SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
TOWARDS A CONCURRENCE ANALYSIS IN
BUSINESS PROCESSES
The Seventh International Conference on Social Networks Analysis, Management and Security(SNAMS-2020)
The 4th International Workshop on Data Science Engineering and its Applications (DSEA 2020)
14-16 December, 2020
Anastasija Nikiforova, Janis Bicevskis, Girts Karnitis
Faculty of Computing, University of Latvia
Anastasija.Nikiforova@lu.lv
 Nowadays, the majority of the systems support multiple users’ simultaneous access. Any user should have a possibility to access the
system or DB without any concern regarding other users that can modify the same data at the same time.
 The most common way to solve these challenges is to block access to the DB while each request is resolved. In this way, each request is
resolved sequentially, but the operation of the system is affected significantly.
 This paper presents first steps towards a solution aimed to provide concurrent business processes analysis methodology for predicting
the probability of incorrect business process execution.
 The aim of the paper is to (a) look at approaches to describing and dealing with the execution of concurrent processes, (b) present an idea
and a preliminary version of an algorithm that detects the possibility of incorrect execution of concurrent business processes.
 Analyzing business process according to the proposed procedure allows to configure transaction processing optimally.
RATIONALE FOR THE STUDY
 There are cases when the data processing process Pi consists of several transactions {T1, T2, …, Tn}, where each transaction is
independent and has its own BEGIN TRANSACTION … COMMIT TRANSACTION block.
 Thus, there are cases when within the one transaction ACID properties are fulfilled, but processes P1, P2, …, Pn contain several steps where
each contains one or more transaction calls and does not have a common BEGIN TRANSACTION … COMMIT TRANSACTION block.
 Therefore, the transaction management algorithms used by DBMS in this situation will not be able to prevent another process Pm from
changing the data used by process Pk or reading and using intermediate results that may lead to incorrect results during the execution of
the Pk process (between Ti and Ti+1 calls).
 Why??? Such a case is possible either because of an error of programmers or because of the nature of the process, for instance, the
process is so long that it is not reasonable to keep the total/ common resource locked during the process  there are breakpoints in the
process where the shared resource is unlocked.
 It is even more difficult to analyze data processing processes, that are carried out within a number of systems, for which it is not even
possible to create a common transaction.
RATIONALE FOR THE STUDY
 The study proposes an algorithm for a business process that uses a transaction mechanism,
analysis that aims to determine the probability of incorrect concurrent execution of multiple
processes.
 Main parts:
1) a modeling language called CPL-1 (Concurrent Process Language) that uses the
transaction mechanism,
2) an algorithm that, for every two processes defined in CPL-1, determines the probability of
an incorrect execution of concurrent processes
A BRIEF OVERVIEW OF THE STUDY
 programs defined in CPL-1 can use local variables only,
 variable can store a real number,
 multiple variables can form a logical and numerical expressions,
 numeric expressions can have only add- and subtraction operations, WHY???*
 programs can use operators assigning value to variable.
*if all arithmetic operations and complex functions are allowed to be applied, the conditions of scenarios may contain inequality systems that cannot
be resolved  the nature of these operations is limited at this stage, to ensure systems to be solved are linear and easy to analyze, therefore, it is
possible to find a solution, if any, or to prove that the solution does not exist.
THE PROPOSED COMPUTING SYSTEM
processes
transactions
input data
processor
=
START PROCESS … COMMIT PROCESS
BEGIN TRANSACTION … COMMIT TRANSACTION
READ(x, R)
WRITE(x, R), which suppose read/ write of variable x value to the global resource R
IF L THEN BLOCK1 <ELSE BLOCK2> ENDIF, where block can contain one or more commands, for instance: y = EXPR(x1,
x2, .., xn), where EXPR is linear expression, x1, x2, .., xn are arguments and y – is a result.
CPL-1 does not suppose dealing with cycles* - the programme contains only paths of finite length and the number of
concurrent execution scenarios for multiple processes is also finite  for each program defined in CPL-1, the finite
scenario tree can be created where each scenario will be in the form of P1(T1>T2(a,b))>P2(T1>T2(y,z)), where a..z are
commands to be executed.
*The inability to allow cycles is due to the fact that it is not possible to create a complete test set (CTS) for programmes
containing cycles and two-way counters.
CPL-1: ALLOWED CONSTRUCTIONS
