As companies enter into the digital world, information technology is playing a major role in bringing
process improvements to the forefront of business management. In the recent decades, many organizations
have struggled to redesign and improve their business processes to reduce their total cost. The main
contribution of this research study is to propose an intelligent framework that possesses the ability to
employ a database of best practices, business standards, and business activity history in order to permit the
manager to analyze and improve the design of the business processes.
In addition, the other objective of this research is to build a business process or workflow directly from its
process design logic in order to enable rapid process development and deployment. This procedure
requires some technical improvements of the business design, as it is mainly based on building the business
process using Microsoft Office Visio, which communicates the defined business process to the business
process management engine.
The Three Essential Process Layers - New York Business Process Professionals ...Samuel Chin, PMP, CSM
You already know the basic structure of process work. But do you fully understand the three layers you'll uncover in every process project, and how they're all related?
This deck is about the three essential layers of process work: technological, business process, and value chain. We will define these three levels and discuss the relationship between them, diving deeper than ever to equip you with the tools you need to deliver great results every time.
IT solutions that supports the whole Strategic planning workflow, from defining Mission, Vision, SWOT analyses, Strategic objectives, action plans, KPI's, strategic monitoring through Strategic maps, Dashboards, with great Analyses possibilities through OLAP and excel, can be used for Balanced scorecard, TQM, 20 keys and other performance methodologies. More on www.tomasdse.com.Please EMAIL me on igor.matjasic@tomasdse.com , if you would like some more information about this solution.
Towards a Software Framework for Automatic Business Process RedesignIDES Editor
A key element to the success of any organization is
the ability to continuously improve its business process
performance. Efficient Business Process Redesign (BPR)
methodologies are needed to allow organizations to face the
changing business conditions. For a long time, practices for
BPR were done case-by-case and were based on the insights
and knowledge of an expert to the organization. It can be
argued that efficiency, however, can further be achieved with
the support of automatic process redesign tools which are few
at the moment. Process mining as a recent approach allows
for the extraction of information from event logs recorded in
different information systems. In this paper we argue that
results driven by process mining techniques can be used to
capture the various types of inefficiencies in the organization
and hence propose efficient redesigns of its business model.
We first give an outline on the current directions towards
automatic BPR followed by a review on the different process
mining techniques and its usage in different applications.
Then, a specific framework of a Software tool that uses process
mining to support automatic BPR is presented.
Towards a Software Framework for Automatic Business Process RedesignIDES Editor
A key element to the success of any organization is
the ability to continuously improve its business process
performance. Efficient Business Process Redesign (BPR)
methodologies are needed to allow organizations to face the
changing business conditions. For a long time, practices for
BPR were done case-by-case and were based on the insights
and knowledge of an expert to the organization. It can be
argued that efficiency, however, can further be achieved with
the support of automatic process redesign tools which are few
at the moment. Process mining as a recent approach allows
for the extraction of information from event logs recorded in
different information systems. In this paper we argue that
results driven by process mining techniques can be used to
capture the various types of inefficiencies in the organization
and hence propose efficient redesigns of its business model.
We first give an outline on the current directions towards
automatic BPR followed by a review on the different process
mining techniques and its usage in different applications.
Then, a specific framework of a Software tool that uses process
mining to support automatic BPR is presented.
This PPT deck displays thirtyseven slides with in depth research. Our Bpm Powerpoint Presentation Slides presentation deck is a helpful tool to plan, prepare, document and analyse the topic with a clear approach. We provide a ready to use deck with all sorts of relevant topics subtopics templates, charts and graphs, overviews, analysis templates. Outline all the important aspects without any hassle. It showcases of all kinds of editable templates infographics for an inclusive and comprehensive Bpm PowerPoint Presentation Slides presentation. Professionals, managers, individual and team involved in any company organization from any field can use them as per requirement.
The Three Essential Process Layers - New York Business Process Professionals ...Samuel Chin, PMP, CSM
You already know the basic structure of process work. But do you fully understand the three layers you'll uncover in every process project, and how they're all related?
This deck is about the three essential layers of process work: technological, business process, and value chain. We will define these three levels and discuss the relationship between them, diving deeper than ever to equip you with the tools you need to deliver great results every time.
IT solutions that supports the whole Strategic planning workflow, from defining Mission, Vision, SWOT analyses, Strategic objectives, action plans, KPI's, strategic monitoring through Strategic maps, Dashboards, with great Analyses possibilities through OLAP and excel, can be used for Balanced scorecard, TQM, 20 keys and other performance methodologies. More on www.tomasdse.com.Please EMAIL me on igor.matjasic@tomasdse.com , if you would like some more information about this solution.
Towards a Software Framework for Automatic Business Process RedesignIDES Editor
A key element to the success of any organization is
the ability to continuously improve its business process
performance. Efficient Business Process Redesign (BPR)
methodologies are needed to allow organizations to face the
changing business conditions. For a long time, practices for
BPR were done case-by-case and were based on the insights
and knowledge of an expert to the organization. It can be
argued that efficiency, however, can further be achieved with
the support of automatic process redesign tools which are few
at the moment. Process mining as a recent approach allows
for the extraction of information from event logs recorded in
different information systems. In this paper we argue that
results driven by process mining techniques can be used to
capture the various types of inefficiencies in the organization
and hence propose efficient redesigns of its business model.
We first give an outline on the current directions towards
automatic BPR followed by a review on the different process
mining techniques and its usage in different applications.
Then, a specific framework of a Software tool that uses process
mining to support automatic BPR is presented.
