VNU Journal of Science: Earth and Environmental Sciences, 2017
Tóm tắt: Biến đổi khí hậu và nước biển dâng đang ngày càng làm trầm trọng hơn tình trạng xâm nhập... more Tóm tắt: Biến đổi khí hậu và nước biển dâng đang ngày càng làm trầm trọng hơn tình trạng xâm nhập mặn tại các khu vực đồng bằng ven biển. Xâm nhập mặn ảnh hưởng đến cơ sở hạ tầng, kinh tế, xã hội, sinh kế và đời sống dân cư địa phương. Trên cơ sở phương pháp đánh giá tính dễ bị tổn thương của IPCC-UNESCO IHE, nghiên cứu này tập trung làm rõ khả năng dễ bị tổn thương ở cấp độ phường, xã trên địa bàn thành phố Đà Nẵng do nhiễm mặn. Khả năng dễ bị tổn thương được đánh giá thông qua ba thành phần là mức độ phơi bày, mức độ nhạy cảm và năng lực thích ứng, dựa trên 5 hợp phần: kinh tế, xã hội, điều kiện tự nhiên - môi trường - sinh thái, cơ sở hạ tầng và quản trị đô thị. Kết quả nghiên cứu cho thấy khả năng dễ bị tổn thương do nhiễm mặn ở Đà Nẵng cao nhất thuộc về hai xã Hòa Quý và Hòa Xuân; 11 phường, xã được xếp vào nhóm có tính dễ bị tổn thương cao; 21 phường, xã có tính dễ bị tổn thương trung bình; 22 phường, xã được xếp vào nhóm tổn thương thấp.
DOI to the publisher's website. • The final author version and the galley proof are versions of t... more DOI to the publisher's website. • The final author version and the galley proof are versions of the publication after peer review. • The final published version features the final layout of the paper including the volume, issue and page numbers. Link to publication General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal. If the publication is distributed under the terms of Article 25fa of the Dutch Copyright Act, indicated by the "Taverne" license above, please follow below link for the End User Agreement:
Process mining offers methods and techniques for capturing process behaviour from log data of pas... more Process mining offers methods and techniques for capturing process behaviour from log data of past process executions. Although many promising approaches on mining the control flow have been published, no attempt has been made to mine the staff assignment situation of business processes. In this paper, we introduce the problem of mining staff assignment rules using history data and organisational information (e.g., an organisational model) as input. We show that this task can be considered an inductive learning problem and adapt a decision tree learning approach to derive staff assignment rules. In contrast to rules acquired by traditional techniques (e.g., questionnaires) the thus derived rules are objective and show the staff assignment situation at hand. Therefore, they can help to better understand the process. Moreover, the rules can be used as input for further analysis, e.g., workload balance analysis or delta analysis. This paper presents the current state of our work and points out some challenges for future research.
The device comprises two speed reduction gears with coaxial shafts and a fixed support interposed... more The device comprises two speed reduction gears with coaxial shafts and a fixed support interposed between the reduction gears and housing a first hollow shaft coaxial to the shafts of the gears and in which there is rotatably housed a second independent shaft coaxial to the shafts of the gears. Two pulleys are rotatably mounted on the first hollow shaft and are rigid with toothed flanges which engage frontally in internally splined tubular elements within which sleeves are slidable coaxially but externally to the two shafts. The sleeves are engageable with the shafts and with the tubular elements.
Existing process mining approaches are able to tolerate a certain degree of noise in the process ... more Existing process mining approaches are able to tolerate a certain degree of noise in the process log. However, processes that contain infrequent paths, multiple (nested) parallel branches, or have been changed in an ad-hoc manner, still pose major challenges. For such cases, process mining typically returns "spaghetti-models", that are hardly usable even as a starting point for process (re-)design. In this paper, we address these challenges by introducing data transformation and pre-processing steps that improve and ensure the quality of mined models for existing process mining approaches. We propose the concept of semantic log purging, the cleaning of logs based on domain specific constraints utilizing semantic knowledge which typically complements processes. Furthermore we demonstrate the feasibility and effectiveness of the approach based on a case study in the higher education domain. We think that semantic log purging will enable process mining to yield better results, thus giving process (re-)designers a valuable tool.
