SlideShare a Scribd company logo
Role-activity Diagrams Modeling
Based on Workflow Mining
2009 World Congress on Computer Science and Information Engineering
Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China
Weihui Dai @ Management School, Fudan University, Shanghai, China
Presentation by Onur Yılmaz - onur@onuryilmaz.me
Outline
 Introduction
 Basic Concepts
 Role Mining
 Conclusions
Introduction
Role Activity Diagram (RAD)  a basic role-oriented process model
Process
Models
Activity-based
Process Models
Role-oriented
Process Models
Introduction
Describe business processes as
actors and their interactions from the
organization perspective
Role-oriented
Process Models
Introduction
 Adapted from cross-functional
process models
 Using sub-processes to describe
process roles’ responsibility
 So as to highlight the interaction
between roles
Role-activity
diagrams (RAD)
Introduction
 RAD requires a deep knowledge
of processes and organizational
model so as to identify roles.
Role-activity
diagrams (RAD)
Introduction
 Workflow management systems
produce lots of logs
 Process mining can reconstruct
process models from real
workflow logs
 Thus workflow mining may be a
more objective method for role
identification
Workflow Mining
Introduction
•This paper is based on hypotheses:
• Actors playing the same role have similar duties, abilities and
characteristics
• Activities performed by these actors stand for their work
• So roles can be identified by discovering actors with similar work from
workflow logs
Introduction
Existing Methods
 α algorithm can mine the WF-net
 the dependence between activities
 Organizational mining
 actors are the center of business processes and social networks can be drawn
out by analyzing business relations among actors
Introduction
Existing Methods
 Role engineering
 the role-mining tool ORCA aggregates permissions bottom-up
into a role hierarchy using clustering analysis interactively
with the aid of business experts
Introduction
What is presented?
 Workflow mining is used for role identification
taking the work similarity of actors as a criterion
 Role mining, the interaction between roles are
analyzed through social network diagrams among
actors, and finally role-activity diagrams is mined.
Basic Concepts
Set of all activities in workflow logs
A = {a1, a2,…, am}
m = |A| is the number of activities in workflow logs
Basic Concepts
Set of all process actors
P = {p1, p2,…, pn}
where n is the number of actors
Basic Concepts
 Set of all workflow instances in logs I
 and for any workflow instance i ∈ I, i= (a1 a2 … ak),
 AS(i) is the set of activities in the instance i
 sequence of activities a1 a2 … ak represents the actual
execution ordering.
Basic Concepts
Activity b depends on activity a, a>b
If
such that
According to definition, a>b means that activity b is executed after
activity a and there exists no other activities between.
Basic Concepts
Activity b depends on activity a directly (direct dependence)
if for each workflow instance i ∈ I, there only exists a>b but not b>a
Dependence between activity a and b is consistent in all workflow
instances. It hints that there exists state transition from activity a to
b.
Basic Concepts
Given I, we can find all the activity pairs, which accord with the direct
dependence.
The activity pairs is denoted as DEP
Basic Concepts
Clothing production system
a inquiry and quoting
b contract signing
c prototype designing
d fabric requiring
e fabric drawing
f fabric purchasing
g fabric processing
Basic Concepts
6 workflow instances
i1 = {abcg},
i2 = {abdecg},
i3 = {abcdeg},
i4= {abdeg},
i5 = {abdceg},
i6 = {abdfecg}
WF-net model using the α algorithm
Basic Concepts
DEP of the clothing production
workflow
{(a, b), (a, c), (a, d), (a, e), (a, f), (a, g),
(b, c), (b, d), (b, e), (b, f), (b, g), (c, g),
(d, e), (d, f), (d, g), (e, g),(f, e), (f, g)}
WF-net model using the α algorithm
Basic Concepts
Adjacent activity set adjAS
where S and Av are two activity sets
For any activity in adjAS(b), it belongs to Av but not S, and there
exists dependence between the activity and other activities in S
Basic Concepts
In this paper, roles are identified by the ratio of the times actors
executing each activity to the total times of these actors executing all
activities
total of pi executing
related activities
times(pi, aj) is the times of
pi executing aj
Tom 100 times in total, in which “Fabric requiring” is executed 30 times, thus
R(Tom, Fabric requiring) = 0.3
Basic Concepts
Vector of activity execution in the work of the actor pi
S(pi, Au)=(R(pi, a1), R(pi, a2),…,R(pi, ak))
k-dimension vector of activities the actor pi takes charge of
For example,
R(Tom, fabric requiring)=0.3
R(Tom, fabric checkout) = 0.4
R(Tom, production inspection) = 0.05,
vector of Tom (0.3, 0.4, 0.05)
Basic Concepts
Difference degree of activity set Au
average difference of activity execution by the actors.
Larger difference degree means more difference between actors in
their work.
In this paper, the difference degree is used to identify process roles.
Times of activities from workflow logs
Basic Concepts
