804 research outputs found

    Methodological proposal to implement enterprise resource planning systems

    Get PDF
    Enterprise resource planning system is one of the most important projects on business optimization than anenterprise could attempt. Their use can be seen at small, medium and big enterprises. Project management andimplementation methodology is a critical success factor mentioned in literature. At this paper is presented aproposal of implementation methodology based on researched literature and the activities that should be donein each phase. It also presented the selection process as other critical success factor and suggestions for futureresearch regarding Petri Nets as a computation intelligence that could be used to simulate selection process

    Business Process Management and Process Mining within a Real Business Environment: An Empirical Analysis of Event Logs Data in a Consulting Project

    Get PDF
    Il presente elaborato esplora l’attitudine delle organizzazioni nei confronti dei processi di business che le sostengono: dalla semi-assenza di struttura, all’organizzazione funzionale, fino all’avvento del Business Process Reengineering e del Business Process Management, nato come superamento dei limiti e delle problematiche del modello precedente. All’interno del ciclo di vita del BPM, trova spazio la metodologia del process mining, che permette un livello di analisi dei processi a partire dagli event data log, ossia dai dati di registrazione degli eventi, che fanno riferimento a tutte quelle attivitĂ  supportate da un sistema informativo aziendale. Il process mining puĂČ essere visto come naturale ponte che collega le discipline del management basate sui processi (ma non data-driven) e i nuovi sviluppi della business intelligence, capaci di gestire e manipolare l’enorme mole di dati a disposizione delle aziende (ma che non sono process-driven). Nella tesi, i requisiti e le tecnologie che abilitano l’utilizzo della disciplina sono descritti, cosi come le tre tecniche che questa abilita: process discovery, conformance checking e process enhancement. Il process mining Ăš stato utilizzato come strumento principale in un progetto di consulenza da HSPI S.p.A. per conto di un importante cliente italiano, fornitore di piattaforme e di soluzioni IT. Il progetto a cui ho preso parte, descritto all’interno dell’elaborato, ha come scopo quello di sostenere l’organizzazione nel suo piano di improvement delle prestazioni interne e ha permesso di verificare l’applicabilitĂ  e i limiti delle tecniche di process mining. Infine, nell’appendice finale, Ăš presente un paper da me realizzato, che raccoglie tutte le applicazioni della disciplina in un contesto di business reale, traendo dati e informazioni da working papers, casi aziendali e da canali diretti. Per la sua validitĂ  e completezza, questo documento Ăš stata pubblicato nel sito dell'IEEE Task Force on Process Mining

    Comparative Evaluation of Process Mining Tools

    Get PDF
    Protsesside sĂŒva analĂŒĂŒs on vĂ”rdlemisi uus uuringute haru, mis tĂ€idab lĂŒnki Ă€ri protsesside ja erinevate IT sĂŒsteemide vahel. SĂŒndmuste registreerimine on peamised protsesside sĂŒva analĂŒĂŒsi allikad, ning need fikseeritakse erinevate andmete allikatega, kaasa arvatud andmetebaase, ERP sĂŒsteeme, CRM sĂŒsteeme, auditori jĂ€lge, arsti infromatsiooni sĂŒsteeme, panga operatsioonide registreerimist jne. Saadud sellisest registreerumisest teade vĂ”imaldab meil avastada tĂ”elist protsessi ja olemasoleva protsessi nĂ€ite edasiseks analĂŒĂŒsimiseks, hindamiseks ja nende kvaliteedi pikaajliseks parandamiseks. Niiviisi, erinevad protsesside sĂŒva analĂŒĂŒsid arendatakse turul. Ehkki, on tunda piisavate ja mĂ”istlike hindamise konstruktsioonide puudust, mis vĂ”iksid kasutajatel Ă”ige instrimendi valida. See diplomitöö pakub konstruktsiooni, mis vĂ”imaldab vĂ”rrelda protsesside analĂŒĂŒsi vahendeid nende funktsionaalsust uurides. Pakutud operatsioonid seotakse tĂŒĂŒpiliste probleemidega, mis mainitakse olemasolevate protsesside sĂŒva analĂŒĂŒsi kasutuse juhtudel. Seda konstruktsiooni kasutades, antud diplomitöö vĂ”rdleb kolme protsesside analĂŒĂŒsi vahendeid, nimelt ProM, Disco ja Celonis. LĂ€biviidud vĂ”rdlus nĂ€itab, et need kolm vahendid annavad vĂ”rdletavat funktsionaalsust, kuid erinevad selle poolest, mis viisil antakse funktionaalsust.Process mining is relatively young research area that meets the gap between businesses processes and various IT systems. Event logs are the primary sources for a process mining project and they are captured by different data sources including databases, ERP systems, CRM systems, audit trails, hospital information systems, bank transaction logs, etc. The extracted knowledge from this log enable us to discover the actual process and existing process model for further analysis, evaluation and continuous improvement in their quality. This way, various process mining tools have been developed in the market. Nevertheless, there is a lack of sufficent and comprehensive evaluation frameworks that assist users in selecting the right tool. This thesis proposes a framework that enables the comparison of process mining tools in terms of their functional features. The proposed operations are linked to typical problems reported in existing process mining use cases. Using this framework, the thesis compares three process mining tools, namely ProM, Disco and Celonis The comparison shows that while these tools provide comparable functionality they differ in terms of the way the functionality is provided