Driven by recent trends, effective compliance control has become a crucial success factor for com... more Driven by recent trends, effective compliance control has become a crucial success factor for companies nowadays. In this context, compliance monitoring is considered an important building block to support business process compliance. Key to the practical application of a monitoring framework will be its ability to reveal and pinpoint violations of imposed compliance rules that occur during process execution. In this context, we propose a compliance monitoring framework that tackles three major challenges. As a compliance rule can become activated multiple times within a process execution, monitoring only its overall enforcement can be insufficient to assess and deal with compliance violations. Therefore, our approach enables to monitor each activation of a compliance rule individually. In case of violations, we are able to derive the particular root cause, which is helpful to apply specific remedy strategies. Even if a rule activation is not yet violated, the framework can provide assistance in proactively enforcing compliance by deriving measures to render the rule activation satisfied.
Lecture Notes in Business Information Processing, 2012
Organizations often have to deal with large collections of business process models and compliance... more Organizations often have to deal with large collections of business process models and compliance rules. Particular challenges in this context are compliance checks, consistency checks, and the maintenance of the process and rule repositories. In case that a-priory knowledge about dependencies within the process base and the rule base is not available, compliance checking must be performed by verifying all rules for each process, which turns out to be very costly in a context of large process and rule repositories. In this paper we present activityoriented clustering techniques for efficient compliance checking which are particularly applicable in process and rule repositories where no a-priori clustering is considered. Further it is shown how the proposed clustering techniques influence the complexity of consistency checks. Finally, qualitative and quantitative aspects of the presented clustering techniques are discussed. The techniques provide a first step to effective and efficient management of large business process and compliance rule repositories.
Lecture Notes in Business Information Processing, 2011
In the light of an increasing demand on business process compliance, the verification of process ... more In the light of an increasing demand on business process compliance, the verification of process models against compliance rules has become essential in enterprise computing. The SeaFlows Toolset featured in this paper extends process-aware information systems with compliance checking functionality. It provides a user-friendly environment for modeling compliance rules using a graph-based formalism and for enriching process models with these rules. To address a multitude of verification settings, we provide two complementary compliance checking approaches: The structural compliance checking approach derives structural criteria from compliance rules and applies them to detect incompliance. The data-aware behavioral compliance checking approach addresses the state explosion problem that can occur when the data dimension is explored during compliance checking. It performs context-sensitive automatic abstraction to derive an abstract process model which is more compact with regard to the data dimension enabling more efficient compliance checking. Altogether, SeaFlows Toolset constitutes a comprehensive and extensible framework for compliance checking of process models.
For enterprises it has become crucial to check compliance of their business processes with certai... more For enterprises it has become crucial to check compliance of their business processes with certain rules such as medical guidelines or financial regulations. When automating compliance checks on process models, existing approaches have mainly addressed process-specific compliance rules so far, i.e., rules that correspond to a particular process model. However, in practice, we will rather find process-independent compliance rules that are nevertheless to be checked over process models. Thus, in this paper, we present an approach that enables the instantiation and verification of process-independent compliance rules over process models using domain models. For this, we provide an intuitive visualization of compliance rules and compliance rule instances at user level and show how rules and instances can be formalized and verified at system level. The overall approach is validated by a pattern-based comparison to existing approaches and by means of a prototypical implementation. This work was done within the SeaFlows project, which is funded by the German Research Foundation (DFG).
In the light of an increasing demand on business process compliance, the verication of process mo... more In the light of an increasing demand on business process compliance, the verication of process models against compliance rules has become essential in enterprise computing. To be broadly applicable compliance checking has to support data-aware compliance rules as well as to consider data conditions within a process model. Independently of the actual technique applied to accomplish compliance checking, dataawareness means that in addition to the control ow dimension, the data dimension has to be explored during compliance checking. However, naive exploration of the data dimension can lead to state explosion. We address this issue by introducing an abstraction approach in this paper. We show how state explosion can be avoided by conducting compliance checking for an abstract process model and abstract compliance rules. Our abstraction approach can serve as preprocessing step to the actual compliance checking and provides the basis for more ecient application of existing compliance checking algorithms.
