Exception handling in workflow systems
BIEE_常见问题解答
Oracle Business Intelligence Enterprise Edition 10g项目实施问题解答汇总2008年4月10日目录:仪表板: (4)仪表板分组下拉显示: (4)设置默认的仪表板: (7)撤销页面“刷新“按钮(不建议) (8)如何跳过注销页面,直接跳转到登陆界面 (9)交叉表行数限制 (9)报表显示上的列级别控制 (10)报表中现实自己有权限访问的第一个列 (10)登录界面“版权所有“信息客户化 (10)仪表盘顺序定制 (10)时间细度不一样 (11)Prompt值显示的顺序定制: (11)表格下的“125-”是1到25条记录的显示方式,需要改成“1-25”(附图) (11)查询大数量时,出现等待提示,可以在下面修改 (12)Dashboard中钻取返回提示修改: (12)友好打印PDF中的空格 (12)Answer中的主题文件夹层次现实: (13)Excel下载如果不自动变成科学计数法: (13)如何强制Answer中列的宽度 (13)个性化汇总查询: (14)在仪表板上加入当前client日期显示: (15)在Answer的Titel中加入变量显示: (15)客户化仪表盘右上角的产品清单,如去除等多产品中的Marketing (16)在仪表板制定位置显示Deliver的内容 (16)OBI EE and oracle stored procedures WITH parameter passing (16)如何将Go URL中的“页选项”按钮去除 (18)Configuration for the Dashboard Prompt Types Feature (19)图形: (21)中文显示方块问题 (21)BIEE中雷达图中文显示问题: (21)图形鼠标点到的地方的值的背景希望是透明的: (21)BIPublisher Chart Description (21)图形出现“Evaluation Time Limit“ (22)指定BIEE中图形的类型(flash,SVG,PNG) (22)图形中“上”字,“名”字和“作”字的链接错误 (22)配置和服务 (24)几处配置文件的作用优先级别 (24)禁止OC4J自动启动 (24)如何在Office 2003中启用BIEE Excel Add-in (24)BIP (25)BI Publisher 和Oracle BI Server 的安全集成 (25)报表复制 (27)RDF to RTF Template Generator (27)RDF to Data Template Generator (27)其他 (27)修改BIEE中的用户密码 (27)BIEE和其他应用集成,如果出现频繁登录提示: (32)Metadata report (32)Oracle BIEE性能提高 (33)使用BIP和iBot中的外部认证 (33)BIEE 10.1.3.2中ibot的配置: (34)其他Web程序调用BIEE的报表方式: (34)其他Web程序调用BIEE的仪表板方式: (35)Customizing OBI EE – GO URL Parameters (36)从BIEE的报表链接到其他系统: (39)Writeback for dashboard commentary in OBI EE (40)Siebel Analytics Web Catalog 升级到Oracle BIEE Presentation Catalog (46)How To Log An Oracle Support Service Request Via SupportWeb for Oracle BusinessIntelligence Enterprise Edition (OBIEE) (49)Applies to: (49)Goal (49)Create SR for BIEE from metalink: (51)仪表板:仪表板分组下拉显示:1.配置instanceconfig.xml,加入<DahboardMaxBeforeMenu>的配置,然后重启BI presentation server.数字3表示,当一个组的仪表板数量大于等于3时,会将仪表板分组下拉显示。
人简 历 吴维刚 - z 个人信息
吴维刚z个人信息姓名:吴维刚性别:男职位:讲师通讯地址:中山大学信息科学与技术学院计算机系, 广州市新港西路135号 (510275) E-mail: wuweig@个人主页:.hk/~cswgwu/z教育背景2007 博士,计算机科学,香港理工大学电子计算学系,导师:曹建农教授。
论文题目:移动无线环境下的分布式协同(英文)英文题目:Distributed Coordination in Mobile Wireless Environments2003 硕士,计算机软件与理论,西安交通大学计算机科学与技术系,导师:董小社教授。
论文题目:单一系统映象的机群管理软件的设计与实现。
1998 学士,材料科学与工程(主修),计算机应用(辅修),西安交通大学。
z研究方向移动计算,无线网络,分布式算法,容错系统,数据一致性。
z研究项目序号题目课题来源经费起止时间任务1 无线网状网络环境下的数据缓存机制和算法中山大学“百人计划” 10万 2008.9-2010.9 主持人2 无线网状网络中的缓存放置与一致性研究广东省自然科学基金 3万 2008.10-2010.10 主持人3 无线网状网络环境下的合作缓存关键技术研究国家自然科学基金 20万 2009.1-2011.12 主持人4 无基础设施的无线网络中的数据缓存机制研究教育部博士点基金 3.6万2009.1-2011.12 主持人z教学经历2009主讲课程:程序设计基础、程序设计实验2004-2006 助教课程:操作系统、计算机组成原理、系统编程等z荣誉与奖项2008.2 中山大学“百人计划”引进人才z学术活动国际会议TPCEUC’09, EUC’08, ICCCN’08, NIMC’08, CODS’07, MSN’07论文评审期刊IEEE TC, IEEE TMC, JPDC, PMC会议ICDCS’08, MDM’08, ICPP’08, ICC’08DSN’07, PerCom’07, ICC’07, CCGrid07, AINA’07;ICDCS’06, PerCom’06, IPDPS’06;DSN’05, SRDS’05, ICCCN’05, Globecom’05.会议组织2005The 6th Int’l Workshop on Advanced Parallel Processing Technologies (APPT'05)2004The 2nd Int’l Symposium on Parallel and Distributed Processing and Applications (ISPA'04)z学术论文期刊论文:1.Weigang Wu, Jiannong Cao, Michel Raynal, Eventual Clusterer: a Modular Approach to DesigningHierarchical Consensus Protocols in MANETs, IEEE Transactions on Parallel and DistributedSystems (TPDS), 20(6), pp. 753-765, June 20092.Jin Yang, Jiannong Cao, Weigang Wu, Chengzhong Xu, Efficient Algorithms for Fault TolerantMobile Agent Execution, International Journal of High Performance Computing andNetworking(IJHPCN), 6(2), pp. 106-118, 20093.Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal, Using Asynchrony and Zero Degradation toSpeed up Indulgent Consensus Protocols, Journal of Parallel and Distributed Computing (JPDC),Elsevier, 68(7), Jul. 2008, pp. 984-996.4.Jin Yang, Jiannong Cao, Weigang Wu, Efficient Global Checkpointing Algorithms for MobileAgents, Concurrency and Computation: Practice and Experience, John Wiley & Sons, 20(7), May.2008, pp. 825-838.5.Weigang Wu, Jiannong Cao, Jin Yang, A Fault Tolerant Mutual Exclusion Algorithm for Mobile AdHoc Networks, Pervasive and Mobile Computing (PMC), Elsevier, 4(1), February 2008, pp. 139-160.6.Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal, Design and Performance Evaluation ofEfficient Consensus Protocols for Mobile Ad Hoc Networks, IEEE Transactions on Computers (TC),56(8), Aug. 2007, pp. 1055-1070.会议论文:1.Xiaopeng Fan, Jiannong Cao, Weigang Wu, Contention-Aware Data Caching in Wireless Multi-hopAd Hoc Networks, 6th IEEE International Conference on Mobile Ad-hoc and SensorSystems(MASS’09), October 12 - 15, 2009, Macau2.Weigang Wu, Jiannon Cao, Xiaopeng Fan, Overhearing-aided Data Caching in Wireless Ad HocNetworks, 6th IEEE ICDCS International Workshop on Wireless Ad hoc and SensorNetworks (WWASN’09). June 22-26, 2009 Montreal, Canada3.Jiannong Cao, Kun Xie, Weigang Wu, Chuda Liu, et al., HAWK: Real-world Implementation ofHigh-performance Heterogeneous Wireless Network for Internet Access, 1st ICDCS International Workshop on Next Generation Network Architectures (NGNA’09), June 22-26, 2009Montreal, Canada.4.Ye Yan, Jiannong Cao, Chuda Liu, SeongWoo Kim, Weigang Wu, A Dual Re-authenticationScheme for Fast Handoff in IEEE 802.11 Wireless Mesh Networks, IEEE Wireless Communications and Networking Conference (WCNC’09), April 4 – 8, 2009. Budapest, Hungary.5.Xiaopeng Fan, Jiannong Cao, Weigang Wu, Hui Cheng, Modeling Hierarchical Gossiping inReliable Multicast Protocols, Proc. The 2nd International Conference on Future Generation Communication and Networking(FGCN’08), December 2008, Sanya, Hainan Island, China.6.Xiaopeng Fan, Jiannong Cao, Weigang Wu, Michel Raynal, On Modeling Fault Tolerance ofGossip-Based Reliable Multicast Protocols, Proc. of the 37th International Conference on Parallel Processing (ICPP’08), Portland, USA, Sep. 8 – 12 2008.7.Vaskar Raychoudhury, Jiannong Cao, Weigang Wu, Top K-leader Election in Wireless Ad HocNetworks, Proc. of the 17th International Conference on Computer Communication Networks (ICCCN'08), St. Thomas, US Virgin Islands, August 4-7, 2008.8.Jiannong Cao, Corentin Travers, Michel Raynal, Weigang Wu, The Eventual Leadership inDynamic Mobile Networking Environments, Proc. of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'07), Melbourne, Australia, December 17-19, 2007. 9.Weigang Wu, Jiannong Cao, Michel Raynal, A Dual-Token-based Fault Tolerant Mutual ExclusionAlgorithm for MANETs, Proc. of the 3rd International Conference on Mobile Ad-hoc and Sensor Networks (MSN’07), Beijing, China,12-14 December 2007.10.Weigang Wu, Jiannong Cao, Michel Raynal, The Eventual Clusterer Oracle and Its Application toConsensus in MANETs, Proc. of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS’07), Beijing China, Oct. 10-12, 2007.11.Jiannong Cao, Miaomiao Wang, Weigang Wu, Xianbing Wang, Stephen C.F. Chan, A GenericDistributed Monitor Construct for Programming Process Synchronization in Distributed Systems, Proc. of the5th International Symposium on Parallel and Distributed Processing and Applications (ISPA’07), Niagara Falls, Canada, Aug. 29-31, 200712.Jin Yang, Jiannong Cao, Weigang Wu, An Integrated Approach to Checkpointing in Mobile AgentSystems, Proc. of the 2nd International Conference on Semantics, Knowledge and Grid (SKG’06), Guilin, China, Nov. 1-3, 200613.Jin Yang, Jiannong Cao, Weigang Wu, Checkpoint Placement Algorithms for Mobile Agent System,Proc. of the5th International Conference on Grid and Cooperative Computing (GCC’06), Changsha, China, Oct. 21-23, 2006.14.Jiannong Cao, Michel Raynal, Xianbing Wang, Weigang Wu,The Power and Limit of AddingSynchronization Messages for Synchronous Agreement, Proc. of the 35th International Conference on Parallel Processing (ICPP’06), Columbus, USA, Aug. 14-18, 2006.15.Jin Yang, Jiannong Cao, Weigang Wu, Corentin Travers The Notification based Approach forImplementation Failure Detector, Proc. of the1st International Conference on Scalable Information System (InfoScale’06) , Hong Kong, May 29-Jun. 1, 2006.16.Weigang Wu, Jiannong Cao, Jin Yang, Michel Raynal, A Hierarchical Consensus Protocol forMobile Ad Hoc Networks, Proc. of the14th Euromicro Conference on Parallel, Distributed and Network based Processing (PDP’06), Montbéliard, France, Feb. 15~17, 2006.17.Jin Yang, Jiannong Cao, Weigang Wu, Chengzhong Xu, A Framework for Transactional MobileAgent Execution, Proc. of the4th International Conference on Grid and Cooperative Computing (GCC’05), Beijing, China, Nov. 30-Dec. 3, 2005.18.Jiannong Cao, Jin Yang, Weigang Wu, Chengzhong Xu, Exception Handling in DistributedWorkflow Systems Using Mobile Agents, Proc. of the IEEE International Conference on E-Business Engineering (ICEBE’05), Beijing, China, Oct. 18-20, 2005.19.Weigang Wu, Jiannong Cao, Jin Yang, A Scalable Mutual Exclusion Algorithm for Mobile Ad HocNetworks, Proc. of the14th International Conference on Computer Communications and Networks (ICCCN’05), San Diego, USA, Oct. 17-19, 2005.20.Jin Yang, Jiannong Cao, Weigang Wu, Chengzhong Xu, Parallel Algorithms for Fault-TolerantMobile Agent Execution, Proc. of the6th International Conference on Algorithms and Architectures(ICA3PP’05), Melbourne, Australia, Oct. 2-5, 2005.。
仓库工作流程 英文
仓库工作流程英文Warehouse WorkflowManaging a warehouse is a complex and multifaceted task that requires a well-organized and efficient workflow. Warehouse operations involve the coordination of various activities, from receiving goods to shipping them out, to ensure the smooth flow of inventory. In this essay, we will explore the key components of a warehouse workflow and how they contribute to the overall efficiency of the operation.Receiving Goods: The first step in the warehouse workflow is the receiving of goods. This process involves unloading and inspecting incoming shipments to ensure that the items match the order and are in good condition. Proper receiving procedures are crucial to maintaining accurate inventory records and identifying any discrepancies or damaged goods. Efficient receiving processes can help minimize delays and ensure that the warehouse is stocked with the necessary items to meet customer demands.Storage and Inventory Management: Once the goods have been received, they need to be stored in a systematic manner to facilitateeasy retrieval and organization. Warehouses often utilize various storage solutions, such as shelves, racks, or specialized storage systems, to maximize the use of available space. Effective inventory management practices, such as the use of barcodes or RFID technology, can help track the location and quantity of each item in the warehouse. This information is essential for maintaining accurate records, preventing stockouts, and ensuring that the right products are available when needed.Order Picking and Fulfillment: When a customer places an order, the warehouse must efficiently locate and retrieve the requested items. This process, known as order picking, is a critical component of the warehouse workflow. Warehouse staff may use manual methods, such as walking through the aisles and collecting the items, or utilize technology-based solutions, such as automated picking systems or pick-to-light systems, to streamline the process. Efficient order picking not only enhances customer satisfaction by ensuring timely deliveries but also reduces the risk of order errors.Packing and Shipping: After the items have been picked, they need to be properly packed and prepared for shipment. This may involve activities such as weighing the packages, applying shipping labels, and ensuring that fragile or perishable