The concurrent execution of business processes that uses a transaction mechanism
is affected by the order of the execution of multiple individual transactions.
This results in two sets of process execution scenarios:
(1) concurrent (C) - a set to be analyzed,
(2) serial (S) - a set against which the first set to be analyzed.
There may be several different, but correct results - depending on the order
of execution, one of the possible correct results is achieved
a criterion for any process and any input data correctness is
the result obtained by one of the serial processes
CONCURRENT PROCESSES AND THEIR
EXECUTION CORRECTNESS
time dimension
P1
P2
time dimension
P1
P2
time dimension
P1
P2
Concurrent execution of P1 and P2
Serial execution of P1 and P2
Step I: creating a tree of
possible scenarios
Step II: executing scenarios
symbolically  defining the
feasibility conditions
Step III: comparing serial and
concurrent execution conditions and
results  identifying incorrect execution
✓the highest level of
concurrency may be
granted
!!! Incorrect execution
detected  redo the
implementation of the
business process
!!! NOT EQUAL !!!
EQUAL
THE PROPOSED ALGORITHM
Payments p1 and p2 must be made from the bank account r
(resource r). It is carried out by two processes Payment (p1, r)
and Payment (p2, r)
START PROCESS Payment(p, globalR)
BEGIN TRANSACTION T1
2 READ (x,r)
COMMIT TRANSACTION T1
BEGIN TRANSACTION T2
3 IF p<=x THEN
4 WRITE (x-p,r)
5 ENDIF
COMMIT TRANSACTION T2
END PROCESS
CPL-1: EXAMPLE
Path condition result
P1(T1>T2(3,5))=>P2(T1>T2(3,5)) (v1>r)&(v2>r) r
P1(T1>T2(3,4,5))=>P2(T1>T2(3,5)) (v1<=r)&(v2>r-v1) r-v1
P1(T1>T2(3,5))=>P2(T1>T2(3,4,5)) (v1>r)&(v2<=r) r-v2
P1(T1>T2(3,4,5))=>P2(T1>T2(3,4,5)) (v1<=r)&(v2<=r-v1) r-v1-v2
P2(T1>T2(3,5))=>P1(T1>T2(3,5)) (v1>r)&(v2>r) r
P2(T1>T2(3,4,5))=>P1(T1>T2(3,5)) (v1>r-v2)&(v2<=r) r-v2
P2(T1>T2(3,5))=>P1(T1>T2(3,4,5)) (v1<=r)&(v2>r) r-v1
P2(T1>T2(3,4,5))=>P1(T1>T2(3,4,5)) (v1<=r-v2)&(v2<=r) r-v1-v2
P1(T1)>P2(T1)=>P1(T2(3,5))>P2(T2(3,5)) (v1>r)&(v2>r) r
P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3,5)) (v1<=r)&(v2>r) r-v1
P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3,5)) (v1<=r)&(v2>r-v1) r-v1
P1(T1)>P2(T1)=>P1(T2(3,5))>P2(T2(3,4,5)) (v1>r)&(v2<=r) r-v2
P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3, 4,5)) (v1<=r)&(v2<=r-v1) r-v2
P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3,4,5)) (v1<=r)&(v2<=r) r-v2
P2(T1)>P1(T1)=>P2(T2(3,5))>P1(T2(3,5)) (v1>r)&(v2>r) r
P2(T1)>P1(T1)=>P2(T2(3,4,5))>P1(T2(3,5)) (v1>r)&(v2<=r) r-v2
P2(T1)>P1(T1)=>P2(T2(3,5))>P1(T2(3,4,5)) (v1<=r)&(v2>r) r-v1
P2(T1)>P1(T1)=>P2(T2(3,4,5))>P1(T2(3,4,5)) (v2<=r)&(v1<=r-v2) r-v1
P2(T1)>P1(T1)=>P2(T2(3,4,5))>P1(T2(3,4,5)) (v2<=r)&(v1<=r) r-v1
RESULTS
The main idea of the launched study is proposed, more precisely, to reveal the possibility that the business process is
being implemented incorrectly by detecting the incorrect execution of concurrent processes. This, in turn, is linked to the
complete test set (CTS) achieved through symbolic execution.
The main outcome is the algorithm that determines for any two programs written in the proposed process description
language CPL-1, whether incorrect concurrent execution is possible and, if possible, constructs a concurrent execution
scenario, input data, and resource values that will lead to incorrect execution of processes.
This makes it possible to determine whether it is possible to assign the highest level of concurrency, if incorrect execution
is not possible, or if such a possibility is revealed, the implementation of the business process needs to be corrected by
eliminating the risks identified.
Analyzing business processes according to the procedure described allows to configure transaction processing optimally.
FUTURE WORK
 In the future, the proposed mechanism will be extended and implemented. An automatic solution is planned to
be proposed to detect the possibility of incorrect result of concurrent execution of business processes, which
should be easily applied to relatively simple but most classical business processes.
 Despite this time the case of two concurrent processes was mainly discussed, the concurrent execution of
more than two processes is also possible. The proposed algorithm can find all possible concurrent scenarios
and parameter value conditions for an arbitrary number of processes and transactions, leading to incorrect
execution. However, depending on the number of processes, transactions, breakpoints, and the complexity of
the programs, the size of scenario tree can grow rapidly  tool to support concurrent execution analysis is
required.
THANK YOU!
For more information, see ResearchGate
See also anastasijanikiforova.com
For questions or any other queries, contact me via email - Anastasija.Nikiforova@lu.lv
Article: Nikiforova, A., Bicevskis, J., & Karnitis, G. (2020, December). Towards a Concurrence Analysis in Business Processes. In
2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS) (pp. 1-6). IEEE.