Example
Percentages of activities
Basic Concepts
Example
Percentages of activities
S(p101, {a}) = (0.625),
S(p107, {a}) = (0.533)
AG({a}) = (0.625 + 0.533)/2 = 0.579
Basic Concepts
Example
Percentages of activities
Difference degree of {a, b}
S(p101, {a, b}) = (0.625, 0.375),
S(p107, {a,b}) = (0.533, 0.466),
S(p115, {a, b}) = (0, 0.277)
AG({a, b})
= ( (0.625 + 0.533) /3, (0.375 + 0.466 + 0.277)/3 )
= (0.386, 0.373)
D({a, b}) = 0.27
Basic Concepts
Example
Role Mining
 It is assumed that
 Actors who play the same role are responsible for the sub-
process (activity set) whose
difference degree is less than the predefined threshold T
Role Mining
Mining the activity set executed by each role
 Discover sub-processes in which
activities are executed by actors
playing the same roles
Input:
 the activity set A,
 dependence set DEP
 threshold T
Output:
 sub-processes
corresponding to
each role
If 1 is left
Select the smallest
difference degree
Adjacent activity
set from dependent
ones
Add if not
exceeding the
threshold
{a} has the least
dependence degree
D({a}) = 0.046
adjAS(a) = {b}
activity b is added
and D({a, b}) = 0.27
Example
Threshold T= 0.33
the adjacent activity
set of {a, b}  {c, d}
D({a, b, c}) = 0.345
D({a, b, d}) = 0.379
Both larger than T.
Roles: {a, b}
{d} has the least
dependence degree
D({d}) = 0.051
adjAS(d) = {c, e, f}.
activity c is added
and D({d, c})=0.164
e is added and
D({d, c, e})=0.219
d→f and f→e,
f is added to the
activity set for
principle of order
preserving.
Roles: {a, b}, {d, c, e, f}
Example
Threshold T= 0.33
{g} is the only remainder
Roles: {a, b}, {d, c, e, f}, {g}
Example
Threshold T= 0.33
Role Mining
Mining the activity set executed by each role
{a,b}
{a,b}
{a,b}
{d,c,e,f}
{d,c,e,f}
{d,c,e,f}
{d,c,e,f}
{g}
{g}
{g}
RAD Modeling
 Activity set taken by each role makes up sub-processes in
RAD modeling and the sub-processes
 Can be identified by presented algorithm
 In this paper, the interaction between roles based on social
network analysis is modeled.
RAD Modeling
 Activity dependence between process actors pi, pj is denoted as
 rel(pi, pj) = {(a, b)|i ∈ I, i = (a1a2…a b…ak), pi, pj ∈ P,
 a is executed by pi,
 b is executed by pj , and a → b.
 Interaction between roles based on the activity dependence
between actors.
RAD Modeling
 If there exists direct dependence between activity a and b, and
in a workflow instance, activity a is executed by the actor pi and
activity b is executed by actor pj, then the activity pair (a, b)
shows that pj depends on pi.
Person pi Role Ri
Role Rj
Activity ap
Activity aq
Assigned
Assigned
Responsible
Responsible
Dependence
(From workflow log)
Person pj
RAD Modeling
 Example:
p105
Planning
Manager
Technician
b
c
Responsible
Responsible
b  c
p115
In RAD modeling
connection(planning manager, technician) = {b}
is found
RAD Modeling
 Example:
a
b
c
d
g
f
RAD Modeling
Threshold Values
 By comparison, it seems that we can get better role identification
results when T is set between 0.3 and 0.4
 It needs further probative work
Conclusion
 How to identify roles and their interactions is necessary
for RAD modeling but most of methods for addressing
the issue seem to be subjective
 In this paper, workflow mining is used to discover process
roles
Conclusion
Future Work
 Threshold T is not easy to choose
 More research should be done to mine workflow models
with the loop-structure
References
[1] Zhao Weidong , Huang Lihua(2004). Role-based multi-agent workflow systems. Chinese Journal of
Management Science, vol7, no2, pp 55-62(in Chinese)
[2] Mentzas G, Christos, Kavadias S(2001). Modeling business process with workflow systems: an evaluation of
alternative approaches. International Journal of Information Management,vol 21,no.2 ,pp123-135
[3] Phalp K T, Henderson P, Walters R J, et al(1998). RolEnact: role-based enactable models of business processes.
Information and Software Technology, vol40,no.3, pp123-133
[4] Ould M. Business Processes: Modeling and analysis for reengineering and improvement, New York:John Wiley
& Sons, 1995
[5] Wil M.P V, Weijters A J(2003). Process mining: a research agenda, Computers in Industry, vol.53, no.3, pp231-244
[6] Wil M.P V, Song M(1998). Discovering models of software processes from event-based data], ACM Transactions
on Software Engineering and Methodology, vol.7,no.3, pp215-249
[7] Wil M.P V, Song M(2004). Mining social networks: Uncovering interaction patterns in business processes, Business
Process Management,pp244-260
[8] Schlegelmich J, Steffens U(2005). Role mining with ORCA. Proceedings of the tenth ACM symposium on Access
control models and technologies. Stockholm, Sweden: SACMAT,pp168-176
[9] Liu D R, Shen M(2003). Workflow modeling for virtual processes: An order-preserving process-view approach.
Information Systems, vol.28,no.6,pp505-532
Role-activity Diagrams Modeling
Based on Workflow Mining
2009 World Congress on Computer Science and Information Engineering
Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China
Weihui Dai @ Management School, Fudan University, Shanghai, China
Presentation by Onur Yılmaz - onur@onuryilmaz.me