Towards a Software Framework for Automatic Business Process RedesignIDES Editor
A key element to the success of any organization is
the ability to continuously improve its business process
performance. Efficient Business Process Redesign (BPR)
methodologies are needed to allow organizations to face the
changing business conditions. For a long time, practices for
BPR were done case-by-case and were based on the insights
and knowledge of an expert to the organization. It can be
argued that efficiency, however, can further be achieved with
the support of automatic process redesign tools which are few
at the moment. Process mining as a recent approach allows
for the extraction of information from event logs recorded in
different information systems. In this paper we argue that
results driven by process mining techniques can be used to
capture the various types of inefficiencies in the organization
and hence propose efficient redesigns of its business model.
We first give an outline on the current directions towards
automatic BPR followed by a review on the different process
mining techniques and its usage in different applications.
Then, a specific framework of a Software tool that uses process
mining to support automatic BPR is presented.
This PPT deck displays thirtyseven slides with in depth research. Our Bpm Powerpoint Presentation Slides presentation deck is a helpful tool to plan, prepare, document and analyse the topic with a clear approach. We provide a ready to use deck with all sorts of relevant topics subtopics templates, charts and graphs, overviews, analysis templates. Outline all the important aspects without any hassle. It showcases of all kinds of editable templates infographics for an inclusive and comprehensive Bpm PowerPoint Presentation Slides presentation. Professionals, managers, individual and team involved in any company organization from any field can use them as per requirement.
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...ijait
In the competitive environment, companies have given increasing importance to the IT sector and the
resources it delivers as strategic. As a result, IT becomes a living being within the company. This sector is
being subject to continuous changes in this scenario. These changes can occur within the own IT sector or
whether IT to other sectors of the company. For both scenarios, it is important to have a good change
control to avoid unnecessary trouble and expense. This paper aims to show through a case study, the
benefits and results obtained with the implementation of a process of managing and controlling changes in
the information technology environment of a large government company in Brazil.
Business process monitoring system in supporting information technology gover...journalBEEI
Information technology (IT) is essential in supporting an organization's business sustainability and growth, making it critically dependent on IT. Therefore, a focus on IT governance, consisting of leadership, organizational structure, and process ensuring that IT organization supports and expands the organizational strategies and goals is required. When the business supports the strategic significance of IT investment, the implementation of an IT strategy will lead to the adoption of an IT governance model. It will support and help the description of the benefit roles and responsibilities from IT systems and infrastructure. This paper aims to develop a business process monitoring system to support IT governance in improving user service and measuring organizational performance. The research method was the system development method with the Waterfall model. To measure the performance of the business process, the self-assessment method with performance matrix tools was applied. The study resulted in a business process monitoring system that can enhance the organization’s primary business process in services, supporting the said organization’s performance.
Analysis of Enterprise Resource Planning Systems (ERPs) with Technical aspectszillesubhan
In the past few years, the information
technology has emerged as a key driving force for
growth of business organizations. The trend of
implementing the latest tools and technologies has
reached to maximum extent. The majority of business
organizations has adopted new and innovative tools
to manage their business tasks effectively. In this
scenario, an enterprise resource planning (ERP)
system is a huge information system that
organizations implement to manage their business
tasks. This is a huge information system which links
almost all the business departments and functional
areas. This report presents a detailed analysis of an
enterprise resource planning system. The
implementation of an enterprise resource planning
system requires taking into consideration various
critical factors, which are essential to be considered
in order to make this implementation fruitful. This
report presents a detailed discussion on the
advantages provided by ERPs to business
organizations. The basic purpose of this report is to
analyze critical success factors involved in the
implementation of ERPs. This report also presents
recommendations with every factor that an
organization can follow to make best use of these
systems.
Process driven software development methodology for enterprise information sy...csandit
In today’s process-centered business organization, it is imperative that enterprise information
system must be converted from task-centered to process-centered system. Traditional software
development methodology is function-oriented, in which each function manages its own data
and it results in redundancy because data that belongs to one object are stored by several
functions. Proposed in this paper is a process-driven software development methodology, in
which business process is a major concern and workflow functionalities are identified and
specified throughout the entire development life cycle. In the proposed methodology, the
development process, modeling tools and deliverables are clarified explicitly. Proposed
methodology can be a guideline to practitioners involved in enterprise software development, of
which workflow is an essential part.
Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, executing improvements, monitoring the improved process and continually optimizing it.
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES ijwscjournal
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use
cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing
rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development.
Digital Transformation And Solution ArchitectureAlan McSweeney
Digital strategy is a statement about the organisation’s digital positioning, competitors and customer and collaborator needs and behaviour to achieve a direction for innovation, communication, transaction and promotion. Digital strategy needs to be defined in the same framework structure as the proposed digital architecture platform.
Achieving the target digital organisation means deploying solutions that enable the digital architecture. Solution architecture needs to design solutions that fit into the target digital architecture framework. This requires:
• Solution architecture team operating in an integrated manner designing solutions to a set of common standards and that run on the platform
• Solution architecture team leadership ensuring solutions conform to the common standards
• Solution architecture technical leadership to develop and maintain common solution design standards
• Solution architecture updates the digital reference architecture based on solution design experience
Digital solution design requires greater discipline to create an integrated set solutions that operate within the rigour of the digital architecture framework. The solution architecture function must interact with other IT architecture disciplines to ensure the set of solutions that implement the digital framework operate together. This requires greater solution architecture team leadership. This needs to be supplemented and supported by a well-defined set of digital solution design standards.