Weitere ähnliche Inhalte

Ähnlich wie Towards a Concurrence Analysis in Business Processes

Efficient failure detection and consensus at extreme-scale systems
Efficient failure detection and consensus at extreme-scale  systemsEfficient failure detection and consensus at extreme-scale  systems
Efficient failure detection and consensus at extreme-scale systems
IJECEIAES
 
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic ReasoningHybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
Hassan Rifky
 
Modeling of multiversion concurrency control
Modeling of multiversion concurrency controlModeling of multiversion concurrency control
Modeling of multiversion concurrency control
Jawid Ahmad Baktash
 

Ähnlich wie Towards a Concurrence Analysis in Business Processes (20)

Pdp12
Pdp12Pdp12
Pdp12
 
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
 
Efficient failure detection and consensus at extreme-scale systems
Efficient failure detection and consensus at extreme-scale  systemsEfficient failure detection and consensus at extreme-scale  systems
Efficient failure detection and consensus at extreme-scale systems
 
BUSINESS PROCESS MODELED WITH BPMN AND CTL MODEL CHECKING
BUSINESS PROCESS MODELED WITH BPMN AND CTL MODEL CHECKINGBUSINESS PROCESS MODELED WITH BPMN AND CTL MODEL CHECKING
BUSINESS PROCESS MODELED WITH BPMN AND CTL MODEL CHECKING
 
ml mini project (1).pptx
ml mini project (1).pptxml mini project (1).pptx
ml mini project (1).pptx
 
D017311724
D017311724D017311724
D017311724
 
An adaptive framework towards analyzing the parallel merge sort
An adaptive framework towards analyzing the parallel merge sortAn adaptive framework towards analyzing the parallel merge sort
An adaptive framework towards analyzing the parallel merge sort
 
Unraveling the mystery how to predict application performance problems
Unraveling the mystery how to predict application performance problems Unraveling the mystery how to predict application performance problems
Unraveling the mystery how to predict application performance problems
 
Process synchronizationfinal
Process synchronizationfinalProcess synchronizationfinal
Process synchronizationfinal
 
Basic principles of blind write protocol
Basic principles of blind write protocolBasic principles of blind write protocol
Basic principles of blind write protocol
 
A study of the Behavior of Floating-Point Errors
A study of the Behavior of Floating-Point ErrorsA study of the Behavior of Floating-Point Errors
A study of the Behavior of Floating-Point Errors
 