items are handled with care. Effective packing and shipping processes help minimize damage during transit and ensure that the goods arrive at the customer'slocation in good condition.Documentation and Reporting: Alongside the physical handling of goods, the warehouse workflow also involves extensive documentation and reporting. This includes maintaining accurate records of all incoming and outgoing shipments, tracking inventory levels, and generating reports for management and external stakeholders. Proper documentation and reporting help ensure compliance with industry regulations, support decision-making, and provide valuable insights into the warehouse's performance.Technology Integration: In modern warehouses, the integration of technology has become increasingly important to enhance workflow efficiency. Automation, such as the use of robotic systems or conveyor belts, can streamline material handling and reduce the risk of human error. Additionally, warehouse management systems (WMS) and other software solutions can help manage inventory, optimize picking and packing processes, and provide real-time data on warehouse operations.Continuous Improvement: Maintaining an efficient warehouse workflow requires ongoing efforts to identify and address areas for improvement. This may involve implementing lean manufacturing principles, conducting regular audits, and seeking feedback from warehouse staff and customers. By continuously evaluating andrefining the warehouse workflow, organizations can adapt to changing business needs, improve overall productivity, and deliver a superior customer experience.In conclusion, the warehouse workflow is a complex but essential component of an effective supply chain. By focusing on the key elements of receiving, storage, order fulfillment, packing, and documentation, while leveraging technology and continuously improving processes, organizations can create a well-organized and efficient warehouse operation that supports their business goals and meets the demands of their customers.。
简述机器人搬运工作站的主要工作流程
英文回答:Workstation robotic processes include three important steps:material receipt, handling and material placement。
Once the material arrives at the workstation, the robot can sense and identify through the sensor。
On the basis of pre—set removal paths and destinations, robots will plan the best removal routes and movements。
During handling, robots are able to accurately capture and hold materials to ensure accuracy and stability of handling。
The robots place the material at their destination andplete the handling in preparation for the next round of work。
工作站机器人的操作流程包括物料接收、搬运操作和物料放置三个重要步骤。
一旦物料到达工作站,机器人即可通过传感器感知并进行识别和确认。
依据预设的搬运路径和目的地,机器人将规划最佳的搬运路线和动作。
在搬运过程中,机器人能够准确地抓取和托举物料,确保搬运的准确性和稳定性。
机器人将物料放置到目的地,并完成搬运操作,为下一轮工作做好准备。
In logistics processing, robots have to see the materialing through the camera and rely on sensors to detect the material。
Work coordination, workflow, and workarounds in a medical context
Work Coordination, Workflow, and Workarounds in aMedical ContextMarina Kobayashi, Susan R. Fussell Human Computer Interaction Institute Carnegie Mellon University5000 Forbes AvenuePittsburgh, PA 15213 USA {marinak, sfussell}@Yan Xiao, F. Jacob Seagull Human Factors & Technology Research University of Maryland School of MedicineBaltimore, MD USA{yxiao, jseag001}@ABSTRACTIn this paper we report an ethnographic study of workarounds—informal temporary practices for handling exceptions to normal workflow—in a hospital environment. Workarounds are a common technique for dealing with the inherent uncertainty of dynamic work environments. Workarounds can help coordinate work, especially under conditions of high time pressure, but they may result in information or work protocols that are unstable, unavailable, or unreliable. We investigated workarounds and their effects through observation and interviews in a major teaching medical center. Our results suggest 4 key features of workarounds that technologies might help address: (a) workarounds differ as a function of people’s role; (b) workarounds draw on tacit knowledge of others’ abilities and willingness to help; (c) workarounds can have a cascading effect, causing other workarounds down the line; (d) workarounds often rely on principles of fairness and who owes whom a favor. We provide recommendations for designing systems to better support workarounds in dynamic environments.Author KeywordsWorkarounds, problem-solving, breakdowns, modeling, workflow, coordination, social cognition, awareness, transactive memory, computer-supported collaborative work, CSCWACM Classification KeywordsH.5.3 Group and Organization Interfaces - Computer-supported cooperative work, Evaluation/methodology, Synchronous interaction, Theory and models INTRODUCTIONProviding safe, timely, assistance to medical patients requires optimal coordination of staff, resources, equipment, schedules, and tasks. In operating room (OR) suites, this is a difficult task because the workload is constantly changing. The arrival of new cases and changes in the criticalness of existing cases often necessitates last-minute juggling of OR and personnel schedules. To cope with the unexpected events that arise in these complex, dynamic conditions, medical personnel formulate workarounds—informal temporary practices for handling exceptions to normal workflow. For example, if an emergent case comes in when all the operating rooms are booked, the staff might perform the operation in the Trauma Resuscitation Unit, which is actually an admitting area. Although workarounds are common in medical settings [e.g., [1], [7]], little research has attempted to characterize properties of workarounds that might influence their effectiveness. By describing short-term benefits of workarounds (providing temporary fixes to potentially life-threatening problems), investigators may overlook longer-term differences in how workarounds impact a medical organization. Successful workarounds can provide organizational solutions for exceptions that recur, thereby reducing the cognitive effort required to deal with each new emergency. Unsuccessful workarounds, however, may lead to widespread instability in an organization. A deeper understanding of what features lead to successful versus unsuccessful workarounds can help us design tools to facilitate the handling of exceptions.In this paper, we use ethnographic and modeling techniques to identify how and where workarounds occur in a university trauma surgical suite. We first discuss related research on coordination of medical work. We then describe data we collected in a shock trauma center. We use workflow modeling to characterize the dimensions of work coordination activity in a shock trauma center. Based on the workarounds we found in this setting, we propose several design guidelines for new technology to assist medical personnel in their handling of workflow breakdowns. PREVIOUS RESEARCHA number of previous investigators have studied how medical workers coordinate their activities in time-critical contexts such as the OR [e.g., [1], [4], [8]]. Several lines ofCopyright is held by the author/owner(s).CHI 2005, April 2–7, 2005, Portland, Oregon, USA. ACM 1-59593-002-7/05/0004.research provide insights into the nature of workarounds in medical settings.First, dynamic artifacts, such as the large whiteboards used to display OR status, have been shown to play an important role in the moment-to-moment coordination of medical work by helping workers keep abreast of ongoing exceptions and problems [e.g., [1], [5], [8]]. However, many key artifacts leave no lasting body of knowledge. As a result, there is a lack of organizational memory for workarounds and their effectiveness.Second, despite the omnipresence of cognitive artifacts in the OR, much coordination takes place informally, through conversational and observation, rather than through information systems [e.g., [6], [8]]. Charge nurses and anesthesiologists balance the effort required to gather information against the value of accurate information by performing optimal sampling. [[9]]. This suggests that in many cases, workarounds are devised under situations of incomplete information.Third, there are limitations in how quickly information is distributed across different hospital locations, even when it is formally embedded in information systems [[3]]. Again, this suggests that workarounds may be performed without full access to the pertinent information.Fourth, problems in the specification of workflow patterns and the extent to which workflows can handle exceptions also have implications for the types of workarounds devised by personnel and the success of these workarounds [[3]]. For example, static assignments of personnel to roles can create problems when extra help is needed in an emergency. Finally, observational research on nurses’ problem-solving strategies indicates that in the majority of cases, they deal only with the immediate problem rather than addressing its source [[7]]. Attempts to alter the system in order to deal with the root cause occur much more rarely. This suggests that medical organizations have problems developing lasting solutions to workflow breakdowns.CURRENT STUDYThe present study builds on previous work by looking more closely at workarounds and their effects in medical collaboration. We use a combination of observational and interview methods to collect data on hospital workers’ coordination activities and use modeling techniques to illustrate the types of workarounds that occur in this setting. Our overall goals are to (a) develop a framework within which we can characterize different types of workarounds and analyze their short- and long-term effects (b) propose new technologies that take advantage of the characteristics of successful workarounds. Although we perform our analysis within the context of medical collaborations, our aim is to create a general framework that will generalize to the study of other large, complex organizations.METHODResearch ContextOur research was conducted in a six-room shock trauma center (STC) in which several units coordinate admissions, resuscitations, operations, and recovery. Work in the center is characteristically unpredictable, with fluctuations in load and cases coming in unexpectedly. Personnel frequently encounter situations in which they have little room for error, very little time to react, and insufficient information about how best to provide care. Surgeons, anesthesiologists, technicians, and nurses make frequent use of workarounds to optimize outcomes given these conditions.Data Collection and AnalysisOur data consists of approximately 120 hours of observations, interviews, and focus group discussion. Observations began at the hand-off time from night to day shift, in order to capture the period of peak coordination activities, and continued for the remainder of the shift. Interviews and focus groups were audio recorded and transcribed. Participants consisted of shock trauma center employees who were performing the targeted roles of charge nurse, charge anesthesiologist, and surgeons in different services (e.g. orthopedics, neurology).We drew upon user modeling techniques to identify breakdowns and workarounds in the workflow. User modeling provides a “graphical language to capture knowledge about work” and abstracts the context into focused models [[2], p. 84]. Workflow modeling uses symbols that represent