More Related Content

Similar to Role-Activity Diagrams Modeling Based on Workflow Mining

Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)
Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)
Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)
Raj vardhan
 
Module 2-2.ppt
Module 2-2.pptModule 2-2.ppt
Module 2-2.ppt
Shylaja40
 
DBMS CS3
DBMS CS3DBMS CS3
powerpoint
powerpointpowerpoint
powerpoint
butest
 
Relational Algebra.pptx for Module four
Relational Algebra.pptx for  Module fourRelational Algebra.pptx for  Module four
Relational Algebra.pptx for Module four
Monaliaghosh
 
Dbms ii mca-ch5-ch6-relational algebra-2013
Dbms ii mca-ch5-ch6-relational algebra-2013Dbms ii mca-ch5-ch6-relational algebra-2013
Dbms ii mca-ch5-ch6-relational algebra-2013
Prosanta Ghosh
 
Cari2020 Rodrigue Aimé Djeumen Djatcha
Cari2020 Rodrigue Aimé Djeumen DjatchaCari2020 Rodrigue Aimé Djeumen Djatcha
Cari2020 Rodrigue Aimé Djeumen Djatcha
Mokhtar SELLAMI
 
Operators in c programming
Operators in c programmingOperators in c programming
Operators in c programming
savitamhaske
 
Aad introduction
Aad introductionAad introduction
Aad introduction
Mr SMAK
 
Functions and pointers_unit_4
Functions and pointers_unit_4Functions and pointers_unit_4
Functions and pointers_unit_4
Saranya saran
 
3.ppt
3.ppt3.ppt
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
http://algorithmtraining.com/advanced-python-training-hyderabad/
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpall...
Algorithm Class at KPHB  (C, C++ Course Training Institute in KPHB, Kukatpall...Algorithm Class at KPHB  (C, C++ Course Training Institute in KPHB, Kukatpall...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpall...
http://algorithmtraining.com/advanced-python-training-hyderabad/
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
http://algorithmtraining.com/advanced-python-training-hyderabad/
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
http://algorithmtraining.com/advanced-python-training-hyderabad/
 
Relational algebra operations
Relational algebra operationsRelational algebra operations
Relational algebra operations
SanthiNivas
 
UNIT 2 Structured query language commands
UNIT 2 Structured query language commandsUNIT 2 Structured query language commands
UNIT 2 Structured query language commands
Bhakti Pawar
 
Intro to relational model
Intro to relational modelIntro to relational model
Intro to relational model
ATS SBGI MIRAJ
 
