://doi.org/10.1007/978-3-030-58666-9_3
Abstract: Temporal business constraints have been extensively adopted to declaratively capture the acceptable courses of execution in a business process. However, traditionally, constraints are interpreted logically in a crisp way: a process execution trace conforms with a constraint model if all the constraints therein are satisfied. This is too restrictive when one wants to capture best practices, constraints involving uncontrollable activities, and exceptional but still conforming behaviors. This calls for the extension of business constraints with uncertainty. In this paper, we tackle this timely and important challenge, relying on recent results on probabilistic temporal logics over finite traces. Specifically, our contribution is threefold. First, we delve into the conceptual meaning of probabilistic constraints and their semantics. Second, we argue that probabilistic constraints can be discovered from event data using existing techniques for declarative process discovery. Third, we study how to monitor probabilistic constraints, where constraints and their combinations may be in multiple monitoring states at the same time, though with different probabilities.
Presentation of the paper "Extending Temporal Business Constraints with Uncertainty" at the 18th Int. Conference on Business Process Management (BPM 2020). Paper available here: https://doi.org/10.1007/978-3-030-58666-9_3
Abstract: Temporal business constraints have been extensively adopted to declaratively capture the acceptable courses of execution in a business process. However, traditionally, constraints are interpreted logically in a crisp way: a process execution trace conforms with a constraint model if all the constraints therein are satisfied. This is too restrictive when one wants to capture best practices, constraints involving uncontrollable activities, and exceptional but still conforming behaviors. This calls for the extension of business constraints with uncertainty. In this paper, we tackle this timely and important challenge, relying on recent results on probabilistic temporal logics over finite traces. Specifically, our contribution is threefold. First, we delve into the conceptual meaning of probabilistic constraints and their semantics. Second, we argue that probabilistic constraints can be discovered from event data using existing techniques for declarative process discovery. Third, we study how to monitor probabilistic constraints, where constraints and their combinations may be in multiple monitoring states at the same time, though with different probabilities.
Quantum computing has become a noteworthy topic in academia and industry. The multinational companies in the world have been obtaining impressive advances in all areas of quantum technology during the last two decades. These companies try to construct real quantum computers in order to exploit their theoretical preferences over today’s classical computers in practical applications. However, they are challenging to build a full-scale quantum computer because of their increased susceptibility to errors due to decoherence and other quantum noise. Therefore, quantum error correction (QEC) and fault-tolerance protocol will be essential for running quantum algorithms on large-scale quantum computers.
The overall effect of noise is modeled in terms of a set of Pauli operators and the identity acting on the physical qubits (bit flip, phase flip and a combination of bit and phase flips). In addition to Pauli errors, there is another error named leakage errors that occur when a qubit leaves the defined computational subspace. As the location of leakage errors is unknown, these can damage even more the quantum computations. Thus, this talk will briefly provide quantum error models.
Stuck with your Regression Assignment? Get 24/7 help from tutors with Phd in the subject. Email us at support@helpwithassignment.com
Reach us at http://www.HelpWithAssignment.com
Invited seminar in the Hasselt University BINF Research Seminar Series. I discuss the needed transition from case-centric process models where there is a single notion of case and process instances are evolved in isolation, to object-centric processes where multiple, interrelated objects are co-evolved synchronously ad asynchronously. Within this novel paradigm, I present two formal approaches, one extending declarative constraints with data correlations, the other enriching Petri nets with objects and relations.
Slides of our BPM 2022 paper on "Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting", which received the best paper award at the conference. Paper available here: https://link.springer.com/chapter/10.1007/978-3-031-16103-2_22
More Related Content
Similar to Extending Temporal Business Constraints with Uncertainty
Quantum computing has become a noteworthy topic in academia and industry. The multinational companies in the world have been obtaining impressive advances in all areas of quantum technology during the last two decades. These companies try to construct real quantum computers in order to exploit their theoretical preferences over today’s classical computers in practical applications. However, they are challenging to build a full-scale quantum computer because of their increased susceptibility to errors due to decoherence and other quantum noise. Therefore, quantum error correction (QEC) and fault-tolerance protocol will be essential for running quantum algorithms on large-scale quantum computers.