the key information flow, repositories, users and roles. For example, a breakdown symbol can represent problems with communication orcoordination.Figure 1. Workaround symbol Recognizing the mechanism of workarounds and evaluating their reliability and successfulness can be made easier by including them in the modeling process. For this reason, we propose a new representation symbol for workarounds (Figure 1). The explicit modeling of workarounds helps clarify relationships between breakdowns, or potential breakdowns, and the types of solutions people attempt. It also makes the translation from workarounds to institutional practices more straightforward.Figure 2. Workflow Model of OR on 3 August 2004. Red thunderbolts represent breakdownsin the system; yellow triangles represent workarounds. (Note: CN-Charge Nurse, CRNA-Certified Registered NurseAnesthetist)RESULTSFigure 2 represents how work was distributed among people, places and things during the observed time period and how participants coordinated to accomplish their collective tasks. Breakdowns in this model represent problems in communication or coordination.Workarounds represent alternative ways to support workflow when events prevent the normal functioning of the system (e.g., obtaining substitutes, borrowing resources). From this model and our analysis of interview transcripts, we identified four key characteristics of workarounds: Workarounds differ as a function of people’s roles Depending on what role a person is acting in, they may have different goals and priorities. This difference can in turn affect the workarounds they practice. For example, those in managerial roles such as charge nurses can more easily request others’ assistance. Workarounds draw on tacit knowledge of others’ abilities and willingness to helpA workaround cannot be effective if the persons involved are not able or willing to perform. Initiators of workarounds take their tacit knowledge of others’ skills and abilities into account when deciding how to implement workarounds. As one charge anesthesiologist stated, "[You] just kind of know from experience who your stronger people are, who your weaker people are, who's flexible…".Workarounds can have a cascading effect Workarounds can initiate a series of further workarounds before the system is back to a stable state. In one case, for instance, a patient was taken to the OR without blood type information. To deal with this problem, personnel chose to substitute the universal donor blood type O+. However, the success of this workaround depended on a second workaround of borrowing the O+ blood from a neighboring resuscitation area, thereby leaving a potential shortage (and yet another workaround) in that area.Workarounds often rely on principles of fairness and who owes whom favorsInterviewees reported a sense of memory for workarounds and who was impacted by them. Workarounds were threaded in the sense that people who provide favors were likely to come back later with their own request for a favor. As one charge anesthesiologist stated, “[In any OR management situation] what you really want when you’re running the OR is you want everybody to owe you a favor at all times…Ok, now they’re the one who has to get bumped. It helps if they can remember last week when you helped them out…and it works the opposite way too, if somebody hurts us they’re not going to get the next break.” TECHNOLOGY RECOMMENDATIONSBased on these general workaround principles we’ve determined four system requirements for technology to better support workarounds.Training module. We propose a training module that helps new staff select workarounds and predict their outcomes. The module provides a library of previously used workarounds that indicates what was done by whom, and the outcome. Users are presented with a prioritized list of alternative workarounds.Memory module.We found that reciprocity of favors was an important principle in creating workarounds. The memory module provides a “score-keeping” mechanism to record persons impacted by each workaround. The module would help remind initiators of workarounds who they can call on for a favor, who can be counted on, and where to find people with particular experience or skills.Decision-making rmed decision-makers make much better decisions than uninformed ones. We propose a decision-making module that allows users to simulate and predict the short and long-term effects of different workarounds. The system could also suggest strategies to best handle repercussions if a workaround is unavoidable. Awareness module.Finally, we propose an awareness module that provides knowledge of available resources and personnel. An experienced user may already have a general sense of who they can count on or what materials they can substitute for others, but lack of knowledge of the availability of these persons or resources may hinder decisions, or lead to more workarounds later in time. CONCLUSION AND FUTURE DIRECTIONSThis study investigated workarounds in a trauma center. The most notable findings concern the ways that workarounds are embedded within a wider system: One workaround may lead to the need for others, and a request for a favor puts the requestor in a position of owing others favors in the future. Consequently, technological solutions to help workers cope with unexpected events will need to take into account the historical sequence and organizational embeddedness of workflow exceptions. In follow up research, we are looking in more depth at workarounds in medical contexts. We focus on the impact of workarounds in short- and long-term coordination of work and on the relationship between a workarounds’ effectiveness and its adoption as a standard approach to dealing with certain types of exceptions. We are also developing technology based on our recommendations. ACKNOWLEDGMENTSThis material is based upon work supported by the National Science Foundation under grant #0325087. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of NSF. We thank Mariesa Cash, Joseph Iloreta, Julia Ludwick, Jared Metter, Pablo Quinones, Katie Waite, and Jim Zheng for their help preparing data for analysis, Cheryl Plasters for assisting in collecting data and Tamas Gal for his technical support. REFERENCES[1]Bardram, J. E. (2000). Temporal coordination: On timeand coordination of collaborative activities at a surgical department. Proceedings of CSCW 2000, pp. 157-187.NY: ACM Press.[2]Beyer, H., & Holtzblatt, K. (1998). Contextual design:Defining customer-centered systems. San Diego:Morgan Kaufmann.[3]Bricon-Souf, N., Renard, J., & Beuscart, R. (1999).Dynamic workflow model for complex activity inintensive care unit. International Journal of MedicalInformatics, 53, pp.143-150.[4]Faraj, S. & Xiao, Y. (In Press) Coordination in fastresponse organizations. Management Science.[5]Nemeth, C. (2003). The Master Schedule: Howcognitive artifacts affect distributed cognition in acute care. Unpublished doctoral dissertation.[6]Plasters, C., Seagull, F.J., & Xiao, Y. (2003)Coordination challenges in operating roommanagement: An in-depth field study. AMIA 2003Symposium Proceedings, pp.524-528.[7]Tucker, A. & Edmondson, A. (2002). Managing routineexceptions: A model of nurse problem solving behavior.Advances in Health Care Management, pp.87-113. [8]Xiao, Y., Seagull, F.J., Faraj, S., & Mackenzie, C.F.(2003). Coordination Practices for Patient Safety:Knowledge, Cultural, and Supporting ArtifactRequirements. Proc. of International ErgonomicAssociation 2003 (Macroergonomics in Healthcare:Session).[9]Xiao, Y., Seagull, F.J., Hu, P., Mackenzie, C.F., deVisser, J., & Wieringa, P. (2003). DistributedMonitoring In a Dynamic Environment: Trade-offs ofInformation Access and Privacy. Proc. of 2003 IEEEInternational. Conference on Systems, Man, andCybernetics, pp.1772-1777.。
SAP workflow(OK)
第一节:现在开始总结workflow,虽然有些过时的技术,但是还是有很多公司在使用,特别是一些比较大的企业,系统升级比较慢。
也为自己知道的,做过的事情有一个总结,希望还能有点参考意义。
1.从目的上来说,就是让整个业务更加流畅,更加透明,更加方便快捷。
2.既然有了workflow,就应该相应的有一个管理系统,以及一个开发环境,这些我们都能够在sap中找到。
T-code: SWDM3.在使用workflow之前,我们必须明白一件事情,那就是不管什么样的workflow,都会有一整套的业务原型。
在定义workflow之前,应该找到相应的已经存在的模型(或许也可以自己开发)。
4.不要误会workflow的功能,其实它是很强大的,虽然我们经常只使用它的一部分功能。
包括,email的通知,transaction的集成,不同系统之间的数据交换(ALE/EDI)等等。
Workflow的定义:每个workflow都能在sap中找到业务流程;Workflow由很多的步骤组成;Workflow可以由事件触发;Workflow的创建:如果我们已经知道了业务如何执行,那么就可以创建自己的workflow了,于是我们会需要workflow builder.T-code: SWDD第二节:SAP提供了大量的Workflow的模板可以供大家参考,如果不符合具体的业务流程,可以对该模板做增强。
不过就像SAP标准程序一样,不能对其进行修改,当然,你可以把这个模板复制出来然后对其修改,具体就看你的需要了。
查看workflow 模板的方法:T-code FTC_DISTask type: WSWorkflow 助手:Business Workplace–SBWP当Workflow执行到某一步需要特定的用户确认或者批准的时候,就会发出work item到该用户的workplace,以使该用户做出相应的操作。
Business Workplace可以和很多外部工具集成,例如lotus note,MS outlook等等,这样使workflow的通知方式更加灵活。
工作流中的异常处理设计(精)
工作流系统的异常处理*李伟平,范玉顺(清华大学国家CIMS 工程研究中心,北京 100084 +Exception Handling in Workflow Management Systems-An OverviewLI Weiping, FAN Yushun(National CIMS Engineering & Research Center, Tsinghua University, Beijing 100084, China++Corresponding author: 86-10-62789636-1059, E-mail:wpli@Abstract: Workflow management system deals with the modeling and coordinated execution of business processes. These processes are often of long duration and may involving many executors, software and distributed resources. So there may exist potential exception when the workflow is running. After the Workflow Management System (WfMS is deployed in a certain enterprise, the enterprise become increasingly dependent on it to carry on their daily business activities. Thus some kinds of exception handling method will be introduced into the WfMS to resolve the exception when the workflow is running. While the exception handling of workflow has received increasing attention in recent years. This paper first introduces the question of exception handing in WfMS with the definition, classification and resolution of exception handling. Based on the evaluation of existing research methods, we indicate the developing trends of exception handling in WfMS and some key issue is put forward.Key words: workflow, workflow exception, exception handling, ECA rules, knowledge management, transaction, pattern摘要:工作流系统负责业务过程的建模和执行,这些业务过程往往涉及到多个参与者,需要使用分布的资源,调用多个软件系统,而且时间跨度很长,因此在工作流执行时可能存在多种潜在的工作流异常。
oracleBPEL工作流介绍
Receive PO
Transform
Transform
Receive PO
Send PO Ack
Ack
PO Acknowledgement
Receive PO Response
PO Response
Receive PO Response
Transform
Two BPEL workflow templates reflecting a business agreement
WSFL
(IBM)
WSCL
(HP)
BPEL4WS 1.0 BPEL4WS 1.1
(IBM, Microsoft)
(OASIS)
Orchestration vs Choreography
Orchestration – An executable business process describing a flow from the perspective and under control of a single endpoint (commonly: Workflow)
Industry wide language for business processes
– Common skill set and language for developers
Choice of process engines
– Standards lead to competitive offerings
</process>
BPEL Activities
Primitive Activities <invoke> <receive> <assign> <reply> <throw> <terminate> <wait>
复杂的操作流程英语作文
复杂的操作流程英语作文Title: Mastering Complex Operational Procedures。