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic ReasoningHybrid Knowledge Bases for Real-Time Robotic Reasoning
Hybrid Knowledge Bases for Real-Time Robotic Reasoning
 
Visualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri netsVisualising and Analysing Dynamic Business Processes using Petri nets
Visualising and Analysing Dynamic Business Processes using Petri nets
 
From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions From Simulation to Online Gaming: the need for adaptive solutions
From Simulation to Online Gaming: the need for adaptive solutions
 
Chapter 1 Data structure.pptx
Chapter 1 Data structure.pptxChapter 1 Data structure.pptx
Chapter 1 Data structure.pptx
 
Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP
Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP
Performance Analysis of Parallel Algorithms on Multi-core System using OpenMP
 
I0343047049
I0343047049I0343047049
I0343047049
 
Modeling of multiversion concurrency control
Modeling of multiversion concurrency controlModeling of multiversion concurrency control
Modeling of multiversion concurrency control
 
Analytics for Process Excellence
Analytics for Process ExcellenceAnalytics for Process Excellence
Analytics for Process Excellence
 
All That Glitters Is Not Gold Towards Process Discovery Techniques With Guara...
All That Glitters Is Not Gold Towards Process Discovery Techniques With Guara...All That Glitters Is Not Gold Towards Process Discovery Techniques With Guara...
All That Glitters Is Not Gold Towards Process Discovery Techniques With Guara...
 

Mehr von Anastasija Nikiforova

Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...
Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...
Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...
Anastasija Nikiforova
 
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Anastasija Nikiforova
 
Putting FAIR Principles in the Context of Research Information: FAIRness for ...
Putting FAIR Principles in the Context of Research Information: FAIRness for ...Putting FAIR Principles in the Context of Research Information: FAIRness for ...
Putting FAIR Principles in the Context of Research Information: FAIRness for ...
Anastasija Nikiforova
 
Open data hackathon as a tool for increased engagement of Generation Z: to h...
Open data hackathon as a tool for increased engagement of Generation Z:  to h...Open data hackathon as a tool for increased engagement of Generation Z:  to h...
Open data hackathon as a tool for increased engagement of Generation Z: to h...
Anastasija Nikiforova
 
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Anastasija Nikiforova
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
Anastasija Nikiforova
 

Mehr von Anastasija Nikiforova (20)

Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...
Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...
Data Quality for AI or AI for Data quality: advances in Data Quality Manageme...
 
Towards High-Value Datasets determination for data-driven development: a syst...
Towards High-Value Datasets determination for data-driven development: a syst...Towards High-Value Datasets determination for data-driven development: a syst...
Towards High-Value Datasets determination for data-driven development: a syst...
 
Public data ecosystems in and for smart cities: how to make open / Big / smar...
Public data ecosystems in and for smart cities: how to make open / Big / smar...Public data ecosystems in and for smart cities: how to make open / Big / smar...
Public data ecosystems in and for smart cities: how to make open / Big / smar...
 
Artificial Intelligence for open data or open data for artificial intelligence?
Artificial Intelligence for open data or open data for artificial intelligence?Artificial Intelligence for open data or open data for artificial intelligence?
Artificial Intelligence for open data or open data for artificial intelligence?
 
Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...Overlooked aspects of data governance: workflow framework for enterprise data...
Overlooked aspects of data governance: workflow framework for enterprise data...
 
Data Quality as a prerequisite for you business success: when should I start ...
Data Quality as a prerequisite for you business success: when should I start ...Data Quality as a prerequisite for you business success: when should I start ...
Data Quality as a prerequisite for you business success: when should I start ...
 
Framework for understanding quantum computing use cases from a multidisciplin...
Framework for understanding quantum computing use cases from a multidisciplin...Framework for understanding quantum computing use cases from a multidisciplin...
Framework for understanding quantum computing use cases from a multidisciplin...
 
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
Data Lake or Data Warehouse? Data Cleaning or Data Wrangling? How to Ensure t...
 
Putting FAIR Principles in the Context of Research Information: FAIRness for ...
Putting FAIR Principles in the Context of Research Information: FAIRness for ...Putting FAIR Principles in the Context of Research Information: FAIRness for ...
Putting FAIR Principles in the Context of Research Information: FAIRness for ...
 