The overall effect of noise is modeled in terms of a set of Pauli operators and the identity acting on the physical qubits (bit flip, phase flip and a combination of bit and phase flips). In addition to Pauli errors, there is another error named leakage errors that occur when a qubit leaves the defined computational subspace. As the location of leakage errors is unknown, these can damage even more the quantum computations. Thus, this talk will briefly provide quantum error models.
Stuck with your Regression Assignment? Get 24/7 help from tutors with Phd in the subject. Email us at support@helpwithassignment.com
Reach us at http://www.HelpWithAssignment.com
Invited seminar in the Hasselt University BINF Research Seminar Series. I discuss the needed transition from case-centric process models where there is a single notion of case and process instances are evolved in isolation, to object-centric processes where multiple, interrelated objects are co-evolved synchronously ad asynchronously. Within this novel paradigm, I present two formal approaches, one extending declarative constraints with data correlations, the other enriching Petri nets with objects and relations.
Slides of our BPM 2022 paper on "Reasoning on Labelled Petri Nets and Their Dynamics in a Stochastic Setting", which received the best paper award at the conference. Paper available here: https://link.springer.com/chapter/10.1007/978-3-031-16103-2_22
Slides of the keynote speech on "Constraints for process framing in Augmented BPM" at the AI4BPM 2022 International Workshop, co-located with BPM 2022. The keynote focuses on the problem of "process framing" in the context of the new vision of "Augmented BPM", where BPM systems are augmented with AI capabilities. This vision is described in a manifesto, available here: https://arxiv.org/abs/2201.12855
Keynote speech at KES 2022 on "Intelligent Systems for Process Mining". I introduce process mining, discuss why process mining tasks should be approached by using intelligent systems, and show a concrete example of this combination, namely (anticipatory) monitoring of evolving processes against temporal constraints, using techniques from knowledge representation and formal methods (in particular, temporal logics over finite traces and their automata-theoretic characterization).
Presentation (jointly with Claudio Di Ciccio) on "Declarative Process Mining", as part of the 1st Summer School in Process Mining (http://www.process-mining-summer-school.org). The Presentation summarizes 15 years of research in declarative process mining, covering declarative process modeling, reasoning on declarative process specifications, discovery of process constraints from event logs, conformance checking and monitoring of process constraints at runtime. This is done without ad-hoc algorithms, but relying on well-established techniques at the intersection of formal methods, artificial intelligence, and data science.
Presentation on "From Case-Isolated to Object-Centric Processes - A Tale of Two Models" as part of the Hasselt University BINF Research Seminar Series (see https://www.uhasselt.be/en/onderzoeksgroepen-en/binf/research-seminar-series).
Invited seminar on "Modeling and Reasoning over Declarative Data-Aware Processes" as part of the KRDB Summer Online Seminars 2020 (https://www.inf.unibz.it/krdb/sos-2020/).
Presentation of the paper "Soundness of Data-Aware Processes with Arithmetic Conditions" at the 34th International Conference on Advanced Information Systems Engineering (CAiSE 2022). Paper available here: https://doi.org/10.1007/978-3-031-07472-1_23
Abstract:
Data-aware processes represent and integrate structural and behavioural constraints in a single model, and are thus increasingly investigated in business process management and information systems engineering. In this spectrum, Data Petri nets (DPNs) have gained increasing popularity thanks to their ability to balance simplicity with expressiveness. The interplay of data and control-flow makes checking the correctness of such models, specifically the well-known property of soundness, crucial and challenging. A major shortcoming of previous approaches for checking soundness of DPNs is that they consider data conditions without arithmetic, an essential feature when dealing with real-world, concrete applications. In this paper, we attack this open problem by providing a foundational and operational framework for assessing soundness of DPNs enriched with arithmetic data conditions. The framework comes with a proof-of-concept implementation that, instead of relying on ad-hoc techniques, employs off-the-shelf established SMT technologies. The implementation is validated on a collection of examples from the literature, and on synthetic variants constructed from such examples.
Presentation of the paper "Probabilistic Trace Alignment" at the 3rd International Conference on Process Mining (ICPM 2021). Paper available here: https://doi.org/10.1109/ICPM53251.2021.9576856
Abstract:
Alignments provide sophisticated diagnostics that pinpoint deviations in a trace with respect to a process model. Alignment-based approaches for conformance checking have so far used crisp process models as a reference. Recent probabilistic conformance checking approaches check the degree of conformance of an event log as a whole with respect to a stochastic process model, without providing alignments. For the first time, we introduce a conformance checking approach based on trace alignments using stochastic Workflow nets. This requires to handle the two possibly contrasting forces of the cost of the alignment on the one hand and the likelihood of the model trace with respect to which the alignment is computed on the other.