This follows-on from the previous presentation: Digital Transformation And Enterprise Architecture
https://www.slideshare.net/alanmcsweeney/digital-transformation-and-enterprise-architecture.
Business Process Modelling PowerPoint Presentation SlidesSlideTeam
This PPT deck displays thirty four slides with in depth research. Our Business Process Modelling Powerpoint Presentation Slides presentation deck is a helpful tool to plan, prepare, document and analyse the topic with a clear approach. We provide a ready to use deck with all sorts of relevant topics subtopics templates, charts and graphs, overviews, analysis templates. Outline all the important aspects without any hassle. It showcases of all kind of editable templates infographics for an inclusive and comprehensive Business Process Modelling Powerpoint Presentation Slides presentation. Professionals, managers, individual and team involved in any company organization from any field can use them as per requirement.
E-commerce is an important business transaction system in the network age. However, the network
intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the
operation of the e-commerce, making e-commerce security encounter serious test. In order to avoid system
security flaw and defect caused user great loss, how to reduce e-commerce security risk has become a topic
worthy of further exploration. In this paper, the critical security requirement for the e-commerce system is
investigated and deduced the compliance, availability and manageability quality characteristics for ecommerce
software security requirement. Applying the quantified quality characteristics and proposes a
Security Requirement Quality Measurement (SRQM) model. Based on SRQM model, the paper develops a
Security Requirement Quality Improvement (SRQI) procedure to identify problem and defect of security
requirement quality. And assist in timely to adjust and revise the defects of security requirement quality,
enhance the e-commerce security effectively.
Automatically inferring structure correlated variable set for concurrent atom...ijseajournal
The at
omicity of correlated variables is
quite tedious and error prone for programmers to explicitly infer
and specify in
the multi
-
threaded program
. Researchers have studied the automatic discovery of atomic set
programmers intended, such as by frequent itemset
mining and rules
-
based filter. However, due to the
lack
of inspection of inner structure
,
some
implicit sematics
independent
variables intended by user are
mistakenly
classified to be correlated
. In this paper, we present a
novel
simplification method for
program
dependency graph
and the corresponding graph
mining approach to detect the set of variables correlated
by logical structures in the source code. This approach formulates the automatic inference of the correlated
variables as mining frequent subgra
ph of
the simplified
data and control flow dependency graph. The
presented simplified
graph representation of program dependency is not only robust for coding style’s
varieties, but also essential to recognize the logical correlation. We implemented our me
thod and
compared it with previous methods on the open source programs’ repositories. The experiment results
show that our method has less false positive rate than previous methods in the development initial stage. It
is concluded that our presented method
can provide programmers in the development with the sufficient
precise correlated variable set for checking atomicity
CHANGE MANAGEMENT: IMPLEMENTATION AND BENEFITS OF THE CHANGE CONTROL IN THE I...ijait
In the competitive environment, companies have given increasing importance to the IT sector and the
resources it delivers as strategic. As a result, IT becomes a living being within the company. This sector is
being subject to continuous changes in this scenario. These changes can occur within the own IT sector or
whether IT to other sectors of the company. For both scenarios, it is important to have a good change
control to avoid unnecessary trouble and expense. This paper aims to show through a case study, the
benefits and results obtained with the implementation of a process of managing and controlling changes in
the information technology environment of a large government company in Brazil.
Business process monitoring system in supporting information technology gover...journalBEEI
Information technology (IT) is essential in supporting an organization's business sustainability and growth, making it critically dependent on IT. Therefore, a focus on IT governance, consisting of leadership, organizational structure, and process ensuring that IT organization supports and expands the organizational strategies and goals is required. When the business supports the strategic significance of IT investment, the implementation of an IT strategy will lead to the adoption of an IT governance model. It will support and help the description of the benefit roles and responsibilities from IT systems and infrastructure. This paper aims to develop a business process monitoring system to support IT governance in improving user service and measuring organizational performance. The research method was the system development method with the Waterfall model. To measure the performance of the business process, the self-assessment method with performance matrix tools was applied. The study resulted in a business process monitoring system that can enhance the organization’s primary business process in services, supporting the said organization’s performance.
Analysis of Enterprise Resource Planning Systems (ERPs) with Technical aspectszillesubhan
In the past few years, the information
technology has emerged as a key driving force for
growth of business organizations. The trend of
implementing the latest tools and technologies has
reached to maximum extent. The majority of business
organizations has adopted new and innovative tools
to manage their business tasks effectively. In this
scenario, an enterprise resource planning (ERP)
system is a huge information system that
organizations implement to manage their business
tasks. This is a huge information system which links
almost all the business departments and functional
areas. This report presents a detailed analysis of an
enterprise resource planning system. The
implementation of an enterprise resource planning
system requires taking into consideration various
critical factors, which are essential to be considered
in order to make this implementation fruitful. This
report presents a detailed discussion on the
advantages provided by ERPs to business
organizations. The basic purpose of this report is to
analyze critical success factors involved in the
implementation of ERPs. This report also presents
recommendations with every factor that an
organization can follow to make best use of these
systems.
Process driven software development methodology for enterprise information sy...csandit
In today’s process-centered business organization, it is imperative that enterprise information
system must be converted from task-centered to process-centered system. Traditional software
development methodology is function-oriented, in which each function manages its own data
and it results in redundancy because data that belongs to one object are stored by several
functions. Proposed in this paper is a process-driven software development methodology, in
which business process is a major concern and workflow functionalities are identified and
specified throughout the entire development life cycle. In the proposed methodology, the
development process, modeling tools and deliverables are clarified explicitly. Proposed
methodology can be a guideline to practitioners involved in enterprise software development, of
which workflow is an essential part.
