• Title/Summary/Keyword: 실행 프로세스

Search Result 573, Processing Time 0.029 seconds

LSTM-based Business Process Remaining Time Prediction Model Featured in Activity-centric Normalization Techniques (액티비티별 특징 정규화를 적용한 LSTM 기반 비즈니스 프로세스 잔여시간 예측 모델)

  • Ham, Seong-Hun;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.83-92
    • /
    • 2020
  • Recently, many companies and organizations are interested in predictive process monitoring for the efficient operation of business process models. Traditional process monitoring focused on the elapsed execution state of a particular process instance. On the other hand, predictive process monitoring focuses on predicting the future execution status of a particular process instance. In this paper, we implement the function of the business process remaining time prediction, which is one of the predictive process monitoring functions. In order to effectively model the remaining time, normalization by activity is proposed and applied to the predictive model by taking into account the difference in the distribution of time feature values according to the properties of each activity. In order to demonstrate the superiority of the predictive performance of the proposed model in this paper, it is compared with previous studies through event log data of actual companies provided by 4TU.Centre for Research Data.

A Method for Business Process Analysis by using Decision Tree (의사결정나무를 활용한 비즈니스 프로세스 분석)

  • Hur, Won-Chang;Bae, Hye-Rim;Kim, Seung;Jeong, Ki-Seong
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.3
    • /
    • pp.51-66
    • /
    • 2008
  • The Business Process Management System(BPMS) has received more attentions as companies increasingly realize the importance of business processes. However, traditional BPMS has focused mainly on correct modeling and exact automation of process flow, and paid little attention to the achievement of final goals of improving process efficiency and innovating processes. BPMS usually generates enormous amounts of log data during and after execution of processes, where numerous meaningful rules and patterns are hidden. In the present study we employ the data mining technique to find out useful knowledge from the complicated process log data. A data model and a system framework for process mining are provided to help understand the existing BPMS. Experiments with the simulated data demonstrate the effectiveness of the model and the framework.

  • PDF

워크플로우 시스템에서의 문서 변경 관리

  • 배혜림;김영호;김규동;곽병권
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.65-69
    • /
    • 2002
  • 본 논문에서는 문서를 중심으로 진행되는 비즈니스 프로세스에서의 문서변경을 워크플로우 시스템을 통해 지원하기 위한 새로운 프레임워크를 제안한다. 일반적인 워크플로우관리시스템은 크게 정의시 기능과 실행시 기능으로 나뉘어, 프로세스를 정의하고 이를 자동으로 실행할 것을 표준으로 정의하고 있다. 그러나. 워크플로우 시스템이 문서의 변경을 프로세스의 진행과정과 연계하여 효과적으로 관리하기 위해서는 이러한 기본적인 기능 외에 추가적인 기능을 요구하며, 본 연구에서는 이를 위하여 버전관리 기법을 도입한다. 제안된 방법론은 문서 및 프로세스의 구조, 문서와 프로세스간의 연계, 프로세스 수행에 따른 버전 자동생성. 버전의 저장 및 재구성, 그리고 버전에 대한 질의를 각각 표현해주는 다섯 가지 세부 모델을 포함한다. 제시된 세부모델의 유기적인 상호작용은 문서변경과정에 대한 사용자의 이해를 돕고 문서작업의 편리를 도모한다.

  • PDF

Graph Based Detection Method Of Business Process Anomalies (그래프 기반의 비즈니스 프로세스 이상현상 검증 방법)

  • Park, Chan-Hee;Tak, Kyung-Hyun;Kim, Jae-Hyung;Son, Jin-Hyun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.226-231
    • /
    • 2007
  • 최근 비즈니스 프로세스가 복잡해짐에 따라, 비즈니스 프로세스를 설계 한 후 실행하는 과정에서 예상치 못한 문제들이 발생할 가능성 또한 높아지고 있다. 예상치 못한 문제의 발생은 막대한 비용 및 인적자원의 손실을 초래하기 때문에, 설계 된 비즈니스 프로세스는 엔진에 의해 실행되기 전에 다양한 방법으로 검증을 받아야 한다. 본 논문은, BPMN으로 설계된 비즈니스 프로세스의 컨트롤 플로우(Control Flow)에 대한 이상현상 중 데드락과 동기화의 부족에 대한 검증을 목적으로 한다. 데드락과 동기화의 부족은 Split 게이트웨이와 Join 게이트웨이의 종류에 따른 의미적 차이에 의해 발생한다. 본 논문에서는 비즈니스 프로세스를 방향성 그래프로 변환함으로써 Split 게이트웨이와 쌍을 이루는 Join 게이트웨이를 찾을 것을 제안하며, 찾아낸 (Split,Join)쌍은 컨트롤 플로우 검증 테이블을 이용하여 이상현상을 검증한다.

  • PDF

Defining Emotionalized Product and EP Design Process (Emotionalized Product의 규명과 디자인 프로세스 -제품에 집중된 실행적 감성 접근을 위한 디자인 프로세스-)

  • Seok, Jin-Min;Lee, Eun-Jong
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.791-798
    • /
    • 2009
  • The goal of this study is leading discussion on emotional design focused on product domain and approaching it through a practical way so that it'll be able to help designers in their real design work when they design products in an emotional way. Discussions on emotions are remaining on abstract levels and only focusing on 5 senses even though the importance of emotions are increased. But much more is needed to apply emotions in the product domain because these are not the proper forms for applications and they only cover limited parts of it. Therefore, in this study we proposed the notion of 'Emotionalized Product' and defined it into a practical level. We extracted 5 useful frameworks of 'Emotionalized Product(EP)' as a results; EP Media, EP Procedure, EP Level, EP Character, and EP Value. Then we clarified EP with these frameworks. After that, we extracted 2 frameworks: Domain Structure, and EP Opportunity, to combine EP with a real product. Finally we proposed the EP Design Process consisted of Inductive and Deductive Process based on previous work. It can be shared by designers as a base of designing system, and it also can be helpful to design products more successfully with an emotional approach.