9 big o-notation
9 big o-notation9 big o-notation
9 big o-notation
irdginfo
 
Chapter6
Chapter6Chapter6
Chapter6
gourab87
 

Similar to Role-Activity Diagrams Modeling Based on Workflow Mining (20)

Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)
Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)
Relational Algebra Ch6 (Navathe 4th edition)/ Ch7 (Navathe 3rd edition)
 
Module 2-2.ppt
Module 2-2.pptModule 2-2.ppt
Module 2-2.ppt
 
DBMS CS3
DBMS CS3DBMS CS3
DBMS CS3
 
powerpoint
powerpointpowerpoint
powerpoint
 
Relational Algebra.pptx for Module four
Relational Algebra.pptx for  Module fourRelational Algebra.pptx for  Module four
Relational Algebra.pptx for Module four
 
Dbms ii mca-ch5-ch6-relational algebra-2013
Dbms ii mca-ch5-ch6-relational algebra-2013Dbms ii mca-ch5-ch6-relational algebra-2013
Dbms ii mca-ch5-ch6-relational algebra-2013
 
Cari2020 Rodrigue Aimé Djeumen Djatcha
Cari2020 Rodrigue Aimé Djeumen DjatchaCari2020 Rodrigue Aimé Djeumen Djatcha
Cari2020 Rodrigue Aimé Djeumen Djatcha
 
Operators in c programming
Operators in c programmingOperators in c programming
Operators in c programming
 
Aad introduction
Aad introductionAad introduction
Aad introduction
 
Functions and pointers_unit_4
Functions and pointers_unit_4Functions and pointers_unit_4
Functions and pointers_unit_4
 
3.ppt
3.ppt3.ppt
3.ppt
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpall...
Algorithm Class at KPHB  (C, C++ Course Training Institute in KPHB, Kukatpall...Algorithm Class at KPHB  (C, C++ Course Training Institute in KPHB, Kukatpall...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpall...
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
 
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
Algorithm Class at KPHB (C, C++ Course Training Institute in KPHB, Kukatpally...
 
Relational algebra operations
Relational algebra operationsRelational algebra operations
Relational algebra operations
 
UNIT 2 Structured query language commands
UNIT 2 Structured query language commandsUNIT 2 Structured query language commands
UNIT 2 Structured query language commands
 
Intro to relational model
Intro to relational modelIntro to relational model
Intro to relational model
 
9 big o-notation
9 big o-notation9 big o-notation
9 big o-notation
 
Chapter6
Chapter6Chapter6
Chapter6
 

Recently uploaded

"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
LizaNolte
 

Recently uploaded (20)

"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham HillinQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
inQuba Webinar Mastering Customer Journey Management with Dr Graham Hill
 