Presentation of the paper "Strategy Synthesis for Data-Aware Dynamic Systems with Multiple Actors" at the 7th International Conference on Principles of Knowledge Representation and Reasoning (KR 2020). Paper available here: https://proceedings.kr.org/2020/32/
Abstract: The integrated modeling and analysis of dynamic systems and the data they manipulate has been long advocated, on the one hand, to understand how data and corresponding decisions affect the system execution, and on the other hand to capture how actions occurring in the systems operate over data. KR techniques proved successful in handling a variety of tasks over such integrated models, ranging from verification to online monitoring. In this paper, we consider a simple, yet relevant model for data-aware dynamic systems (DDSs), consisting of a finite-state control structure defining the executability of actions that manipulate a finite set of variables with an infinite domain. On top of this model, we consider a data-aware version of reactive synthesis, where execution strategies are built by guaranteeing the satisfaction of a desired linear temporal property that simultaneously accounts for the system dynamics and data evolution.
Presentation of the paper "Modeling and Reasoning over Declarative Data-Aware Processes with Object-Centric Behavioral Constraints" at the 17th Int. Conference on Business Process Management (BPM 2019). Paper available here: https://link.springer.com/chapter/10.1007/978-3-030-26619-6_11
Abstract
Existing process modeling notations ranging from Petri nets to BPMN have difficulties capturing the data manipulated by processes. Process models often focus on the control flow, lacking an explicit, conceptually well-founded integration with real data models, such as ER diagrams or UML class diagrams. To overcome this limitation, Object-Centric Behavioral Constraints (OCBC) models were recently proposed as a new notation that combines full-fledged data models with control-flow constraints inspired by declarative process modeling notations such as DECLARE and DCR Graphs. We propose a formalization of the OCBC model using temporal description logics. The obtained formalization allows us to lift all reasoning services defined for constraint-based process modeling notations without data, to the much more sophisticated scenario of OCBC. Furthermore, we show how reasoning over OCBC models can be reformulated into decidable, standard reasoning tasks over the corresponding temporal description logic knowledge base.
Keynote speech at the Belgian Process Mining Research Day 2021. I discuss the open, critical challenge of data preparation in process mining, considering the case where the original event data are implicitly stored in (legacy) relational databases. This case covers the common situation where event data are stored inside the data layer of an ERP or CRM system. This is usually handled using manual, ad-hoc, error-prone ETL procedures. I propose instead to adopt a pipeline based on semantic technologies, in particular the framework of ontology-based data access (also known as virtual knowledge graph). The approach is code-less, and relies on three main conceptual steps: (1) the creation of a data model capturing the relevant classes, attributes, and associations in the domain of interest (2) the definition of declarative mappings from the source database to the data model, following the ontology-based data access paradigm (3) the annotation of the data model with indications on which classes/associations/attributes provide the relevant notions of case, events, event attributes, and event-to-case relation. Once this is done, the framework automatically extracts the event log from the legacy data. This makes extremely smooth to generate logs by taking multiple perspectives on the same reality. The approach has been operationalized in the onprom tool, which employs semantic web standard languages for the various steps, and the XES standard as the target format for the event logs.
Keynote speech at the 7th International Workshop on DEClarative, DECision and Hybrid approaches to processes ( DEC2H 2019) In conjunction with BPM 2019.
This is a talk about the combined modeling and reasoning techniques for decisions, background knowledge, and work processes.
The advent of the OMG Decision Model and Notation (DMN) standard has revived interest, both from academia and industry, in decision management and its relationship with business process management. Several techniques and tools for the static analysis of decision models have been brought forward, taking advantage of the trade-off between expressiveness and computational tractability offered by the DMN S-FEEL language.
In this keynote, I argue that decisions have to be put in perspective, that is, understood and analyzed within their surrounding organizational boundaries. This brings new challenges that, in turn, require novel, advanced analysis techniques. Using a simple but illustrative example, I consider in particular two relevant settings: decisions interpreted the presence of background, structural knowledge of the domain of interest, and (data-aware) business processes routing process instances based on decisions. Notably, the latter setting is of particular interest in the context of multi-perspective process mining. I report on how we successfully tackled key analysis tasks in both settings, through a balanced combination of conceptual modeling, formal methods, and knowledge representation and re
Presentation at "Ontology Make Sense", an event in honor of Nicola Guarino, on how to integrate data models with behavioral constraints, an essential problem when modeling multi-case real-life work processes evolving multiple objects at once. I propose to combine UML class diagrams with temporal constraints on finite traces, linked to the data model via co-referencing constraints on classes and associations.