In the realm of modern workplaces, navigating complex operational procedures is not just a skill but a necessity. Whether it's managing intricate projects or executingmulti-step processes, the ability to handle complexity with ease is highly valued. In this essay, we will delve into the strategies and approaches to master complex operational procedures effectively.Firstly, understanding the intricacies of the task at hand is paramount. This involves breaking down the procedure into its constituent steps, identifying dependencies, and recognizing potential bottlenecks.Clarity of purpose is essential; knowing the end goal helps in charting the path to success. Moreover, creating avisual representation such as flowcharts or diagrams can aid in comprehending the process comprehensively.Secondly, meticulous planning is crucial for navigating complex operational procedures. Establishing a well-defined timeline, allocating resources efficiently, andanticipating potential challenges are integral aspects of the planning phase. Additionally, devising contingency plans to mitigate risks ensures adaptability in dynamic environments. Effective planning serves as a roadmap, guiding individuals and teams through the intricacies of the procedure.Communication emerges as a cornerstone in managing complex operational procedures. Clear and concise communication fosters collaboration, aligns stakeholders, and ensures everyone is on the same page. Regular updates, status reports, and meetings facilitate transparency and accountability. Furthermore, fostering an environment where questions are encouraged promotes clarity and reduces ambiguity, thus enhancing overall efficiency.Embracing technology can significantly streamline complex operational procedures. Leveraging automation, workflow management tools, and project management softwarecan simplify tasks, minimize errors, and accelerate processes. Integrating technology not only enhances productivity but also provides valuable insights through data analytics, enabling informed decision-making.Effective delegation is instrumental in handling complex operational procedures. Recognizing individual strengths, assigning responsibilities accordingly, and empowering team members cultivates a sense of ownership and fosters a collaborative culture. Moreover, providing adequate support, resources, and feedback ensures the success of delegated tasks, promoting efficiency and synergy within the team.Continuous evaluation and refinement are essential for optimizing complex operational procedures. Regularly assessing performance metrics, soliciting feedback, and identifying areas for improvement enable iterative enhancements. Embracing a culture of continuous learning fosters innovation and adaptability, ensuring that operational procedures evolve in tandem with changing requirements and environments.In conclusion, mastering complex operational procedures demands a combination of strategic planning, effective communication, technological integration, delegation, and continuous improvement. By understanding the intricacies, planning meticulously, communicating effectively, leveraging technology, delegating efficiently, and embracing continuous evaluation, individuals and organizations can navigate complex operational procedures with confidence and proficiency.。
浅析新疆高校预科教育问题与对策
2.1 素质教育功能 预科学生一般处于同一个年龄层次和知识水平袁这是形成正确的
世界观和人生观的关键时期袁也是进行素质教育的最佳阶段遥 2.2 筛选与淘汰功能
少数民族大学预科均以汉语及专业汉语教学为重点袁 汉语考试 HSK尧MHK 达标的的学生才可升入大学本科阶段遥 预科虽定制为大学 基础教育的一部分袁但也具有一些基础补习性质遥 2.3 语言强化功能
192 科技视界 Science & Technology Vision
Science & Technology Vision
科技视界
3冤优缺点 优点院 淤可以大大减少网络中的节点袁也使得模型结构清晰袁易于理解袁 真实的反映维修作业过程遥 清晰地反映维修作业的流程尧各维修作业 间的关系袁以及维修保障资源的使用情况遥 于对表示维修资源的 token 进行了扩充袁丰富了描述能力遥 此扩 展 Petri 网可以很好地应用于装备维修作业过程的描述袁 其模型具有 直观性曰对模型进行仿真袁可以得到维修作业时间尧平均维修时间尧资 源等待时间等曰通过调整资源的配置也可以优化维修作业过程遥 缺点院 淤因为公共库所中代表维修保障资源的有色 token 的类型和数 量会对模型的运行产生影响袁可能改变系统的可达图袁甚至会造成死 锁遥 于维修资源的配置也会影响某些维修作业的持续时间袁从而影响 整个维修任务的完成时间遥 对复杂系统的维修作业过程建模分析时袁 要综合考虑维修时间与维修成本之间的平衡遥 盂采用着色 Petri 网袁 传统的涂色操作对模型的理解带来了很大 困难
的预科教育有三年制和一年制两种形式遥 三年制的预科相当于现在的 大学专科曰一年制的预科先学习基础知识袁然后到本科学习三年专业 课程遥
1908 年袁清政府在北京建立满蒙高等学堂袁专门设立了满尧蒙文 预科和藏文预科袁开民族预科教育之先河遥
BPMN UML
A Comparison of BPMN and UML 2.0 Activity DiagramsDaniela C. C. Peixoto1, Vitor A. Batista1, Ana P. Atayde1, Eduardo P. Borges1,Rodolfo F. Resende2, Clarindo Isaías P. S. Pádua1.1Synergia – Universidade Federal de Minas Gerais2Departamento de Ciência da Computação – Universidade Federal de Minas GeraisAv. Antônio Carlos 6627 - CEP 31270-010 - Belo Horizonte – MG - Brasil {cascini, vitor, atayde, eborges, rodolfo, clarindo}@dcc.ufmg.brAbstract: Interest in evaluating Business Process Modeling Languages haswidespread, in part due to the increase of the number of languages available forthis purpose. Several works on the evaluation of BPMLs are available. Theirevaluation are mainly based on perspectives centered in modeling experts. In thispaper, we address the readability perspective of two BPMLs (UML 2.0 andBPMN) for people not familiar with process modeling.The UML can be tailored for purposes beyond software modeling and offersActivity Diagrams for business process modeling. BPMN was designed formodeling business process and has a primary goal of being understandable by allbusiness stakeholders. We compared undergraduates (freshmen) understanding ofbusiness process modeled in BPMN and UML 2.0 Activity Diagrams. Our resultsare interesting, since we were able to find that these two languages do not havesignificant differences, despite BPMN readability design goals.1.IntroductionA business process modeling focus on describing activities within the business and how they interact with the resources in the business to achieve a goal. According to Penker [Eriksson & Penker, 2000] a business process model may have six different reasons to be created, which are: to understand the key mechanisms of an existing business; to orient the creation of suitable information systems that support the business; to implement improvements in the current business; to show the structure of an innovated business; to experiment new business concepts; and to identify business elements not considered part of the core, which could be delegated to an outside supplier.The increasing interest in business process modeling has resulted in the appearance of various Business Process Modeling Languages (BPMLs). Today, there are several notations that can be used for business process modeling [List & Korherr, 2006]: UML 2.0 Activity Diagram [OMG, 2005], Business Process Modeling Notation [OMG, 2006], Event Driven Process Chain (EPC) [Scheer, 1999], Integrated DEFinition Method 3 (IDEF3) [Mayer & Perakath, 1995], and others. These languages express certain aspects of processes, for example, activities and roles, and address different application areas. However1no one of these languages is predominant in the business process modeling area [Mendling et al., 2004]. One major reason [zur Muehlen, 2004] is the wide disparity in the needs and viewpoints of various modelers and designers.There are many different stakeholders interested in the results of a business process modeling. They correspond to people that participate in the process directly or indirectly as the owner, external customers (example: business modelers or designers) and internal customers (example: managers or employees). The owner sets the goals and allocates the resources to make the business run. The business modeler describes the processes using specific notations and tools [Eriksson & Penker, 2000]. It is important to note that the internal business customers do not need to be an expert in these BPMLs, they only need to understand the results of the modeling, more specifically, and they should know how to read business process diagrams.Before the selection of an appropriate business modeling language, the modelers and designers should observe the kind of process being modeled and the purpose for which the modeling is being done [Russell et al., 2006b].This article investigates two BPMLs - UML 2.0 Activity Diagrams (AD) and BPMN - capacity of being readily understood. Our main contribution consists of an experiment with computer science students (freshmen) representing internal customers reading business process diagrams.The Unified Modeling Language (UML) [OMG, 2005] is increasingly being seen as a de facto standard for software modeling and design. UML is an object-oriented notation that embodies a set of formalisms for capturing detailed design aspects of software systems. The UML can be tailored for several purposes and its Activity Diagram can be used for business process modeling [Wohed et al., 2005].Business Process Modeling Notation (BPMN) was designed for modeling business process and their transformation into an execution language. The primary goal of the BPMN is to be understandable by all business stakeholders [OMG, 2006].We originally expected that BPMN models were easier to understand than UML 2.0. This assumption was derived from the fact that BPMN primary goal was to be understandable by all business stakeholders. Furthermore, BPMN has model elements that, in some cases, do not have a correspondent element in UML 2.0 AD.The comparison in our work is based on Workflow Patterns, a taxonomy of generic, recurring constructs originally devised to evaluate workflow systems, and more recently used to successfully evaluate workflow standards, business process languages and process-aware information systems in general [White, 2004], [Wohed et al., 2003].The remainder of this paper is structured as follows. Section 2 presents some works that describe evaluations of BPMLs. Section 3 presents the workflow patterns. Section 4 describes the methodology used for comparing UML 2.0 AD e BPML. Section 5, 6 and 7 reports the results achieved. Section 8 concludes and suggests future work.2.Related WorkIn BPML related works the evaluated concepts are mainly based on meta-models, which address a very technical perspective.List and Korherr [List & Korherr, 2006], for example, propose a generic meta-model for evaluating BPMLs. This meta-model is categorized using five perspectives, inspired by business process theory [Ould, 1995], Workflow Patterns [Russell et al.,2006a], and the Workflow Management Coalition (WfMC) [WMC, 1998]:•Organizational: represents where and by whom (agents) process elements are performed; •Functional: represents the process elements which are being performed, e.g., activities; •Behavioral: represents when and how process elements are performed; •Informational: represents the informational entities produced or manipulated by a process; and•Business process context: provides an overview perspective of the process and describes major business process characteristics, such as goals.List and Korherr evaluated seven BPMLs, including UML2.0 Activity Diagram [OMG, 2005], Business Process Modeling Notation (BPMN) [OMG, 2006], Business Process Definition Metamodel (BPDM) [OMG, 2004], Role Activity Diagram (RAD) [Holt & Grimes, 1983], Event Driven Process Chain (EPC) [Scheer, 1999], and Petri Net [Gou et al., 2000]. They observed that the functional and the behavioral perspectives are very well represented in all BMPLs, while the organizational and informational perspectives are only partly supported, and business process context is not explicitly supported.Russell examines the suitability of UML 2.0 Activity Diagrams for business process modeling, using Workflow Patterns [Russell et al., 2006b] as an evaluation framework. The pattern evaluation shows that UML 2.0 Activity Diagrams is not suitable for representing all aspects of this type of modeling. It offers support for control-flow and data perspective allowing most of the constructs to be directly captured. However, it is extremely limited in modeling resource-related or organizational aspects of business process. These limitations are shared with most of the other