Business process management (BPM) is the discipline of improving a business process from end to end by analyzing it, modelling how it works in different scenarios, executing improvements, monitoring the improved process and continually optimizing it.
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES ijwscjournal
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use
cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing
rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development.
Digital Transformation And Solution ArchitectureAlan McSweeney
Digital strategy is a statement about the organisation’s digital positioning, competitors and customer and collaborator needs and behaviour to achieve a direction for innovation, communication, transaction and promotion. Digital strategy needs to be defined in the same framework structure as the proposed digital architecture platform.
Achieving the target digital organisation means deploying solutions that enable the digital architecture. Solution architecture needs to design solutions that fit into the target digital architecture framework. This requires:
• Solution architecture team operating in an integrated manner designing solutions to a set of common standards and that run on the platform
• Solution architecture team leadership ensuring solutions conform to the common standards
• Solution architecture technical leadership to develop and maintain common solution design standards
• Solution architecture updates the digital reference architecture based on solution design experience
Digital solution design requires greater discipline to create an integrated set solutions that operate within the rigour of the digital architecture framework. The solution architecture function must interact with other IT architecture disciplines to ensure the set of solutions that implement the digital framework operate together. This requires greater solution architecture team leadership. This needs to be supplemented and supported by a well-defined set of digital solution design standards.
This follows-on from the previous presentation: Digital Transformation And Enterprise Architecture
https://www.slideshare.net/alanmcsweeney/digital-transformation-and-enterprise-architecture.
Business Process Modelling PowerPoint Presentation SlidesSlideTeam
This PPT deck displays thirty four slides with in depth research. Our Business Process Modelling Powerpoint Presentation Slides presentation deck is a helpful tool to plan, prepare, document and analyse the topic with a clear approach. We provide a ready to use deck with all sorts of relevant topics subtopics templates, charts and graphs, overviews, analysis templates. Outline all the important aspects without any hassle. It showcases of all kind of editable templates infographics for an inclusive and comprehensive Business Process Modelling Powerpoint Presentation Slides presentation. Professionals, managers, individual and team involved in any company organization from any field can use them as per requirement.
E-commerce is an important business transaction system in the network age. However, the network
intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the
operation of the e-commerce, making e-commerce security encounter serious test. In order to avoid system
security flaw and defect caused user great loss, how to reduce e-commerce security risk has become a topic
worthy of further exploration. In this paper, the critical security requirement for the e-commerce system is
investigated and deduced the compliance, availability and manageability quality characteristics for ecommerce
software security requirement. Applying the quantified quality characteristics and proposes a
Security Requirement Quality Measurement (SRQM) model. Based on SRQM model, the paper develops a
Security Requirement Quality Improvement (SRQI) procedure to identify problem and defect of security
requirement quality. And assist in timely to adjust and revise the defects of security requirement quality,
enhance the e-commerce security effectively.
Automatically inferring structure correlated variable set for concurrent atom...ijseajournal
The at
omicity of correlated variables is
quite tedious and error prone for programmers to explicitly infer
and specify in
the multi
-
threaded program
. Researchers have studied the automatic discovery of atomic set
programmers intended, such as by frequent itemset
mining and rules
-
based filter. However, due to the
lack
of inspection of inner structure
,
some
implicit sematics
independent
variables intended by user are
mistakenly
classified to be correlated
. In this paper, we present a
novel
simplification method for
program
dependency graph
and the corresponding graph
mining approach to detect the set of variables correlated
by logical structures in the source code. This approach formulates the automatic inference of the correlated
variables as mining frequent subgra
ph of
the simplified
data and control flow dependency graph. The
presented simplified
graph representation of program dependency is not only robust for coding style’s
varieties, but also essential to recognize the logical correlation. We implemented our me
thod and
compared it with previous methods on the open source programs’ repositories. The experiment results
show that our method has less false positive rate than previous methods in the development initial stage. It
is concluded that our presented method
can provide programmers in the development with the sufficient
precise correlated variable set for checking atomicity
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTijseajournal
The present business network infrastructure is quickly varying with latest servers, services, connections,
and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and
wireless networks. With the increasing amount of vulnerabilities and exploits coupled with the recurrent
evolution of IT infrastructure, organizations at present require more numerous vulnerability assessments.
In this paper new approach the Unified process for Network vulnerability Assessments hereafter called as
a unified NVA is proposed for network vulnerability assessment derived from Unified Software
Development Process or Unified Process, it is a popular iterative and incremental software development
process framework.
STATISTICAL ANALYSIS FOR PERFORMANCE COMPARISONijseajournal
Performance responsiveness and scalability is a make-or-break quality for software. Nearly everyone runs into performance problems at one time or another. This paper discusses about performance issues faced during Pre Examination Process Automation System (PEPAS) implemented in java technology. The challenges faced during the life cycle of the project and the mitigation actions performed. It compares 3 java technologies and shows how improvements are made through statistical analysis in response time of the application. The paper concludes with result analysis.