Presentation at EDOC 2019 on connecting legacy relational data to ontologies on norms and their evolution via temporal ontology-based data access. The paper received the best paper award at the conference.
Presentation ad EDOC 2019 on monitoring multi-perspective business constraints accounting for time and data, with a specific focus on the (unsolvable in general) problem of conflict detection.
My presentation at "Fit for Digital 2019", organized by Informatica Alto Adige S.p.A. to discuss digital transformation in the public administration sector, with more than 200 participants. I discussed how the digitalization of models and data can boost a new way of managing processes based on factual information.
Presentation at BPM 2019, focused on a data-aware extension of BPMN encompassing read-write and read-only data, and on SMT-techniques for effectively tackling parameterized verification of the resulting integrated models.
Presentation at BPM 2019, proposing object-centric behavioral constraints as a modeling approach to capture real-life processes with many-to-many and one-to-many relations, and bringing forward a formal semantics and automated reasoning techniques grounded in temporal description logics.
Keynote at DEC2H 2019, giving an overview of our research on integrated models that respectively put DMN decisions in the context of background domain knowledge and business processes.
More from Faculty of Computer Science - Free University of Bozen-Bolzano (20)
Slide 1: Title Slide
Extrachromosomal Inheritance
Slide 2: Introduction to Extrachromosomal Inheritance
Definition: Extrachromosomal inheritance refers to the transmission of genetic material that is not found within the nucleus.
Key Components: Involves genes located in mitochondria, chloroplasts, and plasmids.
Slide 3: Mitochondrial Inheritance
Mitochondria: Organelles responsible for energy production.
Mitochondrial DNA (mtDNA): Circular DNA molecule found in mitochondria.
Inheritance Pattern: Maternally inherited, meaning it is passed from mothers to all their offspring.
Diseases: Examples include Leber’s hereditary optic neuropathy (LHON) and mitochondrial myopathy.
Slide 4: Chloroplast Inheritance
Chloroplasts: Organelles responsible for photosynthesis in plants.
Chloroplast DNA (cpDNA): Circular DNA molecule found in chloroplasts.
Inheritance Pattern: Often maternally inherited in most plants, but can vary in some species.
Examples: Variegation in plants, where leaf color patterns are determined by chloroplast DNA.
Slide 5: Plasmid Inheritance
Plasmids: Small, circular DNA molecules found in bacteria and some eukaryotes.
Features: Can carry antibiotic resistance genes and can be transferred between cells through processes like conjugation.
Significance: Important in biotechnology for gene cloning and genetic engineering.
Slide 6: Mechanisms of Extrachromosomal Inheritance
Non-Mendelian Patterns: Do not follow Mendel’s laws of inheritance.
Cytoplasmic Segregation: During cell division, organelles like mitochondria and chloroplasts are randomly distributed to daughter cells.
Heteroplasmy: Presence of more than one type of organellar genome within a cell, leading to variation in expression.
Slide 7: Examples of Extrachromosomal Inheritance
Four O’clock Plant (Mirabilis jalapa): Shows variegated leaves due to different cpDNA in leaf cells.
Petite Mutants in Yeast: Result from mutations in mitochondrial DNA affecting respiration.
Slide 8: Importance of Extrachromosomal Inheritance
Evolution: Provides insight into the evolution of eukaryotic cells.
Medicine: Understanding mitochondrial inheritance helps in diagnosing and treating mitochondrial diseases.
Agriculture: Chloroplast inheritance can be used in plant breeding and genetic modification.
Slide 9: Recent Research and Advances
Gene Editing: Techniques like CRISPR-Cas9 are being used to edit mitochondrial and chloroplast DNA.
Therapies: Development of mitochondrial replacement therapy (MRT) for preventing mitochondrial diseases.
Slide 10: Conclusion
Summary: Extrachromosomal inheritance involves the transmission of genetic material outside the nucleus and plays a crucial role in genetics, medicine, and biotechnology.