BPMLs, showing the emphasis that has been placed on the control-flow and data perspectives in these notations.White [White, 2004] examines whether two modeling notation, BPMN and UML 2.0 Activity Diagrams, can graphically represent the control flow workflow patterns. White examined 21 workflow patterns and observed that they could adequately model most of them. Both notations provide similar solutions for most of the patterns indicating how close the notation is in their presentation. The similarities in the two diagrams are explained by the fact that both were designed to solve the problem of the diagramming of procedural business processes. Some differences are due to the fact that they have different target users of diagrams: business people for BPMN, and software developer for UML 2.0 (this language is more technically oriented).It is interesting to observe that in all these evaluations, characteristics related to the consumption of business modeling results (legibility, for example) are not addressed at all.3.Workflow PatternsRussel et al [Russell et al., 2006a] identify patterns in four perspectives1: control-flow, data, resource and exception handling. The control-flow perspective captures aspects related to control-flow dependencies. Originally twenty patterns were proposed for this perspective, but in the latest revision this has grown to forty-two patterns. This perspective includes patterns for Basic Control Flow, Advanced Branching and Synchronization, Multiple Instance, Cancellation and Force Completion, Iteration, Termination and Trigger The data perspective represents the definition and use of data elements (visibility), information passing, data transfer and interaction with other perspectives. This perspective includes patterns for Data visibility, Data Interaction (Internal Data Interaction and External Data Interaction), Data Transfer Mechanisms and Data-based Routing. The resource perspective captures the various ways in which resources are represented and utilized in workflows. This perspective includes patterns for Creation, Push, Pull, Detour, Auto-Start, Visibility, and Multiple Resource. Finally the patterns for the exception handling perspective deal with the various causes and the resultants actions need to be taken as a result of exception occurrences. All these patterns range from very simple to very complex aspects of business process models.4.The experimentIn this section, we described the techniques used to analyze UML 2.0 AD and BPMN related to the legibility of the business process model. We have conducted a controlled experiment to examine this characteristic based on end-users point of view. Our strategies follow the experiment process defined by Wohlin et al. [Wohlin et al., 2000] that consists of five activities: definition, planning, operation, analysis & interpretation, and presentation & package.With this experiment we evaluated the reading activity of a notation, which is the process of parsing a notation and creating an understanding of it [Wright & Cockburn, 2005]. We do not evaluate other tasks executed when modeling business process, e.g., writing.4.1. HypothesisThis evaluation tests the hypothesis that using a BPMN notation for a business process model is easier to understanding than using UML 2.0 AD notation.1See /patterns/index.php for more details.4.2. Experiment detailsThe experiment was conducted with 35 undergraduate computer science students. All participants were in the first year of this course. During this experiment, these students represent internal customers, so they need to read and understand business process diagrams. At the experiment beginning, the instructor explained to the participants what they were expected to do during that experiment. Firstly, the participants answered a questionnaire with the purpose of collecting their knowledge about the subject under study: business process domain (a retirement process) and BPMNs. After that, the students were randomly assigned to one version of the diagrams (BPMN or in UML 2.0 AD). Every student saw four diagrams and answered 11 true/false questions related to the semantics of the diagrams.The diagrams modeled government retirement process. The diagrams were selected from models produced in three months by a team of five experienced business process modelers. These models were produced with the aim to document and guide the improvement of the organization. We decided to choose diagrams from real project since there is no business process models database available to be used as a benchmark.Figure 1 shows an example of BPMN diagram used in the experiment. Figure 2 shows the same diagram modeled in UML 2.0.The diagrams were organized in two levels of abstraction. The first level shows the main processes and the second level shows sub-processes details. The diagrams were available in HTML format and the students could navigate through all levels of these diagrams. Both notations were implemented in Sparx Enterprise Architect tool and they were modeled, in both languages, in a very similar way. Whenever possible, processes, objects and other elements of these notations were equally arranged.The diagrams were chosen trying to maximize usage of the following workflow patterns. These patterns summarize the findings presented in [Russell et al.,2006a], thus serving as a guide for the evaluation of BPMN and UML 2.0 AD.WCP-1: Sequence – the ability to depict a sequence of activities, with one activity starting after a previous activity has completed;WCP-2: Parallel split – the ability to execute activities concurrently;WCP-3: Synchronization – the ability to capture a convergence of two or more branches, generated by the Parallel split pattern, into a single subsequent branch;WCP-4: Exclusive choice – the ability to represent a decision point where only one of the branches is chosen;WCP-5: Simple merge – the ability to show the convergence of two or more branches into one, without synchronization.WCP-6: Multi-choice – the ability to depict a divergence of a branch into two or more parallel branches on a selective bases;WCP-10: Arbitrary cycles – the ability to represent loops in a process that have more than one entry or exit point.WCP means Workflow Control Pattern. Each question was assigned to a main goal, that is, each question was assigned to the workflow pattern(s) related to it. This assignmentwas helpful in order to map the use of each pattern in the diagrams. Table 1 illustrates this relation.Figure 1 – A BPMN diagram used in the experimentAn example of a question that evaluates Arbitrary Cycles and Multiple choice (Question number 10 – Table 1) is “The activity Sanar Irregularidades could be executed several times during the whole process execution. True or False?”. Figure 3 shows an excerpt from a diagram related to this question.Participants were given as much time as needed to complete the task and the instructor collected the questionnaires with the answers after they have finished.Figure 2 - UML 2.0 diagram used in the experiment. Table 1 - Purpose of each question and patterns usedFigure 3 - Excerpt of diagram used in the experiment to evaluate arbitrary cycles 5.Preliminary ResultsAccording to profile forms, no students have had experience with any of these notations before or with the kind of business that was modeled in the diagrams (government retirement process). To examine the hypothesis stated we used Mann-Whitney test [Triola, 2008] – since data is not normally distributed – to compare the scores on each question and the total score for both questionnaires. Table 2 shows the global score for each notation. This score was calculated dividing the number of correct answers by the number of questions (11 in this case). Table 3 shows a per question comparison using proportion of correct answers. All results presented in this paper have 95% of confidence.These tables show an interesting pattern of results. The number of correct answers obtained in both languages is very similar.Table 2 - Global results: percentage of correct answers.Table 3 - Correct answers per questionComparison of proportion of correct answers between notationsTable 3 shows that UML questions were easier for students to answer in only 2 of 11 questions. However, only question number 1 had a significant difference between notations (note that in all other questions, the confidence interval of difference includes zero).5.1. TimeMann-Whitney test did not show that the task in one notation was completed faster than in the other one. Participants needed a mean of 15.89 ± 2.11 minutes to answer the questionnaire in BPMN and a mean of 16.37 ± 2.96 minutes to answer the same questionnaire in UML 2.0 AD.5.2. Hit rateMann-Whitney test also did not show any differences in the results related to hit rate of the answers. Participants achieved a mean of 9.44 correct answers of 11 in BPMN and a mean of 8.41 in the same questionnaire in UML 2.0 AD. Figure 4 shows the interval plot of the results presented in Table 2. Observe the overlapped confidence intervals.ments from ParticipantsAfter taking part, participants were asked about the clarity of the questions. General comments: 6% of the participants commented the questions were hard, and they needed some training for doing better. 68% said they had some difficult in understanding the questions, but they were able to do it, and 26% thought the questions were easy and could understand them with no major problems.•UML 2.0 AD: four of seventeen participants dealing with UML 2.0 AD diagrams found that it was easy to answer the questions, 12 found difficult, but not too much, and one found it was very hard to answer the questions.•BPMN: five of eighteen participants dealing with the BPMN diagrams found easy to answer the questions, 12 found it that was difficult, but not too much, and one found it was very hard to answer the questions.Figure 4 – Hit rate of answers7.Additional CommentsWith these results, we could not confirm that exist differences in the business modeling using BPMN and UML 2.0 Activity Diagrams from the point of view of end user readability. However, in our study we have analyzed only workflow patterns described in Table 1. This suggests that, as far as these patterns are concerned, the level of difficult for understanding the business process, in both languages, is the same. Our proposed hypothesis that using a BPMN notation for a business process model is easier to understanding than using UML 2.0 AD notation was rejected.8.Conclusions and future workThis paper describes an evaluation examining the readability of business models written in BPMN and UML 2.0 AD. We used computer science freshmen not familiar with the languages and with the modeled domain, representing internal customers of one organization.We originally expected that BPMN models were easier to understand than UML 2.0 AD. This assumption was derived from the BPMN primary goal and its distinct model elements not present in UML 2.0 AD.Our study does not offer evidence that exist differences in modeling using BPMN and UML 2.0 Activity Diagrams from the point of view of end user readability. Indeed, wehope that these results provide more information to organizations in deciding to adopt or not a new notation for business process modeling. In our study we have analyzed only workflow patterns described in Table 1. This suggests that using these patterns the level of difficult for understanding the business process, in both languages, is the same.This restriction is an important scope for future work. It is important to determine whether there are differences in the results using other workflow patterns. It is also important to determine if there are differences in other modeling activities like model writing. Other research questions include:Is this lack of difference due to a limited use of workflow patterns? To answer this question we need to run experiments using other workflow patterns. Re-running this evaluation will tell us with a greater level of confidence the differences between these notations.Does the difference exist on the writing activity? To answer this question we need to run evaluations concentrating on the writing activities. This evaluation will give us a base to examine the effect of each notation.References[Eriksson & Penker, 2000] Eriksson, H., & Penker, M. 2000. Business Modeling with UML: business patterns at work. John Wiley & Sons.