Open data hackathon as a tool for increased engagement of Generation Z: to h...
Open data hackathon as a tool for increased engagement of Generation Z:  to h...Open data hackathon as a tool for increased engagement of Generation Z:  to h...
Open data hackathon as a tool for increased engagement of Generation Z: to h...
 
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
Barriers to Openly Sharing Government Data: Towards an Open Data-adapted Inno...
 
Combining Data Lake and Data Wrangling for Ensuring Data Quality in CRIS
Combining Data Lake and Data Wrangling for Ensuring Data Quality in CRISCombining Data Lake and Data Wrangling for Ensuring Data Quality in CRIS
Combining Data Lake and Data Wrangling for Ensuring Data Quality in CRIS
 
The role of open data in the development of sustainable smart cities and smar...
The role of open data in the development of sustainable smart cities and smar...The role of open data in the development of sustainable smart cities and smar...
The role of open data in the development of sustainable smart cities and smar...
 
Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...Data security as a top priority in the digital world: preserve data value by ...
Data security as a top priority in the digital world: preserve data value by ...
 
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
IoTSE-based Open Database Vulnerability inspection in three Baltic Countries:...
 
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
 
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detect...
 
OPEN DATA: ECOSYSTEM, CURRENT AND FUTURE TRENDS, SUCCESS STORIES AND BARRIERS
OPEN DATA: ECOSYSTEM, CURRENT AND FUTURE TRENDS, SUCCESS STORIES AND BARRIERSOPEN DATA: ECOSYSTEM, CURRENT AND FUTURE TRENDS, SUCCESS STORIES AND BARRIERS
OPEN DATA: ECOSYSTEM, CURRENT AND FUTURE TRENDS, SUCCESS STORIES AND BARRIERS
 
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
Invited talk "Open Data as a driver of Society 5.0: how you and your scientif...
 
Towards enrichment of the open government data: a stakeholder-centered determ...
Towards enrichment of the open government data: a stakeholder-centered determ...Towards enrichment of the open government data: a stakeholder-centered determ...
Towards enrichment of the open government data: a stakeholder-centered determ...
 

Kürzlich hochgeladen

Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
ranjankumarbehera14
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
vexqp
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
wsppdmt
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
wsppdmt
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
vexqp
 

Kürzlich hochgeladen (20)

Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
怎样办理伦敦大学城市学院毕业证(CITY毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
怎样办理圣路易斯大学毕业证(SLU毕业证书)成绩单学校原版复制
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdf
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
 