Future Directions: Continued research and technological advancements hold promise for new treatments and applications.
Slide 11: Questions and Discussion
Invite Audience: Open the floor for any questions or further discussion on the topic.
Professional air quality monitoring systems provide immediate, on-site data for analysis, compliance, and decision-making.
Monitor common gases, weather parameters, particulates.
Comparing Evolved Extractive Text Summary Scores of Bidirectional Encoder Rep...University of Maribor
Slides from:
11th International Conference on Electrical, Electronics and Computer Engineering (IcETRAN), Niš, 3-6 June 2024
Track: Artificial Intelligence
https://www.etran.rs/2024/en/home-english/
This presentation explores a brief idea about the structural and functional attributes of nucleotides, the structure and function of genetic materials along with the impact of UV rays and pH upon them.
Introduction:
RNA interference (RNAi) or Post-Transcriptional Gene Silencing (PTGS) is an important biological process for modulating eukaryotic gene expression.
It is highly conserved process of posttranscriptional gene silencing by which double stranded RNA (dsRNA) causes sequence-specific degradation of mRNA sequences.
dsRNA-induced gene silencing (RNAi) is reported in a wide range of eukaryotes ranging from worms, insects, mammals and plants.
This process mediates resistance to both endogenous parasitic and exogenous pathogenic nucleic acids, and regulates the expression of protein-coding genes.
What are small ncRNAs?
micro RNA (miRNA)
short interfering RNA (siRNA)
Properties of small non-coding RNA:
Involved in silencing mRNA transcripts.
Called “small” because they are usually only about 21-24 nucleotides long.
Synthesized by first cutting up longer precursor sequences (like the 61nt one that Lee discovered).
Silence an mRNA by base pairing with some sequence on the mRNA.
Discovery of siRNA?
The first small RNA:
In 1993 Rosalind Lee (Victor Ambros lab) was studying a non- coding gene in C. elegans, lin-4, that was involved in silencing of another gene, lin-14, at the appropriate time in the
development of the worm C. elegans.
Two small transcripts of lin-4 (22nt and 61nt) were found to be complementary to a sequence in the 3' UTR of lin-14.
Because lin-4 encoded no protein, she deduced that it must be these transcripts that are causing the silencing by RNA-RNA interactions.
Types of RNAi ( non coding RNA)
MiRNA
Length (23-25 nt)
Trans acting
Binds with target MRNA in mismatch
Translation inhibition
Si RNA
Length 21 nt.
Cis acting
Bind with target Mrna in perfect complementary sequence
Piwi-RNA
Length ; 25 to 36 nt.
Expressed in Germ Cells
Regulates trnasposomes activity
MECHANISM OF RNAI:
First the double-stranded RNA teams up with a protein complex named Dicer, which cuts the long RNA into short pieces.
Then another protein complex called RISC (RNA-induced silencing complex) discards one of the two RNA strands.
The RISC-docked, single-stranded RNA then pairs with the homologous mRNA and destroys it.
THE RISC COMPLEX:
RISC is large(>500kD) RNA multi- protein Binding complex which triggers MRNA degradation in response to MRNA
Unwinding of double stranded Si RNA by ATP independent Helicase
Active component of RISC is Ago proteins( ENDONUCLEASE) which cleave target MRNA.
DICER: endonuclease (RNase Family III)
Argonaute: Central Component of the RNA-Induced Silencing Complex (RISC)
One strand of the dsRNA produced by Dicer is retained in the RISC complex in association with Argonaute
ARGONAUTE PROTEIN :
1.PAZ(PIWI/Argonaute/ Zwille)- Recognition of target MRNA
2.PIWI (p-element induced wimpy Testis)- breaks Phosphodiester bond of mRNA.)RNAse H activity.
MiRNA:
The Double-stranded RNAs are naturally produced in eukaryotic cells during development, and they have a key role in regulating gene expression .
A brief information about the SCOP protein database used in bioinformatics.
The Structural Classification of Proteins (SCOP) database is a comprehensive and authoritative resource for the structural and evolutionary relationships of proteins. It provides a detailed and curated classification of protein structures, grouping them into families, superfamilies, and folds based on their structural and sequence similarities.