Integrating profiling into mde compilersijseajournal
Scientific computation requires more and more performance in its algorithms. New massively parallel
architectures suit well to these algorithms. They are known for offering high performance and power
efficiency. Unfortunately, as parallel programming for these architectures requires a complex distribution
of tasks and data, developers find difficult to implement their applications effectively. Although approaches
based on source-to-source intends to provide a low learning curve for parallel programming and take
advantage of architecture features to create optimized applications, programming remains difficult for
neophytes. This work aims at improving performance by returning to the high-level models, specific
execution data from a profiling tool enhanced by smart advices computed by an analysis engine. In order to
keep the link between execution and model, the process is based on a traceability mechanism. Once the
model is automatically annotated, it can be re-factored aiming better performances on the re-generated
code. Hence, this work allows keeping coherence between model and code without forgetting to harness the
power of parallel architectures. To illustrate and clarify key points of this approach, we provide an
experimental example in GPUs context. The example uses a transformation chain from UML-MARTE
models to OpenCL code.
DETECTION AND REFACTORING OF BAD SMELL CAUSED BY LARGE SCALEijseajournal
Bad smells are signs of potential problems in code. Detecting bad smells, however, remains time
consuming for software engineers despite proposals on bad smell detection and refactoring tools. Large
Class is a kind of bad smells caused by large scale, and the detection is hard to achieve automatically. In
this paper, a Large Class bad smell detection approach based on class length distribution model and
cohesion metrics is proposed. In programs, the lengths of classes are confirmed according to the certain
distributions. The class length distribution model is generalized to detect programs after grouping.
Meanwhile, cohesion metrics are analyzed for bad smell detection. The bad smell detection experiments of
open source programs show that Large Class bad smell can be detected effectively and accurately with this
approach, and refactoring scheme can be proposed for design quality improvements of programs.
While many organizations have already implemented business intelligence (BI) solutions, these solutions do not provide insight into underlying business processes.
Process Intelligence solutions provide an integrated view of your company’s performance from process perspectives, and would alert you just in time, to correct deviations that might occur in your on-going processes.
Learn more about how it's implemented and the technologies that were used.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
This presentation provides a high-level overview of BPM and where it is today.
It also touches on some of the core technologies and standards.
Its focus is on the four specific “Challenges” facing BPM and they are aligned to the four phases of the typical application development life cycle.
1. Discovery
2. Design
3. Development
4. Deployment
PPT contain the study of the business process management of IT industry , It mainly deals with the customer and billing system . To avoid the time of serving the customer
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICESijwscjournal
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development.
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICESijwscjournal
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if
we decompose the business process structure in a set of rules, each of them representing a transition of
the business process. As a consequence the business process engine can be realized by reusing and
integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then
to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also
specifies the derivation of conditions that affect the execution flow
BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICESijwscjournal
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development.
AFFINITY CLUSTERS FOR BUSINESS PROCESS INTELLIGENCEijdms
Business process intelligence improves operational efficiency that is essential for achieving business objectives, besides facilitating competitive advantage. As an organization is a collection of business processes, enhancing business process performance on a continual basis is essential for organizational
success. This paper outlines the concept of affinity clusters that can influence process performance with respect to some success criteria. Affinity refers to the percentage of time certain dimensional factors occur together with respect to some success measure. The paper illustrates the concepts through an adaptation of Oracle E-Business Suite Lead to Forecast business process that is implemented in Oracle’s PL/SQL
language.
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
Technology and Information are vital to the success of companies.
To leverage the successes in IT projects, companies have at their
disposal, references globally accepted as good practices (COBIT,
ITIL, PMBOK, ISO, TOGAF, etc.). In spite of this, it is still great
the magnitude of spending on IT projects poorly designed or
improperly implemented. This paper presents a brief description
of standards and good practices related to governance and
management of enterprise IT, defines the Lean Thinking, Lean IT, the Processes Management, the Portfolio, Program and Project
Management, and the Work System Theory, and highlights the
purpose of them, showing their characteristics and suggests a
Framework of Lean Governance and Management of Enterprise
IT, by demonstrating how the standards and good practices
presented can work together, because it advocates that the Lean
Thinking, the Process, Portfolio, Program, and Project
Management, and the Work System Theory complement the
standards and good practices of Governance and Management of
Enterprise IT with an approach not referenced in these standards
and good practic
Business Process as the Basis of the Process Approach in Enterprise ManagementDr. Amarjeet Singh
The quality of enterprise management can be
increased through the usage of balanced system of process
approach. Business processes are inherent to any organization.
Management accounting for each business process allows to
conduct factor analysis when minimize labour costs and
assess the their contribution to the implementation of the
overall strategy. This article introduces the research of
Business process used in enterprise management, delineates
how to separate processes into groups, describes their
characteristics, and differences between them.
Similar to Suggest an intelligent framework for building business process management [ pdf ] (20)
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
Suggest an intelligent framework for building business process management [ pdf ]
1. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
DOI : 10.5121/ijsea.2015.6106 69
SUGGEST AN INTELLIGENT FRAMEWORK FOR
BUILDING BUSINESS PROCESS MANAGEMENT
Almutairi Raed, Dr. Djamal Ziani
Department of Information Systems College of Computers and Information Sciences
King Saud University, Riyadh, KSA
ABSTRACT
As companies enter into the digital world, information technology is playing a major role in bringing
process improvements to the forefront of business management. In the recent decades, many organizations
have struggled to redesign and improve their business processes to reduce their total cost. The main
contribution of this research study is to propose an intelligent framework that possesses the ability to
employ a database of best practices, business standards, and business activity history in order to permit the
manager to analyze and improve the design of the business processes.
In addition, the other objective of this research is to build a business process or workflow directly from its
process design logic in order to enable rapid process development and deployment. This procedure
requires some technical improvements of the business design, as it is mainly based on building the business
process using Microsoft Office Visio, which communicates the defined business process to the business
process management engine.