Towards a Concurrence Analysis in Business Processes

  • 1. TOWARDS A CONCURRENCE ANALYSIS IN BUSINESS PROCESSES The Seventh International Conference on Social Networks Analysis, Management and Security(SNAMS-2020) The 4th International Workshop on Data Science Engineering and its Applications (DSEA 2020) 14-16 December, 2020 Anastasija Nikiforova, Janis Bicevskis, Girts Karnitis Faculty of Computing, University of Latvia Anastasija.Nikiforova@lu.lv
  • 2.  Nowadays, the majority of the systems support multiple users’ simultaneous access. Any user should have a possibility to access the system or DB without any concern regarding other users that can modify the same data at the same time.  The most common way to solve these challenges is to block access to the DB while each request is resolved. In this way, each request is resolved sequentially, but the operation of the system is affected significantly.  This paper presents first steps towards a solution aimed to provide concurrent business processes analysis methodology for predicting the probability of incorrect business process execution.  The aim of the paper is to (a) look at approaches to describing and dealing with the execution of concurrent processes, (b) present an idea and a preliminary version of an algorithm that detects the possibility of incorrect execution of concurrent business processes.  Analyzing business process according to the proposed procedure allows to configure transaction processing optimally. RATIONALE FOR THE STUDY
  • 3.  There are cases when the data processing process Pi consists of several transactions {T1, T2, …, Tn}, where each transaction is independent and has its own BEGIN TRANSACTION … COMMIT TRANSACTION block.  Thus, there are cases when within the one transaction ACID properties are fulfilled, but processes P1, P2, …, Pn contain several steps where each contains one or more transaction calls and does not have a common BEGIN TRANSACTION … COMMIT TRANSACTION block.  Therefore, the transaction management algorithms used by DBMS in this situation will not be able to prevent another process Pm from changing the data used by process Pk or reading and using intermediate results that may lead to incorrect results during the execution of the Pk process (between Ti and Ti+1 calls).  Why??? Such a case is possible either because of an error of programmers or because of the nature of the process, for instance, the process is so long that it is not reasonable to keep the total/ common resource locked during the process  there are breakpoints in the process where the shared resource is unlocked.  It is even more difficult to analyze data processing processes, that are carried out within a number of systems, for which it is not even possible to create a common transaction. RATIONALE FOR THE STUDY
  • 4.  The study proposes an algorithm for a business process that uses a transaction mechanism, analysis that aims to determine the probability of incorrect concurrent execution of multiple processes.  Main parts: 1) a modeling language called CPL-1 (Concurrent Process Language) that uses the transaction mechanism, 2) an algorithm that, for every two processes defined in CPL-1, determines the probability of an incorrect execution of concurrent processes A BRIEF OVERVIEW OF THE STUDY
  • 5.  programs defined in CPL-1 can use local variables only,  variable can store a real number,  multiple variables can form a logical and numerical expressions,  numeric expressions can have only add- and subtraction operations, WHY???*  programs can use operators assigning value to variable. *if all arithmetic operations and complex functions are allowed to be applied, the conditions of scenarios may contain inequality systems that cannot be resolved  the nature of these operations is limited at this stage, to ensure systems to be solved are linear and easy to analyze, therefore, it is possible to find a solution, if any, or to prove that the solution does not exist. THE PROPOSED COMPUTING SYSTEM processes transactions input data processor =
  • 6. START PROCESS … COMMIT PROCESS BEGIN TRANSACTION … COMMIT TRANSACTION READ(x, R) WRITE(x, R), which suppose read/ write of variable x value to the global resource R IF L THEN BLOCK1 <ELSE BLOCK2> ENDIF, where block can contain one or more commands, for instance: y = EXPR(x1, x2, .., xn), where EXPR is linear expression, x1, x2, .., xn are arguments and y – is a result. CPL-1 does not suppose dealing with cycles* - the programme contains only paths of finite length and the number of concurrent execution scenarios for multiple processes is also finite  for each program defined in CPL-1, the finite scenario tree can be created where each scenario will be in the form of P1(T1>T2(a,b))>P2(T1>T2(y,z)), where a..z are commands to be executed. *The inability to allow cycles is due to the fact that it is not possible to create a complete test set (CTS) for programmes containing cycles and two-way counters. CPL-1: ALLOWED CONSTRUCTIONS