Role-Activity Diagrams Modeling Based on Workflow Mining

  • 1. Role-activity Diagrams Modeling Based on Workflow Mining 2009 World Congress on Computer Science and Information Engineering Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China Weihui Dai @ Management School, Fudan University, Shanghai, China Presentation by Onur Yılmaz - onur@onuryilmaz.me
  • 2. Outline  Introduction  Basic Concepts  Role Mining  Conclusions
  • 3. Introduction Role Activity Diagram (RAD)  a basic role-oriented process model Process Models Activity-based Process Models Role-oriented Process Models
  • 4. Introduction Describe business processes as actors and their interactions from the organization perspective Role-oriented Process Models
  • 5. Introduction  Adapted from cross-functional process models  Using sub-processes to describe process roles’ responsibility  So as to highlight the interaction between roles Role-activity diagrams (RAD)
  • 6. Introduction  RAD requires a deep knowledge of processes and organizational model so as to identify roles. Role-activity diagrams (RAD)
  • 7. Introduction  Workflow management systems produce lots of logs  Process mining can reconstruct process models from real workflow logs  Thus workflow mining may be a more objective method for role identification Workflow Mining
  • 8. Introduction •This paper is based on hypotheses: • Actors playing the same role have similar duties, abilities and characteristics • Activities performed by these actors stand for their work • So roles can be identified by discovering actors with similar work from workflow logs
  • 9. Introduction Existing Methods  α algorithm can mine the WF-net  the dependence between activities  Organizational mining  actors are the center of business processes and social networks can be drawn out by analyzing business relations among actors
  • 10. Introduction Existing Methods  Role engineering  the role-mining tool ORCA aggregates permissions bottom-up into a role hierarchy using clustering analysis interactively with the aid of business experts
  • 11. Introduction What is presented?  Workflow mining is used for role identification taking the work similarity of actors as a criterion  Role mining, the interaction between roles are analyzed through social network diagrams among actors, and finally role-activity diagrams is mined.
  • 12. Basic Concepts Set of all activities in workflow logs A = {a1, a2,…, am} m = |A| is the number of activities in workflow logs
  • 13. Basic Concepts Set of all process actors P = {p1, p2,…, pn} where n is the number of actors
  • 14. Basic Concepts  Set of all workflow instances in logs I  and for any workflow instance i ∈ I, i= (a1 a2 … ak),  AS(i) is the set of activities in the instance i  sequence of activities a1 a2 … ak represents the actual execution ordering.
  • 15. Basic Concepts Activity b depends on activity a, a>b If such that According to definition, a>b means that activity b is executed after activity a and there exists no other activities between.
  • 16. Basic Concepts Activity b depends on activity a directly (direct dependence) if for each workflow instance i ∈ I, there only exists a>b but not b>a Dependence between activity a and b is consistent in all workflow instances. It hints that there exists state transition from activity a to b.
  • 17. Basic Concepts Given I, we can find all the activity pairs, which accord with the direct dependence. The activity pairs is denoted as DEP
  • 18. Basic Concepts Clothing production system a inquiry and quoting b contract signing c prototype designing d fabric requiring e fabric drawing f fabric purchasing g fabric processing
  • 19. Basic Concepts 6 workflow instances i1 = {abcg}, i2 = {abdecg}, i3 = {abcdeg}, i4= {abdeg}, i5 = {abdceg}, i6 = {abdfecg} WF-net model using the α algorithm
  • 20. Basic Concepts DEP of the clothing production workflow {(a, b), (a, c), (a, d), (a, e), (a, f), (a, g), (b, c), (b, d), (b, e), (b, f), (b, g), (c, g), (d, e), (d, f), (d, g), (e, g),(f, e), (f, g)} WF-net model using the α algorithm
  • 21. Basic Concepts Adjacent activity set adjAS where S and Av are two activity sets For any activity in adjAS(b), it belongs to Av but not S, and there exists dependence between the activity and other activities in S
  • 22. Basic Concepts In this paper, roles are identified by the ratio of the times actors executing each activity to the total times of these actors executing all activities total of pi executing related activities times(pi, aj) is the times of pi executing aj Tom 100 times in total, in which “Fabric requiring” is executed 30 times, thus R(Tom, Fabric requiring) = 0.3
  • 23. Basic Concepts Vector of activity execution in the work of the actor pi S(pi, Au)=(R(pi, a1), R(pi, a2),…,R(pi, ak)) k-dimension vector of activities the actor pi takes charge of For example, R(Tom, fabric requiring)=0.3 R(Tom, fabric checkout) = 0.4 R(Tom, production inspection) = 0.05, vector of Tom (0.3, 0.4, 0.05)
  • 24. Basic Concepts Difference degree of activity set Au average difference of activity execution by the actors. Larger difference degree means more difference between actors in their work. In this paper, the difference degree is used to identify process roles.