[Gou et al., 2000] Gou, H., Huang, B., Liu, W., Ren, S., & Y., Li. 2000. Petri-net-based business process modeling for virtual enterprises Systems. Pages 3183 – 3188 of:IEEE International Conference on Man, and Cybernetics, 2000, vol. 5.[Holt & Grimes, 1983] Holt, A, Ramsey R., & Grimes, J. 1983. Coordinating System Technology as the Basis for a Programming Environment. Electrical Communication, 57(4), 307 – 314.[List & Korherr, 2006] List, Beate, & Korherr, Birgit. 2006. An evaluation of conceptual business process modelling languages. Pages 1532–1539 of:SAC '06: Proceedings of the 2006 ACM symposium on Applied computing. New York, NY, USA: ACM Press.[Mayer & Perakath, 1995] Mayer, R., Menzel C. Painter M. Witte P. Blinn T., & Perakath, B. 1995. Information Integration for Concurrent Engineering (IICE) IDEF3 Process Description Capture Method Report. Tech. rept. Knowledge Based Systems Inc. (KBSI).[Mendling et al., 2004] Mendling, J., uttgens, N., & Neumann, M. 2004. A Comparison of XML Interchange Formats for Business Process Modelling. [OMG, 2004] OMG. 2004 (January). Business Process Definition Metamodel - Version1.0.2.[OMG, 2005] OMG. 2005. Unified Modeling Language Specification, version 2.0. Object Management Group (OMG).[OMG, 2006] OMG. 2006. Business Process Modeling Notation Specification. Object Modeling Group.[Ould, 1995] Ould, M. 1995. Business Process – Modeling and Analysis for Re-engineering and Improvement. John Wiley & Sons.[Russell et al., 2006a] Russell, N., ter Hofsted, A.H.M., van der Aalst, W.M.P., & Mulyar, N. 2006a. Workflow Control-Flow Patterns: A Revised View. Tech. rept. BPM Center Report BPM-06-22.[Russell et al., 2006b] Russell, Nick, van der Aalst, Wil M. P., ter Hofstede, Arthur H. M., & Wohed, Petia. 2006b. On the suitability of UML 2.0 activity diagrams for business process modelling. Pages 95–104 of:APCCM '06: Proceedings of the 3rd Asia-Pacific conference on Conceptual modelling. Darlinghurst, Australia, Australia: Australian Computer Society, Inc.[Scheer, 1999] Scheer, A. W. 1999. ARIS – Business Process Modeling. 2nd edition edn.Springer Verlag.[Triola, 2008] Triola, Mario F. 2008. Introdução à Estatística. 10a. edição edn. LTC Editora.[White, 2004] White, Stephen A. 2004. Process Modeling Notations and Workflow Patterns.[WMC, 1998] WMC. 1998. Workflow Management Coalition. Interface 1: Process Definition Interchange Process Model, WfMC TC- 1016-M (1998).[Wohed et al., 2003] Wohed, P., Perjons, E., Dumas, M., & ter, A. 2003. Pattern based analysis of EAI languages - the case of the business modeling language.[Wohed et al., 2005] Wohed, Petia, van der Aalst, Wil M.P., Dumas, Marlon, ter Hofstede, Arthur H.M., & Russell, Nick. 2005. Pattern-based analysis of the control flow perspective of UML activity diagrams. In:ER 2005: 24th International Conference on Conceptual Modelling. Springer Verlag.[Wohlin et al., 2000] Wohlin, Claes, Runeson, Per, Höst, Martin, Ohlsson, Magnus C., Regnell, Björn, & Wesslén, Anders. 2000. Experimentation in Software Engineering, An Introduction. Kluwer Academic Publishers.[Wright & Cockburn, 2005] Wright, Tim, & Cockburn, Andy. 2005. Evaluation of two textual programming notations for children. Pages 55–62 of:AUIC '05: Proceedings of the Sixth Australasian conference on User interface. Darlinghurst, Australia, Australia: Australian Computer Society, Inc.[zur Muehlen, 2004] zur Muehlen, M.; Rosemann, M. 2004. Multi-Paradigm Process Management. Pages 169–175 of:Janis Grundspenkis, Marite Kirikova, Riga Latvia (ed), Proceedings of CAiSE'04 Workshops - 5th Workshop on Business Process Modeling, Development and Support (BPMDS 2004).。
工作流术语表
工作流术语表工作流(Workflow)是指根据事先定义好的规则和流程,将工作任务自动或半自动地按照特定的顺序、时间和条件进行分配、执行和控制的一种管理方式。
在工作流中,有许多术语被广泛应用,下面将对一些常见的工作流术语进行解释和说明。
1. 流程(Process):流程是指将一系列相关的工作任务按照特定的顺序和规则进行组织和管理的过程。
流程可以包括多个步骤或活动,每个活动都有其特定的输入、输出和执行条件。
2. 任务(Task):任务是指在工作流中需要完成的具体工作,可以是一项简单的操作或一系列复杂的活动。
每个任务都有其特定的执行者和完成时间。
3. 角色(Role):角色是指在工作流中扮演特定职责和责任的人或组织。
一个角色可以包括多个具体的执行者。
在工作流中,任务通常会被分配给不同的角色来执行。
4. 流程图(Flowchart):流程图是一种图形化的表示方法,用于描述和展示工作流中的流程、任务和执行顺序。
流程图通常使用不同的符号和箭头来表示不同的活动和流向,以便于理解和交流。
5. 条件(Condition):条件是指在工作流中判断和决定任务执行顺序和方式的规则和条件。
条件可以是简单的逻辑关系,也可以是复杂的业务规则。
通过设置条件,可以实现任务的自动分配和执行。
6. 并行(Parallel):并行是指在工作流中同时执行多个任务或活动。
通过并行处理,可以提高工作效率和处理能力。
在并行执行的任务或活动之间通常存在依赖关系或约束条件。
7. 串行(Sequential):串行是指在工作流中按照顺序依次执行任务或活动。
串行执行的任务或活动之间通常存在先后关系或前置条件。
只有前置任务或活动完成后,后续任务或活动才能开始执行。
8. 异常处理(Exception Handling):异常处理是指在工作流中对异常情况进行识别、捕获和处理的过程。
异常可以是任务执行失败、超时、数据错误等不符合预期的情况。
通过设置异常处理机制,可以保证工作流的稳定性和可靠性。
工作流程用英文怎么说怎么写
工作流程的英文表达与写作工作流程是指一个或多个任务、活动或者项目在工作中的依次执行、处理或者操作的过程。
在日常工作中,理解并熟练应用工作流程对于提高工作效率、减少错误和提升工作质量至关重要。
因此,掌握工作流程的英文表达以及写作技巧是一项非常有益的技能。
工作流程的英文表达在英文中,工作流程可以被表达为work process、workflow或working procedure。
这三个短语在工作场合中都很常见,并在不同情境中有着略微不同的用法。
•Work process更倾向于描述一种工作进行的过程,强调执行的具体步骤和活动。
•Workflow可以被用来表示一个更复杂的、包含各种活动、参与方和决策点的工作流程。
•Working procedure通常更正式一些,用于指代一个明确定义和规范的工作流程或程序。
工作流程的写作技巧要描述工作流程,首先要清晰地了解整个过程的步骤和关键点。
在写作时,应做到步骤清晰、重点突出,避免冗长和模糊。
在书写工作流程时,可以按照以下结构进行排版: 1. 描述整体流程:简要介绍工作流程的目的和整体步骤。
2. 详细步骤说明:逐步描述每个具体步骤,包括输入、输出和执行者。
3. 关键点提示:强调工作流程中的关键环节和需要特别注意的事项。
4. 衔接和流转:描述各步骤之间的衔接与流转过程,确保整个工作流程的连贯性和完整性。
5. 结束与总结:总结工作流程的执行结果和可能的改进措施。
实例示范Work Process: Invoice HandlingObjective: To process supplier invoices in an accurate and timely manner.1.Receiving Invoices:–Receive invoices from suppliers via email or mail.–Verify the accuracy of invoice details, including vendor name, invoice number, amount, and payment terms.2.Coding Invoices:–Assign appropriate cost center and general ledger codes to each invoice.–Enter invoice information into the accounting system.3.Approval Process:–Send coded invoices to respective department heads for approval.–Obtain necessary signatures and approvals before proceeding to payment stage.4.Payment Processing:–Prepare payment batches based on approved invoices.–Make payments either via check or electronic funds transfer (EFT).5.Record Keeping:–File all processed invoices and payment records for future reference.–Update accounting system with payment details and mark invoices as paid.6.End of Month Reconciliation:–Reconcile payment records with bank statements.–Investigate and resolve any discrepancies in a timely manner.Summary and Improvements:In summary, the invoice handling process involves receiving, coding, approval, payment processing, record keeping, and reconciliation. To further streamline this workflow, automation tools can be implemented to reduce manual data entry errors and expedite the approval process.结语了解工作流程的英文表达和写作技巧,有助于提高职场沟通效率,使工作流程更加规范和明晰。
故障处理思路英语
故障处理思路英语Title: Fault Handling: The Key to System UptimeThe importance of fault handling cannot be overstated in the world of maintenance and repair. It is the linchpin in keeping systems running smoothly, ensuring operational efficiency, and preventing unexpected downtime. This article delves into the intricacies of fault diagnosis and treatment, discussing various methods, processes, and the skills required for effective handling.Diagnosis is the first crucial step in the故障处理流程. It involves identifying the nature and cause of the fault. There are several methods for diagnosis, including observation, testing, and instrument-based testing. For instance, visual inspection can identify obvious physical damage or wear. Testing involves checking the functionality of individual components or the entire system. Instrument-based testing uses specialized equipment to measure voltage, current, or other parameters to pinpoint problems.Once the fault is diagnosed, the next step is to determine the appropriate course of action. This can range from simple repairs to complex overhauls. Common faults may require quick fixes, whilecomplex faults may require more in-depth analysis and repair. The key is to prioritize based on the impact on operations and the potential for further damage.Skills and attributes are paramount for effective fault handling. Mechanics should have a strong knowledge base in the equipment they are maintaining, including its operating principles, components, and potential failure modes. They should also possess good problem-solving skills and a can-do attitude. The ability to work under pressure and stay calm during emergencies is equally essential.Preventive maintenance is another crucial aspect of fault handling. Regularly scheduled checks, inspections, and servicing can help identify potential issues before they become full-blown faults. This not only saves downtime but also extends the lifespan of equipment. It's essential to follow manufacturer's recommendations and use high-quality replacement parts to maintain the integrity of systems.Let's consider a hypothetical case where a manufacturing plant's production line stalls due to a faulty motor. The maintenance team quickly diagnoses the issue as a wiring issue and replaces the suspect wiring, restoring the line to operation within hours. In another scenario,a hospital's ventilation system malfunctions, leading to a life-threatening situation. The emergency response team promptly diagnoses a software glitch and patches it remotely, averting a potential crisis.In conclusion, fault handling is integral to maintaining system uptime. It requires a methodical approach, sound technical knowledge, and excellent problem-solving skills. Regular preventative maintenance is key to minimizing downtime and equipment failure. Proactive identification and treatment of faults can significantly enhance operational efficiency and ensure a smooth workflow. Fault handling isn't just about fixing what's broken; it's about ensuring system reliability and uptime, ultimately contributing to the overall success of any organization.。
快递扫描分拣员的工作流程