2013 17th IEEE International Enterprise Distributed Object Computing Conference, 2013
To support the whole business process compliance lifecycle, one also needs to monitor the actual ... more To support the whole business process compliance lifecycle, one also needs to monitor the actual processes and not just check their design. Recently, many approaches have been proposed that utilize a broad range of constraint languages and techniques to realize compliance monitoring solutions. Due to this diversity, the comparison of existing approaches is difficult and consequently hampers the evaluation of which approaches are suitable for which application scenarios. This paper provides a framework to compare and evaluate existing compliance monitoring approaches. The framework is based on ten typical Compliance Monitoring Functionalities (CMFs). These have been derived using a systematic literature review and five case studies from different domains. Existing approaches are evaluated based on the CMF framework, resulting in a list of open questions and a discussion of new challenges in this field.
Key to broad use of process management systems (PrMS) in practice is their ability to foster and ... more Key to broad use of process management systems (PrMS) in practice is their ability to foster and ease the implementation, execution, monitoring, and adaptation of business processes while still being able to ensure robust and error-free process enactment. To meet these demands a variety of mechanisms has been developed to prevent errors at the structural level (e.g., deadlocks). In many application domains, however, processes often have to comply with business level rules and policies (i.e., semantic constraints) as well. Hence, to ensure error-free executions at the semantic level, PrMS need certain control mechanisms for validating and ensuring the compliance with semantic constraints. In this paper, we discuss fundamental requirements for a comprehensive support of semantic constraints in PrMS.
Adaptivity in process management systems is key to their successful applicability in practice. Ap... more Adaptivity in process management systems is key to their successful applicability in practice. Approaches have been already developed to ensure system correctness after arbitrary process changes at the syntactical level (e.g., avoiding inconsistencies such as deadlocks or missing input parameters after a process change). However, errors may be still caused at the semantical level (e.g., violation of business rules). Therefore, the integration and verification of domain knowledge will flag a milestone in the development of adaptive process management technology. In this paper, we introduce a framework for defining semantic constraints over processes in such a way that they can express real-world domain knowledge on the one hand and are still manageable concerning the effort for maintenance and semantic process verification on the other hand. This can be used to detect semantic conflicts (e.g., drug incompatibilities) when modeling process templates, applying ad hoc changes at process instance level, and propagating process template modifications to already running process instances, even if they have been already individually modified themselves; i.e., we present techniques to ensure semantic correctness for single and concurrent changes which are, in addition, minimal regarding the set of semantic constraints to be checked. Together with further optimizations of the semantic checks based on certain process meta model properties this allows for efficiently verifying processes. Altogether, the framework presented in this paper provides the basis for process management systems which are adaptive and semantic-aware at the same time.
An erster Stelle danke ich Stefanie Rinderle und Manfred Reichert dafür, dass sie die sicherlich ... more An erster Stelle danke ich Stefanie Rinderle und Manfred Reichert dafür, dass sie die sicherlich nicht einfache Aufgabe der Betreuung meiner Diplomarbeitübernommen haben. Auch für die Zusammenarbeit zur raschen Fertigstellung des Papers bin ich ihnen sehr dankbar. Meinen Eltern, Thi Lam Huong Pham und Hoang Khoi Ly, danke ich für ihre Unterstützung während meiner ganzen Studienzeit. Mein besonderer Dank geht an meinen Freund, Kevin Göser, der mir immer zur Seite stand.
The 4th International Workshop on Technologies for Context-Aware Business Process Management (TCoB 2009) within the Proceedings Joint Workshop on Advanced Technologies and Techniques for Enterprise Information Systems
Uploads
Papers by thao ly