  • 25. Times of activities from workflow logs Basic Concepts Example
  • 27. Percentages of activities S(p101, {a}) = (0.625), S(p107, {a}) = (0.533) AG({a}) = (0.625 + 0.533)/2 = 0.579 Basic Concepts Example
  • 28. Percentages of activities Difference degree of {a, b} S(p101, {a, b}) = (0.625, 0.375), S(p107, {a,b}) = (0.533, 0.466), S(p115, {a, b}) = (0, 0.277) AG({a, b}) = ( (0.625 + 0.533) /3, (0.375 + 0.466 + 0.277)/3 ) = (0.386, 0.373) D({a, b}) = 0.27 Basic Concepts Example
  • 29. Role Mining  It is assumed that  Actors who play the same role are responsible for the sub- process (activity set) whose difference degree is less than the predefined threshold T
  • 30. Role Mining Mining the activity set executed by each role  Discover sub-processes in which activities are executed by actors playing the same roles
  • 31. Input:  the activity set A,  dependence set DEP  threshold T Output:  sub-processes corresponding to each role
  • 32. If 1 is left Select the smallest difference degree Adjacent activity set from dependent ones Add if not exceeding the threshold
  • 33. {a} has the least dependence degree D({a}) = 0.046 adjAS(a) = {b} activity b is added and D({a, b}) = 0.27 Example Threshold T= 0.33 the adjacent activity set of {a, b}  {c, d} D({a, b, c}) = 0.345 D({a, b, d}) = 0.379 Both larger than T. Roles: {a, b}
  • 34. {d} has the least dependence degree D({d}) = 0.051 adjAS(d) = {c, e, f}. activity c is added and D({d, c})=0.164 e is added and D({d, c, e})=0.219 d→f and f→e, f is added to the activity set for principle of order preserving. Roles: {a, b}, {d, c, e, f} Example Threshold T= 0.33
  • 35. {g} is the only remainder Roles: {a, b}, {d, c, e, f}, {g} Example Threshold T= 0.33
  • 36. Role Mining Mining the activity set executed by each role {a,b} {a,b} {a,b} {d,c,e,f} {d,c,e,f} {d,c,e,f} {d,c,e,f} {g} {g} {g}
  • 37. RAD Modeling  Activity set taken by each role makes up sub-processes in RAD modeling and the sub-processes  Can be identified by presented algorithm  In this paper, the interaction between roles based on social network analysis is modeled.
  • 38. RAD Modeling  Activity dependence between process actors pi, pj is denoted as  rel(pi, pj) = {(a, b)|i ∈ I, i = (a1a2…a b…ak), pi, pj ∈ P,  a is executed by pi,  b is executed by pj , and a → b.  Interaction between roles based on the activity dependence between actors.
  • 39. RAD Modeling  If there exists direct dependence between activity a and b, and in a workflow instance, activity a is executed by the actor pi and activity b is executed by actor pj, then the activity pair (a, b) shows that pj depends on pi. Person pi Role Ri Role Rj Activity ap Activity aq Assigned Assigned Responsible Responsible Dependence (From workflow log) Person pj
  • 40. RAD Modeling  Example: p105 Planning Manager Technician b c Responsible Responsible b  c p115 In RAD modeling connection(planning manager, technician) = {b} is found
  • 42. RAD Modeling Threshold Values  By comparison, it seems that we can get better role identification results when T is set between 0.3 and 0.4  It needs further probative work
  • 43. Conclusion  How to identify roles and their interactions is necessary for RAD modeling but most of methods for addressing the issue seem to be subjective  In this paper, workflow mining is used to discover process roles
  • 44. Conclusion Future Work  Threshold T is not easy to choose  More research should be done to mine workflow models with the loop-structure
  • 45. References [1] Zhao Weidong , Huang Lihua(2004). Role-based multi-agent workflow systems. Chinese Journal of Management Science, vol7, no2, pp 55-62(in Chinese) [2] Mentzas G, Christos, Kavadias S(2001). Modeling business process with workflow systems: an evaluation of alternative approaches. International Journal of Information Management,vol 21,no.2 ,pp123-135 [3] Phalp K T, Henderson P, Walters R J, et al(1998). RolEnact: role-based enactable models of business processes. Information and Software Technology, vol40,no.3, pp123-133 [4] Ould M. Business Processes: Modeling and analysis for reengineering and improvement, New York:John Wiley & Sons, 1995 [5] Wil M.P V, Weijters A J(2003). Process mining: a research agenda, Computers in Industry, vol.53, no.3, pp231-244 [6] Wil M.P V, Song M(1998). Discovering models of software processes from event-based data], ACM Transactions on Software Engineering and Methodology, vol.7,no.3, pp215-249 [7] Wil M.P V, Song M(2004). Mining social networks: Uncovering interaction patterns in business processes, Business Process Management,pp244-260 [8] Schlegelmich J, Steffens U(2005). Role mining with ORCA. Proceedings of the tenth ACM symposium on Access control models and technologies. Stockholm, Sweden: SACMAT,pp168-176 [9] Liu D R, Shen M(2003). Workflow modeling for virtual processes: An order-preserving process-view approach. Information Systems, vol.28,no.6,pp505-532
  • 46. Role-activity Diagrams Modeling Based on Workflow Mining 2009 World Congress on Computer Science and Information Engineering Weidong Zhao, Anhua Wang, Xiaochun Fang @ Software School, Fudan University, Shanghai, China Weihui Dai @ Management School, Fudan University, Shanghai, China Presentation by Onur Yılmaz - onur@onuryilmaz.me