KEYWORDS
Business process improvements, business process intelligence, business process implementation
1. INTRODUCTION
Business process can be defined as the composition of different activities working together to
achieve an organizational goal [1]. Implementing business process redesign should consider
several best practices, such as time, quality, cost, and flexibility, in terms of how and when to
implement business process management (BPM) [2].
The main contribution of this research study is to propose an intelligent framework that possesses
the ability to employ a database of best practices, business standards, and business activity history
in order to permit a manager to analyze and improve the design of the business processes.
In addition, the other objective of this research is to build a business process or workflow directly
from its process design logic in order to enable rapid process development and deployment. This
procedure requires some technical improvements of the business design, as it is mainly based on
building the business process using Microsoft Office Visio, which communicates the defined
business process to the business process management engine.
Another purpose of this research work is to estimate all costs for each business process before and
after applying the optimization in order to assess the overall cost. In addition, a standard duration
2. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
70
will be allocated to each phase in order to alert the business user when he has spent the time that
had been allocated to complete that particular task. The results of our research permit an
organization to accelerate processes and increase their efficiency by reducing costs of processes,
as well as to increase service quality and dependability.
2. RELATED WORK
Business process activity needs to be analyzed, whether in sequence or in parallel, to remove any
delays in the process itself. One major thing that researchers have considered is the organization
policy [1], which should to be taken into account before applying process improvements. Also,
some questions have been raised by researchers regarding the gathering of business process data
to suggest some improvement guides.
The authors in [2] suggested the Use of the business process data mining technique in order to
improve the business processes. This technique has been applied in a Brazilian software
company, which demonstrated that this technique was extremely useful. However, the main
drawback of using this technique is that this framework is dependent on the log file, which does
not provide an instant result, and this log file also needs to be cleaned and extracted regularly.
Managers, directors, process owners, and analysts should work in collaboration as one team to
brainstorm ways to redesign an alternative workflow [3]. Then, they should apply the new
workflow to a real-life setting to evaluate it. This has a major impact on the workflow redesign
procedure, but still it depends on the human factors and does not involve real data extracted from
activity within the workflow.
The authors in [4] provided a set of measurements with associated scores; these scores are to be
written by the team members, who can be either internal or external performers. This technique is
basically dependent on conducting several meetings to draw a roadmap for the organization.
However, these procedures will take more time and do not mainly utilize information technology
extracted from work activity.
The proposed framework in [5] includes four layers: information acquisition, performance
evaluation, structural defects identification, and improved model generation. Each layer has its
own technique, but this paper did not provide the methodology in detail for each layer.
There are some papers that suggested that each type of stakeholder should have their own
judgment from their own perspective [6], but those papers described the evaluation and data
analysis at a high level without going deeper into the technique used in the paper. Also, they
suggested that stakeholders should do some monitoring processes and pay attention to those that
exceed their time limits, without going into further details on how to do so. In addition, they used
business process management notation (BPMN) as the standard representation, and they
suggested prioritizing the activity to achieve the optimal cost of the process.
The authors in [7] suggested business process intelligent (BPI) should be utilized to support
business process improvement instead of spending more time cleaning and analyzing log files. In
addition, they suggested a mechanism to transform historical data using extraction,
transformation, and loading (ETL) to solve or optimize the resource assignment problem. Thus,
the main features of BPI are to optimize workflow design and resource assignment problems.
3. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
71
This paper [8] illustrated that the organization components such as strategy, structure, processes,
technology, and people (roles and skills) should be well integrated to accomplish an overall
business improvement. In addition, the organization components should depend on human factors
to make the design of a business more logical instead of depending on artificial intelligence,
which will be more costly.
This paper [9] explained the importance of designing a business process that depends on
standardization methodology. Standardization should be involved in the design from the lowest
layer, the database level, to a higher level of designing business processes. Standardization can be
viewed from two perspectives: manufacturers’ perspective and customers’ perspective. From the
manufacturer’s perspective, this will decrease the overall cost of developing and designing
systems; from a customer’s view, this will meet his good expectations of the product.
The process of achieving enterprise integration includes all managerial and technical factors that
enable cross functional process integration [10]. The result is a customer-oriented management
structure, with information systems, formally related to the processes and integration of
procedures required to establish and retain customer satisfaction. It is very necessary to define an
expert leader and to conduct a meeting in order to define “as-is” and “to-be” phases.
Business intelligence has become extremely essential to organizations [11]. Due to the
globalization of the world market and massive advances in information technology through which
businesses gather, organizations are able to transform and then analyze data to predict the future
of the business to enhance and provide better decision results.
3. PROPOSED FRAMEWORK
3.1 Proposed architecture
The purpose of this solution is to find the most suitable way to maximize employee performance.
To achieve this, our proposed intelligent framework will analyze and monitor activities and
“tasks” inside the business process workflows. A trigger will be added to notify or alert the user
about an activity’s deadline. To accomplish this operation, we need to identify a time limit for
each phase or activity within a process. To do so, we will design and implement an intelligent
framework that will act as an enabler for process owners to monitor and trigger the durations of
different processes and activities, as well as to seek any improvement opportunities. The proposed
framework system can be utilized as a new generation of business process management
improvement by identifying and measuring phase limits while users continue to use the system.
In accordance with the specified requirements, we have put together a plan to describe how the
system components should interact. Figure 1 shows the main system components and how they
are linked to one another. At the beginning, we need to create the workflow design using
Microsoft Visio with the BPMN standard; then, the system engine will parse the design file and
will validate and verify the workflow design. Afterwards, the engine will automatically create the
workflow process and its related objects. There are two main components of system architecture,
which are described below.