  • 7. The concurrent execution of business processes that uses a transaction mechanism is affected by the order of the execution of multiple individual transactions. This results in two sets of process execution scenarios: (1) concurrent (C) - a set to be analyzed, (2) serial (S) - a set against which the first set to be analyzed. There may be several different, but correct results - depending on the order of execution, one of the possible correct results is achieved a criterion for any process and any input data correctness is the result obtained by one of the serial processes CONCURRENT PROCESSES AND THEIR EXECUTION CORRECTNESS time dimension P1 P2 time dimension P1 P2 time dimension P1 P2 Concurrent execution of P1 and P2 Serial execution of P1 and P2
  • 8. Step I: creating a tree of possible scenarios Step II: executing scenarios symbolically  defining the feasibility conditions Step III: comparing serial and concurrent execution conditions and results  identifying incorrect execution ✓the highest level of concurrency may be granted !!! Incorrect execution detected  redo the implementation of the business process !!! NOT EQUAL !!! EQUAL THE PROPOSED ALGORITHM
  • 9. Payments p1 and p2 must be made from the bank account r (resource r). It is carried out by two processes Payment (p1, r) and Payment (p2, r) START PROCESS Payment(p, globalR) BEGIN TRANSACTION T1 2 READ (x,r) COMMIT TRANSACTION T1 BEGIN TRANSACTION T2 3 IF p<=x THEN 4 WRITE (x-p,r) 5 ENDIF COMMIT TRANSACTION T2 END PROCESS CPL-1: EXAMPLE Path condition result P1(T1>T2(3,5))=>P2(T1>T2(3,5)) (v1>r)&(v2>r) r P1(T1>T2(3,4,5))=>P2(T1>T2(3,5)) (v1<=r)&(v2>r-v1) r-v1 P1(T1>T2(3,5))=>P2(T1>T2(3,4,5)) (v1>r)&(v2<=r) r-v2 P1(T1>T2(3,4,5))=>P2(T1>T2(3,4,5)) (v1<=r)&(v2<=r-v1) r-v1-v2 P2(T1>T2(3,5))=>P1(T1>T2(3,5)) (v1>r)&(v2>r) r P2(T1>T2(3,4,5))=>P1(T1>T2(3,5)) (v1>r-v2)&(v2<=r) r-v2 P2(T1>T2(3,5))=>P1(T1>T2(3,4,5)) (v1<=r)&(v2>r) r-v1 P2(T1>T2(3,4,5))=>P1(T1>T2(3,4,5)) (v1<=r-v2)&(v2<=r) r-v1-v2 P1(T1)>P2(T1)=>P1(T2(3,5))>P2(T2(3,5)) (v1>r)&(v2>r) r P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3,5)) (v1<=r)&(v2>r) r-v1 P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3,5)) (v1<=r)&(v2>r-v1) r-v1 P1(T1)>P2(T1)=>P1(T2(3,5))>P2(T2(3,4,5)) (v1>r)&(v2<=r) r-v2 P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3, 4,5)) (v1<=r)&(v2<=r-v1) r-v2 P1(T1)>P2(T1)=>P1(T2(3,4,5))>P2(T2(3,4,5)) (v1<=r)&(v2<=r) r-v2 P2(T1)>P1(T1)=>P2(T2(3,5))>P1(T2(3,5)) (v1>r)&(v2>r) r P2(T1)>P1(T1)=>P2(T2(3,4,5))>P1(T2(3,5)) (v1>r)&(v2<=r) r-v2 P2(T1)>P1(T1)=>P2(T2(3,5))>P1(T2(3,4,5)) (v1<=r)&(v2>r) r-v1 P2(T1)>P1(T1)=>P2(T2(3,4,5))>P1(T2(3,4,5)) (v2<=r)&(v1<=r-v2) r-v1 P2(T1)>P1(T1)=>P2(T2(3,4,5))>P1(T2(3,4,5)) (v2<=r)&(v1<=r) r-v1
  • 10. RESULTS The main idea of the launched study is proposed, more precisely, to reveal the possibility that the business process is being implemented incorrectly by detecting the incorrect execution of concurrent processes. This, in turn, is linked to the complete test set (CTS) achieved through symbolic execution. The main outcome is the algorithm that determines for any two programs written in the proposed process description language CPL-1, whether incorrect concurrent execution is possible and, if possible, constructs a concurrent execution scenario, input data, and resource values that will lead to incorrect execution of processes. This makes it possible to determine whether it is possible to assign the highest level of concurrency, if incorrect execution is not possible, or if such a possibility is revealed, the implementation of the business process needs to be corrected by eliminating the risks identified. Analyzing business processes according to the procedure described allows to configure transaction processing optimally.
  • 11. FUTURE WORK  In the future, the proposed mechanism will be extended and implemented. An automatic solution is planned to be proposed to detect the possibility of incorrect result of concurrent execution of business processes, which should be easily applied to relatively simple but most classical business processes.  Despite this time the case of two concurrent processes was mainly discussed, the concurrent execution of more than two processes is also possible. The proposed algorithm can find all possible concurrent scenarios and parameter value conditions for an arbitrary number of processes and transactions, leading to incorrect execution. However, depending on the number of processes, transactions, breakpoints, and the complexity of the programs, the size of scenario tree can grow rapidly  tool to support concurrent execution analysis is required.
  • 12. THANK YOU! For more information, see ResearchGate See also anastasijanikiforova.com For questions or any other queries, contact me via email - Anastasija.Nikiforova@lu.lv Article: Nikiforova, A., Bicevskis, J., & Karnitis, G. (2020, December). Towards a Concurrence Analysis in Business Processes. In 2020 Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS) (pp. 1-6). IEEE.