    Process mining : conformance and extension

    Get PDF
    Today’s business processes are realized by a complex sequence of tasks that are performed throughout an organization, often involving people from different departments and multiple IT systems. For example, an insurance company has a process to handle insurance claims for their clients, and a hospital has processes to diagnose and treat patients. Because there are many activities performed by different people throughout the organization, there is a lack of transparency about how exactly these processes are executed. However, understanding the process reality (the "as is" process) is the first necessary step to save cost, increase quality, or ensure compliance. The field of process mining aims to assist in creating process transparency by automatically analyzing processes based on existing IT data. Most processes are supported by IT systems nowadays. For example, Enterprise Resource Planning (ERP) systems such as SAP log all transaction information, and Customer Relationship Management (CRM) systems are used to keep track of all interactions with customers. Process mining techniques use these low-level log data (so-called event logs) to automatically generate process maps that visualize the process reality from different perspectives. For example, it is possible to automatically create process models that describe the causal dependencies between activities in the process. So far, process mining research has mostly focused on the discovery aspect (i.e., the extraction of models from event logs). This dissertation broadens the field of process mining to include the aspect of conformance and extension. Conformance aims at the detection of deviations from documented procedures by comparing the real process (as recorded in the event log) with an existing model that describes the assumed or intended process. Conformance is relevant for two reasons: 1. Most organizations document their processes in some form. For example, process models are created manually to understand and improve the process, comply with regulations, or for certification purposes. In the presence of existing models, it is often more important to point out the deviations from these existing models than to discover completely new models. Discrepancies emerge because business processes change, or because the models did not accurately reflect the real process in the first place (due to the manual and subjective creation of these models). If the existing models do not correspond to the actual processes, then they have little value. 2. Automatically discovered process models typically do not completely "fit" the event logs from which they were created. These discrepancies are due to noise and/or limitations of the used discovery techniques. Furthermore, in the context of complex and diverse process environments the discovered models often need to be simplified to obtain useful insights. Therefore, it is crucial to be able to check how much a discovered process model actually represents the real process. Conformance techniques can be used to quantify the representativeness of a mined model before drawing further conclusions. They thus constitute an important quality measurement to effectively use process discovery techniques in a practical setting. Once one is confident in the quality of an existing or discovered model, extension aims at the enrichment of these models by the integration of additional characteristics such as time, cost, or resource utilization. By extracting aditional information from an event log and projecting it onto an existing model, bottlenecks can be highlighted and correlations with other process perspectives can be identified. Such an integrated view on the process is needed to understand root causes for potential problems and actually make process improvements. Furthermore, extension techniques can be used to create integrated simulation models from event logs that resemble the real process more closely than manually created simulation models. In Part II of this thesis, we provide a comprehensive framework for the conformance checking of process models. First, we identify the evaluation dimensions fitness, decision/generalization, and structure as the relevant conformance dimensions.We develop several Petri-net based approaches to measure conformance in these dimensions and describe five case studies in which we successfully applied these conformance checking techniques to real and artificial examples. Furthermore, we provide a detailed literature review of related conformance measurement approaches (Chapter 4). Then, we study existing model evaluation approaches from the field of data mining. We develop three data mining-inspired evaluation approaches for discovered process models, one based on Cross Validation (CV), one based on the Minimal Description Length (MDL) principle, and one using methods based on Hidden Markov Models (HMMs). We conclude that process model evaluation faces similar yet different challenges compared to traditional data mining. Additional challenges emerge from the sequential nature of the data and the higher-level process models, which include concurrent dynamic behavior (Chapter 5). Finally, we point out current shortcomings and identify general challenges for conformance checking techniques. These challenges relate to the applicability of the conformance metric, the metric quality, and the bridging of different process modeling languages. We develop a flexible, language-independent conformance checking approach that provides a starting point to effectively address these challenges (Chapter 6). In Part III, we develop a concrete extension approach, provide a general model for process extensions, and apply our approach for the creation of simulation models. First, we develop a Petri-net based decision mining approach that aims at the discovery of decision rules at process choice points based on data attributes in the event log. While we leverage classification techniques from the data mining domain to actually infer the rules, we identify the challenges that relate to the initial formulation of the learning problem from a process perspective. We develop a simple approach to partially overcome these challenges, and we apply it in a case study (Chapter 7). Then, we develop a general model for process extensions to create integrated models including process, data, time, and resource perspective.We develop a concrete representation based on Coloured Petri-nets (CPNs) to implement and deploy this model for simulation purposes (Chapter 8). Finally, we evaluate the quality of automatically discovered simulation models in two case studies and extend our approach to allow for operational decision making by incorporating the current process state as a non-empty starting point in the simulation (Chapter 9). Chapter 10 concludes this thesis with a detailed summary of the contributions and a list of limitations and future challenges. The work presented in this dissertation is supported and accompanied by concrete implementations, which have been integrated in the ProM and ProMimport frameworks. Appendix A provides a comprehensive overview about the functionality of the developed software. The results presented in this dissertation have been presented in more than twenty peer-reviewed scientific publications, including several high-quality journals