• XML Design file
• Business process engine
4. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
72
Figure1: System architecture
3.1.1 XML Design file:
The suggested system has used Microsoft Visio to draw objects—such as the entity, task, and
arrow—that are based on the BPMN standard. Microsoft Visio is “a diagramming tool that can be
used to visually communicate technical as well as non-technical representations of ideas,
processes, concepts, structures, layouts, software models, blueprints, etc.” [2]. Microsoft Visio
stores files in the VSDX format that is based on XML on the backend. These files contain the
workflow design, which stores object data such as entities and connectors, in Extensible Markup
Language (XML). This will allow developers to manipulate and work with these files
programmatically because it is based on XML structured technology, as shown in Figure 2.
Figure 2: Extracted VSDX File
5. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
73
3.1.2 Business process engine:
This part of the proposed system is responsible for converting XML file design into three main
objects: connectors, roles, and phases (“tasks” or “activities”). Each object from these extracted
objects will be explained in the next section. After the developer writes the main process
properties, such as the name and the process code or reference, the engine will generate these
objects from the uploaded design file. Once this process has been completed, a log will show the
results of generating these objects, as shown in Figure 3. In addition, the engine is responsible for
moving process instances and workflow from one phase to another, and for executing any phase
based on its respective type.
Figure 3: Log file generated from Process Engine
From the log file, the engine will interpret the main objects that are a concern to the proposed
system; for example, it will extract the following object types from the design file:
• Errors
• Masters
• Page Relation
• Connectors.
a) Errors:
If the log contains any potential errors, it will be shown in this section of the generated
log file.
b) Masters:
This will list all main objects except the connectors, such as activities, groups, and events
(if there are any events within the design).
c) Page relation:
This part will list all related pages extracted from the file.
d) Connectors:
These are used to extract all connections between different activities; the engine uses the
connectors as a path between workflow activities.
6. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
74
3.2 System Unique Functionalities
3.2.1 Rapid process development
A business process consists of different activities done in unison to achieve a common goal. As
mentioned before, one objective of this research was to find a way for the process designer to
build a business process or workflow directly from the process design logic in order to enable
rapid process development and deployment.
The main objective of rapid process development is to make the business process engine able to
translate the process design into business process objects. This design is based on the BPMN2
standard model using a tool like Microsoft Visio. It will parse the design as an input and generate
the business process objects, such as the process phases, roles, and connectors, as an output.
3.2.2 Best practices
Best practices methodology has been gathered and implemented in many different areas including
health care, manufacturing, and software development. From a business process perspective, best
practices can be described as the redesign of a business process that is derived from many
organizations in order to overcome a technical business process design challenge [13]. As in the
proposed framework, each workflow can links to another workflow as a result of the best practice
for that process; in addition, a category object has been created for each process to specify which
type category that process belongs:
a) Department Process Category: This process does not follow the best practice
procedure. This might because it is a very specific procedure specifically for a
department.
b) Best Practice Process Category: This category follows the best practice standards
among the best similar organizations.
Once best practices for a department process have been created, a pointer will be created
for a best practice to indicate this best practice process to be the outcome of non-best practice
process that will be improved over time.
3.2.3 Process Standard
Process standard will allow the organization business process to increase readiness to the
employee and outsourcing company in order to improve overall employee performance. A
process standard has been implemented as an object in the proposed framework; this standard
object can be assigned for each phase or activity within a process to define the timeline for each
task. Mainly, as shown in Figure 4, we embedded the standard in the design of the framework; in
addition, there are three main attributes for each phase that we have used to set the process
standardization.
7. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
75
Figure 4: Embedded standard in the design of the proposed framework
a) Internal “local” standard
In this scenario we have applied a phase standard to be derived from an internal organizational
unit, or from a department that should follow any internal policies or an organizational policy.
Such policies have an official form that specifies the maximum duration allowed for each phase
to be completed. Thus, the maximum duration will be set when the process has been
implemented.
b) Industry standard
In this scenario, we need to measure what the standard durations and phases are that are derived
from leading organizations and that any organization should follow to obtain an official
certificate, such as ISO 10001. Many papers have shown that applying a standard duration will
reflect on the organization’s performance by reducing its cost [14].
c) Average standard
This scenario is based completely on the system engine calculating the average duration and
using this value to set the maximum duration of each phase. If the user passes this time
allowance, the system will alert him using some indicator such as changing the color of that phase
or sending him an email to remind him about it.
4. EVALUATION
The quantitative research approach has been used to validate the proposed framework. A sample
of 21 users representing different roles of users was evaluated. The study was conducted at one of
the leading health care provider organizations of Saudi Arabia. A sample of three categories was
defined, representing two main groups commonly associated with business process stakeholders
and developers. These groups consist of participants who have had a primary role in business
processes. On the other hand, the participating developers were usually business analysts having
direct contact with main stakeholders of business processes. These participating groups were
provided the necessary overview of the proposed system’s unique functionality, including process
8. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
76
best practice, process standard, and rapid process development, as well as basic instructions on
the use of the proposed framework.
Having gathered committed participants who interacted with business process systems and best
represented the targeted sample groups, the final sample pool eventually comprised of the
following percentage breakdowns. The users of business processes consisted of 17 participants.
The developers’ group consisted of 4 participants.