快递扫描分拣员的工作流程英文回答:Workflow of a Parcel Scanning and Sorting Associate.1. Arrival and Equipment Check:Upon arrival at the workplace, scanning and sorting associates check in and retrieve their assigned equipment, such as hand-held scanners and conveyor belts.2. Parcel Receiving and Scanning:Associates receive parcels from various sources, such as trucks, loading docks, or drop-off points.They scan the parcels' barcodes or QR codes using hand-held scanners and enter relevant data into the system, such as destination, weight, and dimensions.3. Parcel Sorting and Routing:Scanned parcels are automatically sorted based on their destination and other criteria using conveyor belts and automated sorting systems.Associates manually intervene to sort parcels that are too large or oddly shaped or to scan barcodes that are difficult to read.4. Loading and Dispatch:Sorted parcels are loaded onto trucks or other vehicles for delivery to their intended destinations.Associates verify the number and condition of the parcels before loading and ensure that they are correctly manifested for tracking.5. Data Entry and Tracking:Associates enter data related to each scanned parcelinto the company's database, including its destination, sorting status, and any relevant exceptions.They monitor the progress of parcels through the system and track their delivery status.6. Exception Handling:Associates identify and handle exceptions that may arise during the sorting process, such as damaged parcels, missing barcodes, or incorrect delivery addresses.They communicate with supervisors or other team members to resolve exceptions and ensure timely delivery.7. Maintenance and Cleaning:Associates perform regular maintenance on their equipment, including hand-held scanners and conveyor belts, to ensure smooth operation.They also maintain a clean and organized workenvironment to facilitate efficient parcel handling.中文回答:快递扫描分拣员的工作流程。
流程管理的六个要点 英语
Six Key Points of Process Management In the realm of business and project management, the effective handling of processes is crucial to achieving success. The ability to manage and optimize workflows can lead to increased efficiency, reduced costs, and improved quality. To ensure that processes are streamlined and productive, it is essential to focus on the following six key points:1. Clear Definition of ObjectivesThe first step in successful process management is to establish clear and concise objectives. Clearly defining the goals and outcomes of a process provides a roadmap for all stakeholders involved. By setting specific, measurable, achievable, relevant, and time-bound objectives, teams can align their efforts and work towards a common purpose.2. Detailed Process MappingOnce the objectives are defined, the next crucial step is to map out the process in detail. Process mapping involves identifying each step involved in the workflow, along with the inputs, outputs, and responsibilities associated with each step. This visual representation of the process helps in identifying bottlenecks, redundancies, and opportunities for improvement.3. Efficient Resource AllocationResource allocation plays a significant role in process management. It is vital to ensure that the right resources are available at the right time to support the workflow. By optimizing the allocation of human, financial, and technological resources, organizations can improve productivity and maximize output.4. Continuous Monitoring and EvaluationTo maintain optimal performance, processes must be continuously monitored and evaluated. Regular feedback and performance metrics help in identifying deviations from the desired outcomes and allow for timely adjustments. By implementing monitoring mechanisms, organizations can quickly address issues and make data-driven decisions to enhance efficiency.5. Stakeholder CollaborationSuccessful process management relies on effective communication and collaboration among all stakeholders involved. By fostering a culture of cooperation and transparency, teams can work together towards achieving common goals. Engaging stakeholders throughout the process ensures alignment of objectives and promotes a shared understanding of the workflow.6. Flexibility and AdaptabilityIn today’s dynamic bus iness environment, processes must be flexible and adaptable to changing circumstances. Organizations need to be nimble in responding to market shifts, regulatory changes, and emerging trends. By embracing agility and incorporating feedback loops, processes can be refined and optimized to meet evolving needs and challenges.In conclusion, effective process management is essential for organizational success. By focusing on the six key points highlighted above, businesses can streamline workflows, enhance efficiency, and drive continuous improvement. By prioritizing objectives, mapping processes, optimizing resources, monitoring performance, fostering collaboration, and embracing flexibility, organizations can achieve sustainable growth and competitive advantage.。
支持业务过程性能优化的多过程建模方法研究
支持业务过程性能优化的多过程建模方法研究曾森,范玉顺,黄双喜(清华大学自动化系国家CIMS工程技术研究中心,北京100084)摘要:为了提高业务过程的性能,从系统动力学的角度分析了企业业务过程性能优化全生命周期的系统结构。
基于控制论方法证明了:1)提高模型的准确性和2)减小模型建立、分析及实施的周期时间是取得业务过程性能优化的关键所在。
为此提出了对企业模型、仿真模型和工作流模型进行统一建模的多过程建模框架和建模方法,并对多个过程间的相互依赖关系进行了准确的建模;然后设计了相应的多过程建模工具的元模型;最后提供了一个具体应用案例。
关键词:企业模型;仿真模型;工作流模型;多过程建模;性能优化;元模型中图分类号:TP391 文献标识码: A1 引言如何提高和优化企业的业务过程管理能力和业务过程性能越来越成为业务人员、IT人员和软件供应商研究和关注的焦点。
相关的研究主要包括企业架构与建模(Enterprise Modeling,EM)、业务过程仿真建模(Simulation Modeling,SM)和工作流建模(Workflow Modeling,WM)与工作流管理三方面的方法和相应的软件工具的研究[1]。
EM的研究成果主要包括CIMOSA、ARIS、GRAI/GIM、GERAM、IEM和CIMFlow集成化企业建模方法与系统体系结构等[2],它们的优点是从不同的视角、不同的抽象层次和不同的建模生命周期对企业进行了分解,降低了建模的复杂度,提高了模型的规范性,有利于人们对模型的理解和应用。
EM的主要缺点是只能描述企业中相对稳定的方面,难以描述与时间变化紧密相关的的产品流、信息流、控制流、过程实例、异常实例、资源调度及因果影响等企业的动态行为。
SM能够建模企业中大量存在的队列、随机事件、产品流、过程路由、资源使用和异常流等[3],可以很好的弥补EM的不足,建模企业的动态行为。
但是如果SM不与企业模型相结合,并考虑与可执行的工作流模型相兼容的话,业务过程建模仿真的工作量很大,并且难以转换为可执行的模型。
Oracle ESB Lesson06 交易和异常处理指南说明书
Use JCA Rejection Handlers for Sync Rules
• Custom Rejection Handlers redirect to JCA destinations
• File, AQ, WSIF (JMS, DB …) • Supports both inbound and outbound adapters
– “Async” execution terminates existing txn – “Sync” execution continues inbound txn – ESB has 1 Listener per ESB System per Async Topic
• What does this mean ?
- See “Update Service” response dialogue - Click “OK” - Notice CustDBOut Routing Rule moved to end - Click on “Diagram” - See new “Async” execution rule icon
ESB Lesson06
Page 11
Go Back to Services View
- Click “Services” - Select “CustOut_RS” in Service Pane - Click “Routing Rules” Tab
SAPMESSAGE
SAPMESSAGESAP message 探究SAP消息就是这样一种机制举个实际例子,某人身体系统出了点毛病要去检查了然后决定是否continuework.selectcase此人身份.caseGC党的官爷.selectcase'毛病'.if'小病'.Message:'各部门组织看病当然红包趁机捞上一笔当然工作是要停的'.ELSEIF'中病'.Message:'带上几个漂亮小妞疗养去还工作个屁'ELSEIF'大病'.Message:'当地报纸要大肆宣传某官为民造福劳累过度,但当你仔细检查逻辑就发现内幕其实多是因为吃喝嫖赌荒淫无度造成的体虚,所以通常看消息要看起内幕'. endselect.case民工穷人.if还有口气.Message:不管得了小病大病癌症AIDS都得不管它工作.endif.caseother.message:'视此人power和money自定'.endselect.SAP消息也是这样,你可将所有能忽略的消息ignore让它鞠躬尽瘁死而后已为你工作.从是否允许你configure层次分两种:configurable和non-configurable.对configurablemessage可选的messagetype通常有S,I,W,E,A,-(online 表示即时outputmessage-表示switchoffmessage继续做后面工作batchi表示做batchinput时).就是说对configurablemessageSAP允许你设置它是Error,warning或者switchoff干脆忽略,通常这些个错误不至于引起致命的系统逻辑错误.一.基本概念你可简单理解为消息是SAP为exception预警的一种手段.Applicationarea:告诉你消息归属,分类吧.其实就是SE91所说的Messageclass二:消息相关最常用的table:T100:SAPdefaultMessage,T160M:MessageControl:Purchasing(SystemMessages)T100C:User_definedmessaegmainlyforFITVGMS:ViewControlT100S:ConfigurablesystemmessagesT100W:ForWorkflowT100U:最后更改消息的usertableT5CBN:PCOperationConditions---------------需要指出的是你必须注意做重要的三个表T100:包含所有的messageT100C:你定义的message通常将出现在此表T100s:Configurablesystemmessages顾名思义就是你能设置的消息.比如OBA5你想设置F5060消息,这个是FB50在balance0你想强行save弹出的,在T100s中你将看到F5060不在其中,因为这是将影响财务的致命错误,当然OBA5是不允许你去设置的.**欺骗SAP使用OBA5强行SwitchoffF5060.------------------三.建立查询消息.T-code:SE91你可为自己的程序和Enhancement编写消息.通常在程序中你能看到类似.CALLFUNCTION'READ_CUSTOMIZED_MESSAGE'EXPORTINGi_arbgb=i_arbgbi_dtype=i_dtypei_msgnr=i_msgnrIMPORTINGe_msgty=l_msgts.IFl_msgtsNE'-'.(如果没switchoff)然后就是提示.然后去读T100C用户自定的messgetype(Error,warnig,error0决定是否继续work.四.设置消息(这个应该对大家有点用处)相关T-code:(**很多是雷同的)FI部分:OBA5:FImessgeBD60:AdditionaldataformessagetypeOFMG:FOrFMMessageO04C:PI:MessageControlPurchasingOFPM:ChangeMessageControlOMPJ:ReqmtsTypeMessageControlF00->***这个是sendofficemessageKD99:setupmessageKDNN:SetupmessaegMM-PUR部分:O04C:ForpurchaseOKZZ:InvoiceVerification/ValuationCO部分:OPR4_ACTMultilevelActualSettlementOPR4_CKMaterialCostEstimateOPR4_CKMLClosingandCalc.ofPeriodicPriceOPR4_CKPFPriceUpdateOPR4_KKAWIPCalculationOPR4_KKPRepetitiveMfgandProcessMfgOPR4_KKSCollectiveProcessing:VariancesOPR4_KKS1IndividualProcessing:VariancesOPR4_PPCOProductionOrder:CostCalculationOPR5DefinitionofErrorMgmtIDs(SAP)OPR1AreaofResponsibilityMessageOPR3DefinitionofBreakpointsOPR6Definitionof Object IDs(SAP)OPR7Def.ofAreasofResponsibilityOPR8Def.ofMinimumMessageTypes(SAP)OPR9Def.ofReference Object s(SAP)OPRCMFEUser-DefinedMessagesSD部分"OVAH:SDDefineVariableMessages--------------------SAP允许用户修改的消息都save在T100S中,你配置后的消息从T100C可看到但是如果我将不允许的消息强行coding塞进去,会有什么后果呢?---------------------***严格地将下面的T-code多是设置output打印的.M/30MaintainTypes:RFQM/32Maint.Determ.Schema:RFQM/34MaintainTypes:POM/36MaintainDeterm.Schema:POM/38Maint.Types:OutlineAgmt.M/40Maint.Types:Del.ScheduleM/42MaintainSchema:Del.Sched.M/48MaintainAccessSequences:RFQ M/50MaintainAccessSequences:PO M/56s:CreateCond.Table:RFQM/57s:ChangeConditionTableM/58s:DisplayCondTab:RFQM/59s:CreateCondTab:Pur.OrderM/60s:ChangeCondTab:Pur.OrderM/61s:Disp.CondT ab:Pur.OrderM/62s:CreateCondTab:Del.Schd.M/63s:ChangeCondTab:Del.Schd.M/64s:Disp.CondT ab:Del.Sched.M/65s:CreateCondTab:O.Agmt.M/66s:ChangeCondTab:O.Agmt.M/67s:Disp.CondT ab:Outl.Agmt.M/68MaintainSchema:Outl.Agmt.M/70s:CreateCondTab.:EntrySh.M/71s:ChangeCondTab.:EntrySh.M/72s:Disp.CondT ab.:EntrySh.M/73MaintainAccessSequences:Entry M/74MaintainAccessSequences:Entry M/75Maintains:Serv.EntrySheetM/76Displays:EntryM/77MaintainSchema:EntrySheetM/78Disp.Determ.Schema:EntryM/N1Maintainaccesses(fr.gds-purch.)五.重置警告消息.将消息warningchangetodisplay显示.MSW1ResetWarningsMSW2ResetWarnings六附录:Message_relatedtables:(部分)T100:AllmessageT100A:IDsfor T100T100C:ControlbyUserT100Assignmentofto objectT100S:ConfigurablesystemsT100SA:ApplicationAreasforConfigurablesT100U:LastpersontochangesT100V:Assignmentofstotables/viewsT100W:AssignstoWorkflowT100X:Errors:SupplementsT139A:Exceptions:PeriodClosingProgramT139B:Exceptions:PeriodClosingProgramT159F:MMIM:ErrorsResultingFromBlocked Object sT160M:Control:Purchasing(Systems)T160MVAL:categoryrestrictionforT160MT161M:Fine-TunedControl:TypesT161N:DeterminationSchemas:AssignmentT321K:DefinitionofAccumulatedstoHOST(R/2)T323P:ParametersforGeneratingLogsandMails(R/2->R/3) T440F:ExceptionsfortheforecastT458A:ExceptionsinMaterialRequirementsPlanningT458B:DescriptionofexceptionsT458C:SelectionGroupforExceptionsT555E:TimeEvaluationsT5CAR:forEmployeeAttributeCombinationT5CBN:sforPCOperationConditionsT5D5D:SupplementaryBenefitsforCivilService:FieldsT5D5E:SupplemenaryBens.forCivilService:ReasonTableT5E31:ActionsandsituationsforregistrationsT5F6N:GlobalErrors.T5F6NN:CommunicationofErrors(ADPInterface)T5MP1:GeneralsforthePBSRemunerationStatementT5QGM:PayrollHighlightsAustraliaT5QGT:sAreaCheckTableAustraliaT5QSM:SuperannuationHighlightsAustraliaT5S0S:sforsicknessadministration(SE)T5V5M:ssentelectronicallytoAA-registeretT5V7B:ssenttoemployees/emplyoersregisterT7NZGM:PayrollHighlightsNZT7NZSM:SuperannuationHighlightsNZTA20PPZ:handling:chosenprioritywithtoppriorityTA20PPZ1:handling(language-dependent)TA22RSF:START:ErrorsTA22RSF1:START:Errors(Language-Dependent)TAFWD:CORU:sthatarenotinterpretedaserrorsTBD05:DistributionmodelfortypesTBD12:Mappingtype->serializationandlinktypeTBD14:type->object typeTBD17:DependenciesbetweentypesTBD33:DependenciesbetweenmethodsandtypesTBD40:AssignTypestoSerializationGroupTBD53:ALE:Object ChannelSerialization:TypeofBus.Obj. TBD62:AssignmentofchangedocumentfieldtotypeTBDA2:ALEactiveTBDME:ALEsupplementdataforEDItypeTBDMS:AssignmentoftypetoIDoctypeTBDTPM:T emplateforTypeTBDTPMD:DataFiltersforTypesTC50:PP-PI:Proc.Categories/Proc.InstructionCategoriesTC50A:AssignmentofCharact.toDest.-Spec.TargetFieldsTC50C:CharacteristicsforProcesss/ProcessInstructionsTC50D:ProcessManagement:DestinationsTC50P:CharacteristicsforDest.