    Reliability assessment of manufacturing systems: A comprehensive overview, challenges and opportunities

    Get PDF
    Reliability assessment refers to the process of evaluating reliability of components or systems during their lifespan or prior to their implementation. In the manufacturing industry, the reliability of systems is directly linked to production efficiency, product quality, energy consumption, and other crucial performance indicators. Therefore, reliability plays a critical role in every aspect of manufacturing. In this review, we provide a comprehensive overview of the most significant advancements and trends in the assessment of manufacturing system reliability. For this, we also consider the three main facets of reliability analysis of cyber–physical systems, i.e., hardware, software, and human-related reliability. Beyond the overview of literature, we derive challenges and opportunities for reliability assessment of manufacturing systems based on the reviewed literature. Identified challenges encompass aspects like failure data availability and quality, fast-paced technological advancements, and the increasing complexity of manufacturing systems. In turn, the opportunities include the potential for integrating various assessment methods, and leveraging data to automate the assessment process and to increase accuracy of derived reliability models

    Quantitative and Qualitative Models for Managing Risk Interdependencies in Supply Chain

    Get PDF
    The interdependent nature of supply chain elements and events requires risk systems must be assessed as an interrelated framework to optimize their management and integrate effectively with other decision-making tools in uncertain environments. This research shows a synthesis and analysis of the main qualitative/quantitative methods that have been used in the literature considering the treatment of event dependencies in supply chain risk management in the period 2003– 2018. The results revealed that the integration with disruption analysis tools and artificial intelligence methods are the most common types adopted, with increasing trend and effectiveness of Bayesian and fuzzy theory approache

    ASSESSMENT OF THE POSSIBILITY OF USING BAYESIAN NETS AND PETRI NETS IN THE PROCESS OF SELECTING ADDITIVE MANUFACTURING TECHNOLOGY IN A MANUFACTURING COMPANY

    Get PDF
    The changes caused by Industry 4.0 determine the decisions taken by manufacturing companies. Their activities are aimed at adapting processes and products to dynamic market requirements. Additive manufacturing technologies (AM) are the answer to the needs of enterprises. The implementation of AM technology brings many benefits, although for most 3D printing techniques it is also relatively expensive. Therefore, the implementation process should be preceded by an appropriate analysis, in order, finally, to assess the solution. This article presents the concept of using the Bayesian network when planning the implementation of AM technology. The use of the presented model allows the level of the success of the implementation of selected AM technology, to be estimated under given environmental conditions

    Fuzzy MADM Approach for Rating of Process-Based Fraud

    Get PDF
    Process-Based Fraud (PBF) is fraud enabled by process deviations that occur in business processes. Several studies have proposed PBF detection methods; however, false decisions are still often made because of cases with low deviation. Low deviation is caused by ambiguity in determining fraud attribute values and low frequency of occurrence. This paper proposes a method of detecting PBF with low deviation in order to correctly detect fraudulent cases. Firstly, the fraudulence attributes are established, then a fuzzy approach is utilized to weigh the importance of the fraud attributes. Further, multi-attribute decision making (MADM) is employed to obtain a PBF rating according to attribute values and attribute importance weights. Finally, a decision is made whether the deviation is fraudulent or not, based on the PBF rating. Experimental validation showed that the accuracy and false discovery rate of the method were 0.92 and 0.33, respectively
    • 

    corecore