Richard's aventures in two entangled wonderlandsRichard Gill
Since the loophole-free Bell experiments of 2020 and the Nobel prizes in physics of 2022, critics of Bell's work have retreated to the fortress of super-determinism. Now, super-determinism is a derogatory word - it just means "determinism". Palmer, Hance and Hossenfelder argue that quantum mechanics and determinism are not incompatible, using a sophisticated mathematical construction based on a subtle thinning of allowed states and measurements in quantum mechanics, such that what is left appears to make Bell's argument fail, without altering the empirical predictions of quantum mechanics. I think however that it is a smoke screen, and the slogan "lost in math" comes to my mind. I will discuss some other recent disproofs of Bell's theorem using the language of causality based on causal graphs. Causal thinking is also central to law and justice. I will mention surprising connections to my work on serial killer nurse cases, in particular the Dutch case of Lucia de Berk and the current UK case of Lucy Letby.
Cancer cell metabolism: special Reference to Lactate PathwayAADYARAJPANDEY1
Normal Cell Metabolism:
Cellular respiration describes the series of steps that cells use to break down sugar and other chemicals to get the energy we need to function.
Energy is stored in the bonds of glucose and when glucose is broken down, much of that energy is released.
Cell utilize energy in the form of ATP.
The first step of respiration is called glycolysis. In a series of steps, glycolysis breaks glucose into two smaller molecules - a chemical called pyruvate. A small amount of ATP is formed during this process.
Most healthy cells continue the breakdown in a second process, called the Kreb's cycle. The Kreb's cycle allows cells to “burn” the pyruvates made in glycolysis to get more ATP.
The last step in the breakdown of glucose is called oxidative phosphorylation (Ox-Phos).
It takes place in specialized cell structures called mitochondria. This process produces a large amount of ATP. Importantly, cells need oxygen to complete oxidative phosphorylation.
If a cell completes only glycolysis, only 2 molecules of ATP are made per glucose. However, if the cell completes the entire respiration process (glycolysis - Kreb's - oxidative phosphorylation), about 36 molecules of ATP are created, giving it much more energy to use.
IN CANCER CELL:
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
Unlike healthy cells that "burn" the entire molecule of sugar to capture a large amount of energy as ATP, cancer cells are wasteful.
Cancer cells only partially break down sugar molecules. They overuse the first step of respiration, glycolysis. They frequently do not complete the second step, oxidative phosphorylation.
This results in only 2 molecules of ATP per each glucose molecule instead of the 36 or so ATPs healthy cells gain. As a result, cancer cells need to use a lot more sugar molecules to get enough energy to survive.
introduction to WARBERG PHENOMENA:
WARBURG EFFECT Usually, cancer cells are highly glycolytic (glucose addiction) and take up more glucose than do normal cells from outside.
Otto Heinrich Warburg (; 8 October 1883 – 1 August 1970) In 1931 was awarded the Nobel Prize in Physiology for his "discovery of the nature and mode of action of the respiratory enzyme.
WARNBURG EFFECT : cancer cells under aerobic (well-oxygenated) conditions to metabolize glucose to lactate (aerobic glycolysis) is known as the Warburg effect. Warburg made the observation that tumor slices consume glucose and secrete lactate at a higher rate than normal tissues.
This pdf is about the Schizophrenia.
For more details visit on YouTube; @SELF-EXPLANATORY;
https://www.youtube.com/channel/UCAiarMZDNhe1A3Rnpr_WkzA/videos
Thanks...!
2. Constraints predicating on the execution of activities over
time.
Notable examples: DCR Graphs [Slaats et al, BPM13] and
Declare [Pesic et al, EDOC17].
• Declarative speci
fi
cation and enactment of business
processes.
• Formalization of business rules and policies in monitoring
and conformance checking [___,BPM14].
Declare uses LTL over
fi
nite traces and its automata-theoretic
characterization to provide support in the whole lifecycle.
Temporal business constraints
2
3. A front-end for linear temporal logic over
fi
nite traces
The Declare framework
3
accept reject
1..* 1..*
Crisp semantics of constraints: an execution trace
conforms to the model if it satis
fi
es every constraint in
the model.
4. A front-end for linear temporal logic over
fi
nite traces
The Declare framework
4
accept reject
1..* 1..*
Crisp semantics of constraints: an execution trace
conforms to the model if it satis
fi
es every constraint in
the model.
Inconsistent model:
no conforming trace
5. • Best practices: constraints that must hold in the majority, but
not necessarily all, cases.
90% of the orders are shipped via truck.