Those users were provided the necessary access to the basic instructions and they were viewed
the functionalities of the proposed framework. After sometime, the group was requested to
respond to an online questionnaire based upon their relationship to business process systems and
business users. The survey consisted of 4 questions, each on a 5-responses scale which is:
• Strongly agree.
• Agree.
• Neutral.
• Disagree.
• Strongly disagree.
A. System efficiency and overall cost savings
The first question we asked of participants was related to “system efficiency and overall cost
savings”. This primarily referred to those savings experienced by the employee, manager, and
overall organization. More specifically, it related to the savings in terms of both personal time and
financial costs. 56% of participants surveyed agreed with this statement and 19% was neutral
while 14% of participants were strongly agreed “Figure 5”.
Figure 5: System efficiency and overall cost savings
B. Optimization of building and implementing business process management
components such as work activities, phases, and data flow by accelerating the development
time for business processes
9. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
77
We asked participants to what extent they agreed with the following statements “The Suggested
framework help to optimize of building and implementing business process management
components such as work activities, phases, and data flow”. Agreed 54% of participants surveyed
agreed with this statement and 20% was strongly agreed while 9% of participants were neutral
“Figure 6”.
Figure 6: Optimization of building and implementing business process management
C. Influence on the design of business processes by considering the best practice.
The third factor explored in the questionnaire was the effect of considering how the best practices
for business process can positively influence the design of business processes. This main focus
here was to focus on any improvements in time, quality, or employee satisfaction that can be
made to any business process design by applying the best practices that have previously
described. 57% of participants surveyed agreed with this statement and 21% of participants were
neutral and 12% of participants were strongly agreed “Figure 7”.
Figure 7: Influence on the design of business processes by considering the best practice
10. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
78
D. Usability
To validate the performance of the system usability, the following three terms were used to
evaluated together the subjective aspect of end-user experience: (1) user-friendliness, (2)
reliability, and (3) value added. 33% of participants surveyed were neutral with this statement,
while 33% agreed and 22% of participants were strongly “Figure 8”.
Figure 8: System usability
5. CONCLUSION
The main goal of this research work was to provide an intelligent business process that had a
positive impact on an organization processes, and to redefine the traditional approach to business
processes in an organization. We proposed a business process framework to improve
communications in order to reduce the cost, increase the effectiveness and the efficiency, and
increase the usability among the developers and business users.
REFERENCES
[1] MD. Maaz, Manish Kumar, (2012) “Structured Method for Business Process Improvement”. Third
International Conference on Services in Emerging Markets 2012.
[2 ]Lemos, A.M.; Sabino, C.C.; Lima, R.M.F.; Oliveira, C.A.L., (2011) "Using process mining in
software development process management: A case study," Systems, Man, and Cybernetics (SMC),
2011 IEEE International Conference on , vol., no., pp. 1181,1186, 9-12 Oct.
[3] Amiyo, M.; Nabukenya, J.; Sol, H.G.,(2012 "A Repeatable Collaboration Process for Exploring
Business Process Improvement Alternatives," System Science (HICSS), 2012 45th Hawaii
International Conference on , vol., no., pp.326,335, 4-7 .
[4] Asato, R.; de Mesquita Spinola, M.; Costa, I.; de Farias Silva, W.H., (2009) "Alignment between the
business strategy and the software processes improvement: A roadmap for the implementation,"
Management of Engineering & Technology, 2009. PICMET 2009. Portland International Conference
on , vol., no., pp.1066,1071, 2-6 Aug.
[5] Liang Chen, Tao Xue, Ali Yang, (2009)"Business Process Continuous Improvement System Based on
Workflow Mining Technology," csie, vol. 5, pp.414-418, 2009 WRI World Congress on Computer
Science and Information Engineering.
11. International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.1, January 2015
79
[6] Lodhi, A.; Koppen, V., (2011) "Business process modeling for post execution analysis and
improvement," Software, Knowledge Information, Industrial Management and Applications
(SKIMA), 2011 5th International Conference on , vol., no., pp.1,8, 8-11 Sept. 2011
[7] Sohail, A.; Dominic, P.D.D., (2012)"A gap between Business Process Intelligence and redesign
process," Computer & Information Science (ICCIS), 2012 International Conference on , vol.1, no.,
pp.136,142, 12-14 June 2012 .
[8] Paul L. BannermaNICTA, Sydney, (2009) “Capturing business benefits from process improvement:
four fallacies and what to do about them”, Proceedings of the 6th International Conference on
Frontiers of Information Technology Abbottabad, Pakistan. December 16-18, 2009.
[9] Harshavardhan Karandikar, Srinivas Nidamarthi, (2007) "Implementing a platform strategy for a
systems business via standardization", Journal of Manufacturing Technology Management, Vol. 18
Iss: 3, pp.267 – 280 , 2007.
[10] Douglas W. Frye, Thomas R. Gulledge, (2007) "End-to-end business process scenarios", Industrial
Management & Data Systems, Vol. 107 Iss: 6, pp.749 – 761.
[11] Bhushan Kapoor, Joseph Sherif, (2012) "Human resources in an enriched environment of business
intelligence", Kybernetes, Vol. 41 Iss: 10, pp.1625 – 1637.
[12] Ask, (2010), MS Visio Definition [online] Avialable at http://www.ask.com/question/what-is-visio-
used-for [Accessed 26-Jan-2014].
[13] Martin, J; (1987), “The best practice of business. London”. John Martin Publishing.
[14] Hadfield, W. (2007), “BP to save 600 million pounds in global IT process standardisation”, Computer
Weekly, May, p. 5.