  • PDF

Analysis and Application of Performance Improvement of a Real-time Simulation Visualization based on Multi-thread Pipelining Parallel Processing (다중 스레드 파이프라인 병렬처리를 통한 실시간 시뮬레이션 시각화의 성능 향상 해석 및 적용)

  • Lee, Jun Hee;Song, Hee Kang;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.3
    • /
    • pp.13-22
    • /
    • 2017
  • This research proposes and applies a pipelining parallel processing technique to enhance the speed of visualizing the results of real-time simulations. Generally, a simulation with real-time visualization consists of three processes: executing a simulation model, transmitting simulation result, and visualizing simulation result. If we have these processes in serial, the latency from simulation to visualization will be very long, which degrades the speed of visualization of data from real-time simulation. Thus, the main purpose of this research is maximizing performance by adapting pipelining parallel processing technique to the real-time simulation visualization. Also we show that performance is improved by adding multi-threading technique to each process. This paper proposes a theoretical performance model and simulation results of the techniques and then we applied this to an air combat simulation model as a case study. As the result, it shows that the performance is greatly enhanced than the original model's execution time.

Run-Time Process Definition Accommodation in Workflow Management Systems (워크플로우 관리 시스템에서의 실행 중 프로세스 정의 수용)

  • Han, Dong-Su;Sim, Jae-Yong
    • Journal of KIISE:Databases
    • /
    • v.27 no.4
    • /
    • pp.613-626
    • /
    • 2000
  • 전통적인 워크플로우 패러다임에 있어서는 하나의 워크플로우가 자동으로 실행되기 위해서는 사전에 해당 워크플로우 탬플릿이 정의되어야 한다. 하지만 많은 경우에 있어서 프로세스 생성시에 전체 워크플로우를 명확하게 정의 할 수 없는 상황이 발생한다. 그러한 경우에는 워크플로우 파편을 통합하여 유도되는 것이 적절하다. 워크플로우 관리시스템이 그러한 상황에 대처하기 위해서는 실행 중에 워크플로우를 정의하는 기능을 갖출 필요가 있다. 본 논문에서는 워크플로우 관리시스템에서 실행 중 워크플로우 정의 기능을 어떻게 수용할 것인지에 관해서 소개하고 그러한 기능을 수용하는 워크플로우 관리 시스템이 어떠한 구조이어야 하는지에 관해서 논의한다. 본 논문에서는 또한 실행 중 워크플로우 정의를 위한 세가지 워크플로우 파편 템플릿이 소개되며 이것들로부터 전체 워크플로우를 유도하는 알고리즘이 고안되었다. 실행 중 워크플로우 정의 기능을 구현하기 위해서는 커넥터 메커니즘이 고안되었으며 이것의 구조와 기능도 소개된다.

  • PDF

Proposal of Process Hollowing Attack Detection Using Process Virtual Memory Data Similarity (프로세스 가상 메모리 데이터 유사성을 이용한 프로세스 할로윙 공격 탐지)

  • Lim, Su Min;Im, Eul Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.431-438
    • /
    • 2019
  • Fileless malware uses memory injection attacks to hide traces of payloads to perform malicious works. During the memory injection attack, an attack named "process hollowing" is a method of creating paused benign process like system processes. And then injecting a malicious payload into the benign process allows malicious behavior by pretending to be a normal process. In this paper, we propose a method to detect the memory injection regardless of whether or not the malicious action is actually performed when a process hollowing attack occurs. The replication process having same execution condition as the process of suspending the memory injection is executed, the data set belonging to each process virtual memory area is compared using the fuzzy hash, and the similarity is calculated.

Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment (윈도우 환경에서의 메모리 인젝션 기술과 인젝션 된 DLL 분석 기술)

  • Hwang, Hyun-Uk;Chae, Jong-Ho;Yun, Young-Tae
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.59-67
    • /
    • 2006
  • Recently the Personal Computer hacking and game hacking for the purpose of gaining an economic profit is increased in Windows system. Malicious code often uses methods which inject dll or code into memory in target process for using covert channel for communicating among them, bypassing secure products like personal firewalls and obtaining sensitive information in system. This paper analyzes the technique for injecting and executing code into memory area in target process. In addition, this analyzes the PE format and IMPORT table for extracting injected dll in running process in affected system and describes a method for extracting and analyzing explicitly loaded dll files related with running process. This technique is useful for finding and analyzing infected processes in affected system.

  • PDF

A Process-driven IoT-object Collaboration Model (프로세스 기반 사물인터넷 객체 협업 모델)

  • Ahn, Hyun;Lee, Yongjoon;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.9-16
    • /
    • 2014
  • In recent years, the importance of IoT (Internet of Things) is emphasized by information communication technologies and the performance of various smart devices are rapidly developed and applied in the real world. In this paper, we propose a process-driven IoT-object collaboration model to specify and execute a IoT service based on processes. That is, the purpose of this paper is to suggest a formal method in order to describe a IoT service into a group of tasks having execution order and collaboration between IoT-objects in charge of the enactment of a task. Conclusively, through the proposed model, we expect that IoT services will be automatically executed, analyzed, monitored and reused in the process-driven IoT computing environment.