• Outlier behaviors: constraints that only apply to very few, but
still conforming, cases.
Only 1% of the orders are canceled after being paid.
• Constraints involving external parties: contain uncontrollable
activities for which only partial guarantees can be given.
In 8 cases out of 10, the customer accepts the order and also
pays for it.
Some examples
Uncertainty is pervasive
5
10. Uncertainty as conformance ratio
10
multiset of traces
for n cases
k
conforming
traces
constraint “C”
holds with
probability k/n
k
n
11. Uncertainty as conformance ratio
11
multiset of traces
for n cases
k
conforming
traces
n-k
nonconforming
traces
constraint “C”
holds with
probability k/n
k
n
constraint “C”
is violated with
probability 1-k/n
12. Uncertainty as conformance ratio
12
multiset of traces
for n cases
k
conforming
traces
n-k
nonconforming
traces
constraint “C”
holds with
probability k/n
k
n
constraint “not C”
holds with
probability 1-k/n
13. Extending Declare with probabilities
ProbDeclare
13
accept reject
1..* {0.8} 1..* {0.1}
Constraints have an associated probability.
• Crisp constraints: those with probability 1 (must hold in every
trace).
• Truly probabilistic constraints: may hold or not.
14. The subtlety of probabilistic constraints
ProbDeclare
14
accept reject
15. The subtlety of probabilistic constraints
ProbDeclare
15
accept reject
in 100% traces:
accept and reject do not
coexist
16. The subtlety of probabilistic constraints
ProbDeclare
16
accept reject
1..* {0.8}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
17. The subtlety of probabilistic constraints
ProbDeclare
17
accept reject
1..* {0.8} 1..* {0.1}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
in 10% traces:
reject occurs
18. The subtlety of probabilistic constraints
ProbDeclare
18
accept reject
1..* {0.8} 1..* {0.1}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
in 10% traces:
reject occurs
Can they overlap?
No: it is not possible to satisfy
all constraints at once!
19. The subtlety of probabilistic constraints
ProbDeclare
19
accept reject
1..* {0.8} 1..* {0.1}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
in 10% traces:
reject occurs
Can they overlap?
No: it is not possible to satisfy
all constraints at once!
20. The subtlety of probabilistic constraints
ProbDeclare
20
accept reject
1..* {0.8} 1..* {0.1}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
in 10% traces:
reject occurs
21. The subtlety of probabilistic constraints
ProbDeclare
21
accept reject
1..* {0.8} 1..* {0.1}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
in 10% traces:
reject occurs
22. The subtlety of probabilistic constraints
ProbDeclare
22
accept reject
1..* {0.8} 1..* {0.1}
in 100% traces:
accept and reject do not
coexist
in 80% traces:
accept occurs
in 10% traces:
reject occurs
in 10% traces:
neither accept nor reject occur
⟹
23. The subtlety of probabilistic constraints
ProbDeclare
23
In how many traces is the order
accepted and then paid?
Not 70%… it is 50%!
accept
1..* {0.8}
0..1
pay
{0.7}
24. The subtlety of probabilistic constraints
ProbDeclare
24
accept
1..* {0.8}
0..1
pay
{0.7}
In how many traces is the order
accepted and then paid?
Not 70%… it is 50%!
25. Consider a ProbDeclare model with n constraints.
A constraint scenario picks which probabilistic constraints must hold,
and which are violated (i.e., their negated version must hold).
All in all: in principle, 2n scenarios, denoting di
ff
erent “process variants”.
Key point:
• Reasoning over a single scenario reduces back to standard LTLf
reasoning.
• Can be done with well-known automata-theoretic techniques.
A probabilistic version of “process variant”
Constraint scenario
25
26. Crisp constraints must hold in each scenario, so we only consider
choices for truly probabilistic constraints.
Constraint scenarios
Example
26
accept
1..* {0.8}
0..1
pay
{0.7}
27. Crisp constraints must hold in each scenario, so we only consider
choices for truly probabilistic constraints.
Constraint scenarios
Example
27
scenario
consistent? probability
0..1 acc precedence(acc,pay) 1..* acc response(acc,pay)
accept
1..* {0.8}
0..1
pay
{0.7}
28. Crisp constraints must hold in each scenario, so we only consider
choices for truly probabilistic constraints.
