2015 International Conference on Information, Communication Technology and System
Decomposition Using Refined Process Structure Tree (RPST)
and Control Flow Complexity Metrics
Authors Indra Gita Anugrah
1)
, Riyanarto Sarno
2)
, Ratih Nur Esti Anggraini
3)
1, 2, 3)
Department of Informatics, Faculty of Information Technology
Institut Teknologi Sepuluh Nopember
Surabaya
e-mail : indra14@mhs.if.its.ac.id
1)
, riyanarto@if.its.ac.id
2)
, ratih_nea@if.its.ac.id
3)
Abstract — Process mining is a technique that aims to gain
knowledge of the event log. The amount of data in the event log
is very influential in the Process mining, because it contains
millions of activities that shape the behavior of a company. The
three main capabilities possessed by mining process is a
discovery, conformance, and enhancement. This paper, we
present an approach to decompose business processes using
Refine Process Structure Tree (RPST). By breaking down a
whole into sub models Business Processes (fragments) to the
smallest part (atomic) can facilitate the analysis process and can
easily be rebuilt. To measure the level of complexity in the model
fragment and atomic models we use complexity Control flow
metrics. Control flow complexity metrics have two main
approaches that are count based measurement and execution
path based measurement path. Count based measurement used to
describe a static character, while an execution path based
measurement used to describe the dynamic character of each
model fragment or atomic models (bond fragment).
Keywords — Process mining; decompose business process;
refined process structure tree; control flow complexity metrcs.
I. INTRODUCTION
Nowadays a variety of approaches to address the
challenges involved in Business Process Management
(BPM) is mostly done. By using the event log we could see
the events in a business process. Event log contains records
of events derived from the activities of a company from the
implementation of an information system.
Event logs can be used to look at the ability of the
mining process. The first discovery is the formation of the
actual model business processes by utilizing the data from
the event logs. The second is the process of comparing the
conformance of existing models in the event log with other
business process model. Conformance checking can be used
to check that there are real events in the event log. While the
third enhancement is a process improvement models by
studying the logs event data that has been generated by the
system, where conformance checking measures the
similarity between the model and reality [2].
Rapid data growth is causing problems in the mining
process. Existing process mining techniques have problems
in reading behavior on a large event log. One approach is by
using the technique of decomposition, the decomposition
process is a method used to break up a business model of
the overall process into sub model called fragment.
Decomposition approach can generally be made by
combining the discovery process with the conformance
checking process [4].
An idea to build reusable business process fragment with
the decomposition of the overall business process models
that have a complex structure fragment into a model that
aims to be easy to understand, easy to maintain and quick
process reuse. Fragments can be reused in accordance with
the requirements of business processes as desired. Several
approaches to decompose one business process using
business process linear and not linear business process. In
the linear process of decomposition is easily done using the
activity element [8]. An atomic activity which has its own
business goal is considered as business fragment.
Furthermore, activities of succession that satisfy a specific
business need can be regrouped and considered as business
process fragments [9].
This paper will discuss the decomposition of a business
process model into multiple models fragments consisting of
the very small (atomic) called bond fragments using RPST
were then analyzed using flow control complexity metrics to
obtain fragments or variants most suitable bond fragment. In
the second section will discuss the literature study, in
section 3 will discuss the methods used and study cases,
then section 4 is the conclusion of research and section 5 is
the future work.
II. LITERATURE REVIEW
A. Petri Nets
Petri net is a graphical tool as a formal description of a
flow of activities in complex systems (using a logical
representation of the block diagram or trees). Petri net
represents a natural interaction logic between the parts or
activity in a system. A situation that can be modeled with
Petri Net is synchronization, sequentiality, concurrency and
conflict. Classical Petri Net is a graph that connected with
two types of nodes, called places and transitions. Each node
is connected with arcs. Places represented by circles and
transitions to a square [1].
2015 International Conference on Information, Communication Technology and System (ICTS)
978-1-5090-0096-8/15/$31.00 © 2015 IEEE 203