Constraint scenarios
Example
28
accept
1..* {0.8}
0..1
pay
{0.7}
scenario
consistent? probability
0..1 acc precedence(acc,pay) 1..* acc response(acc,pay)
1 1 0 0
1 1 0 1
1 1 1 0
1 1 1 1
29. Do possible scenarios exist? Which ones are consistent? What is
their probability?
This depends on the logical interplay of constraints, and the
overall interplay of their probabilities.
Intuition
Probability of constraint scenarios
29
30. Combined approach, leading to a system of linear inequalities:
1. The probabilities of all constraint scenarios add up to 1.
2. The probabilities of constraint scenarios that require
constraint C to hold must add up to the probability of C.
3. Constraint scenarios that are inconsistent have probability 0.
(No trace conforms to them)
No solution: overall ProbDeclare model inconsistent.
One solution: gives the actual probability values.
Many solutions: can be used to compute probability ranges.
Approach
Probability of constraint scenarios
30
31. A scenario is consistent if it has at least one conforming trace.
Consistency of constraint scenario
Example
31
scenario
consistent? probability
1..* acc response(acc,pay)
0 0 N
0 1 Y
1 0 Y
1 1 Y
accept
1..* {0.8}
0..1
pay
{0.7}
32. • It is not possible to avoid accept while falsifying the response constraint.
• Two scenarios make 1..* accept true: their combined probability is 0.8.
• Two scenarios make response(accept,pay) true: their combined probability is 0.7.
Computing the probability of constraint scenarios
Example
32
scenario
consistent? probability
1..* acc response(acc,pay)
0 0 N
0 1 Y
1 0 Y
1 1 Y
accept
1..* {0.8}
0..1
pay
{0.7}
33. Computing the probability of constraint scenarios
Example
33
scenario
consistent? probability
1..* acc response(acc,pay)
0 0 N
0 1 Y
1 0 Y
1 1 Y
accept
1..* {0.8}
0..1
pay
{0.7}
• It is not possible to avoid accept while falsifying the response constraint.
• Two scenarios make 1..* accept true: their combined probability is 0.8.
• Two scenarios make response(accept,pay) true: their combined probability is 0.7.
34. Computing the probability of constraint scenarios
Example
34
scenario
consistent? probability
1..* acc response(acc,pay)
0 0 N 0
0 1 Y 0.2
1 0 Y 0.3
1 1 Y 0.5
accept
1..* {0.8}
0..1
pay
{0.7}
• It is not possible to avoid accept while falsifying the response constraint.
• Two scenarios make 1..* accept true: their combined probability is 0.8.
• Two scenarios make response(accept,pay) true: their combined probability is 0.7.
35. Probabilistic constraint entailment: given a business constraint of
interest, is it implied by the model? With which probability?
• Check which scenarios imply the constraint.
• Sum their probabilities.
Probabilistic conformance checking: given an execution trace, does
it conform to the model? With which probability (outlier vs mainstream)?
• Check conformance for each scenario.
• No scenario found: not conforming.
• One scenario found: conforming, with the corresponding probability.
Given a ProbDeclare model...
Key reasoning tasks
35
36. <pay>:
<accept>:
<accept,pay>:
Are these traces conforming? Are they “mainstream” or “outlier”?
Probabilistic conformance checking
36
scenario
consistent? probability
1..* acc response(acc,pay)
0 0 N 0
0 1 Y 0.2
1 0 Y 0.3
1 1 Y 0.5
accept
1..* {0.8}
0..1
pay
{0.7}
37. <pay>: not conforming (violates precedence)
<accept>: conforming, 30% variant
<accept,pay>: conforming, 50% variant
Are these traces conforming? Are they “mainstream” or “outlier”?
Probabilistic conformance checking
37
scenario
consistent? probability
1..* acc response(acc,pay)
0 0 N 0
0 1 Y 0.2
1 0 Y 0.3
1 1 Y 0.5
accept
1..* {0.8}
0..1
pay
{0.7}
<acc>
-
X
V
X
0.3
<acc,pay>
-
X
X
V
0.5
38. A framework that incorporates uncertainty into
temporal business constraints.
Combination of logical and probabilistic reasoning to
understand the resulting semantics, and to solve key
tasks.
“The future is uncertain, but the end is always near” (Jim Morrison)
Conclusion
38
Full technical framework +
monitoring techniques:
see our BPM20 paper.
Logical underpinning
via probabilistic LTLf:
see our AAAI20 paper.