-SpecificTargetFieldsTC50T:Process/Instr.Categories:Lang.-DependentT extsTC51T:Destinatiosn:Language-DependentTextsTC53:CharacteristicsGroupsforProcesssandInstructionsTC55:Destination-SpecificTargetFieldsforDestinationsTCA10:Tasklists:sdependingonthetasklisttypeTCB02:TypesofDestinationTCB02T:TypesofDestination:Language-DependentTextsTCB10:PredefinedProc.Categories/Proc.Instr.Categories TCB10T:PredefinedCategories:Language-Dependenttexts TCB11:AssignmentofCharacteristicstoPredefinedsTCB12T:PredefinedDestinations:Language-DependentTexts TCB13:TargetFieldsforPredefinedDestinationsTCB13T:TargetFieldsforPredef.Destin.:Lang-Dep.Texts TCB14:PredefinedAssignmentsofDestinationstoCategories TCB16:PredefinedCharact.GroupsforandInstructionCat.TCB18:PP-PI-PMA:SystemSettingsforProcessProcessing TCMF1:Assignment:AreaofResponsibilityTCMF9:MinimumType(SAP)TCMFA:User-DefinedsTCOINF:DisplayingInfo.inMonitor/CtrlRecipeMonitorTCPT1:Codepages:Table1fortestsandsTCUSSYSL:SummarytableoftypesreadfromthesystemlogTCY43:sforflowcontrolTCY43T:TextsforsforflowcontrolTDSP01:ALEDistributionPacket:TypestobeControlled TEMSG:SystemsTEMSI:CentralIDassignmentforExpresssTMAN1:TriggerConditionofDeterminationTMAN2:TriggerGroupofDeterminationTMAN2T:TriggerGroupofDetermination-DescriptionTMAN3:TriggerGroupofDetermination-TriggerCondition TMAN4:TriggerConditionss-Change-RelevantTablesTMAN5:TriggerCondss;PossibleChange-RelevantFields TMAN6:TriggerCondss:Change-Rel.Tblper Object+ChangeTyp TMAN7:TriggerConditions-ApplicationsTMSG1:LogicalsandProcessCodesinOutb.ProcgTMSG2:LogicalsandProcessCodesinInb.Procg TMSQAMTREE:TMS:AssigningtoTreeNodesintheAlertMonitor TMSQAMTRET:TMS:AssigningtoTreeNodesinAlertMonitor-Texts TNODE02_AP:T estcaseattributes:ProblemdataTOPRK:LogsTPT_WLIST_AREA:Processing:FunctionalAreaTPT_WLIST_AREA_T:Processing:FunctionalAreaTextTPT_WLIST_PROC:Processing:MethodsTPT_WLIST_PROC_T:Processing:ProcessingMethodText TRMSG:SyntaxCheckErrorsTSL1D:SystemLog(Formerly100SorTSL01)TSL1T:SystemLog:texts(Formerly T100S,TSL01)TSL2D:SystemLog:ClassificationIDforsTSL2T:SystemLog:ClassNamesTVERR:Basisverification:InfosforstobesentTVGMS:ViewControl:ErrorsTWPDAssignmentofretailtoPDorg.objectTXMIMSG:TableforLang.-Depend.TextsinXMILogTZ38T:Texttableforindicatorreasonforappendix8R5/97 TZW02:UserDetermineWFMCMSGENQ:SpecialHandlingforSystemsWPXST:POSinterface:statusexternalsubsystems(errors) WRPE:Replenishment:ErrorsWTMIGMESS:sLoggedforWithholdingTaxChangeover WTMIGMESSEXC:WithholdingTaxChangeover:AlternativeTypes。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Exception Handling in Workflow SystemsZongwei Luo, Amit Sheth, Krys Kochut, and John MillerLarge Scale Distributed Information System Lab415 GSRC, Computer Science department, University of GeorgiaAthens, GA 30602{luo, amit, kochut, jam}@AbstractIn this paper, defeasible workflow is proposed as a framework to support exception handling for workflow management. By using the “justified” ECA rules to capture more contexts in workflow modeling, defeasible workflow uses context dependent reasoning to enhance the exception handling capability of workflow management systems. In particular, this limits possible alternative exception handler candidates in dealing with exceptional situations. Furthermore, a case-based reasoning (CBR) mechanism with integrated human involvement is used to improve the exception handling capabilities. This involves collecting cases to capture experiences in handling exceptions, retrieving similar prior exception handling cases, and reusing the exception handling experiences captured in those cases in new situations.Keyword: Case-based Reasoning (CBR), Context-dependent Reasoning, Exception Handling, Ontology, Workflow System1 IntroductionWorkflow technology is considered nowadays as an essential technique to integrate distributed and often heterogeneous applications and information systems as well as to improve the effectiveness and productivity of business processes [1,2,3,4]. A workflow management system (WfMS) is a set of tools providing support for the necessary services of workflow creation, workflow enactment, and administration and monitoring of workflow processes, which consist of a network of tasks. These workflow processes are constructed to conform to their workflow specifications. However, due to foreseen or unforeseen situations, such as system malfunctions due to failure of physical components or changes in business environment, deviations (exceptions) of those workflow processes from their specifications are unavoidable. Workflow systems need exception handling mechanism to deal with those deviations. Exception-handling constructs, as well as the underlying mechanisms, should be sufficiently general to cover various aspects of exception handling in a uniform way. In addition, it helps to separate the modulesfor handling exceptional situations from the modules for the normal cases. We believe that designing an integrated human-computer process may provide better performance than moving toward an entirely automated process in exception handling.Let’s take a look at a motivating workflow application to characterize the scope of exception handling (see Figure 1.1). This infant transportation application involves the transportation of a very low birth weight infant of less than 750 grams, at or below 25-26 weeks gestation, from a rural hospital located within 100 miles from the Neonatal Intensive Care Unit (NICU) at the Medical College of Georgia (MCG). Such transportation usually takes up to 2.5 hours. In the ambulance there are two or three healthcare professionals who perform different roles. During the transport the ambulance personnel perform the standard procedures to obtain medical data for the infant. The first step of this application involves the task that allocates resources, such as healthcare professionals, equipment, and so on. The last step is to prepare for admission to the NICU.Figure 1.1 High-level workflow for newborn infant transportationIf exceptions are raised during the transport, corrective actions must take place. The decision of the corrective procedures involves collaboration and coordination between the ambulance personnel and the consultants at MCG’s NICU. This application is very dynamic because the changes to the infant’s health status as indicated by the vital signs such as the known risk factors may lead to changes in the treatment plan. Such changes can occur rapidly. For example, a low weight infant can dehydrate in as few as ten minutes while an adult would take at least several hours to reach the same severity. Such changes to theinfant’s status are modeled as exceptions. Consider a “normal” treatment plan as shown at the top of Figure 1.2. Occurrence of heart murmur that is known as a risk factor related to cardiac disease would be modeled as an exception (from the normally expected and correspondingly modeled process). One way of handling such an exception is to change the process such that the cardiovascular related task is performed earlier than what was originally planned (as shown at the bottom of Figure 1.2).Figure 1.2 Treatment plan change in infant transportation taskThis healthcare application raises several requirements for workflow systems to support:•The processes in this application are very dynamic. To support coordination of such processes, a systematic way of workflow evolution, including dynamic structure modifications should be worked out.•There are potential collaboration activities in this transport process; e.g., the healthcare professionals may need advice from specialists in the NICU. The advice is context based. The results from the collaborations may affect the progress of the ongoing process coordination.•The health professionals on board are not necessarily experienced in every aspect of intensive care. A case repository used in the case-based reasoning (CBR) [5] based exception-handling system stores valuable experience learned to help them make decisions.•Exceptions are not avoidable in such an environment. An abnormal situation can cause special attention for healthcare professionals. Those abnormal situations should be resolved as soon as possible due to the nature of this application -- newborn infant transport. Prior experience gained in handling similar abnormal situations can facilitate the exception resolution process. At the same time the set of exception handlers that need to be checked, can be limited by capturing more workflow execution context.Approaches to address the first two requirements, although topics of our research are beyond the scope of this paper. In this paper, we discuss an approach of defeasible workflow to address the last two requirements. Defeasible workflows target workflow applications in the dynamic and uncertain business environment by modeling organizational processes through justified ECA (JECA) rules developed to support context-dependent reasoning processes. There are three major contributions to exception handling in workflow management systems in this approach.1. By using the JECA rules to capture more contexts in workflow modeling, defeasible workflowenhances the exception handling capabilities of WfMSs through supporting context dependent reasoning in dealing with uncertainties. It can limit possible alternative exception handlers in dealing with exceptional situations.2. It considers workflow evolution, which is an active research topic, a good candidate to exceptionhandling,which is usually called adaptive exception handling. That is, possible modifications of workflows are considered as exception handlers, along with other candidates such as ignore, retry, workflow recovery, and so on. Thus, several modification primitives are given in defeasible workflow that will ensure the modified workflows meet the correctness criteria established.3. A case-based reasoning (CBR) [5] based exception handling mechanism with integrated humaninvolvements is used in defeasible workflow to support exception-handling processes. This mechanism enhances the exception handling capabilities through collecting cases to capture experiences in handling exceptions, retrieving similar prior exception handling cases, and reusing the exception handling experiences captured in those cases in new situations.The organization of this paper is as follows: We give a perspective on exceptions in section 2 that provides directions on how exception aware systems should be built. We introduce defeasible workflow in section 3 that is used to support such healthcare applications like the infant transport. In section 4, we introduce a CBR-based approach for the exception handling. In section 5, we discuss related works. Finally, section 6 concludes this paper.2 What is an exception?Exceptions in our view refer to facts or situations that are not modeled by the information systems or deviations between what we plan and what actually happen.Exceptions are raised to signal errors, faults, failures, and other deviations. They depend on what we want and what we can achieve. For example, in the infant transport application, space provided by an ambulance is limited. So is the transport time. The exception handling mechanisms might be different from that used in NICUs because of the differences in time, space and places. In most realistic situations and non-trivial systems, there are always interests conflicts between what we want and what we can achieve. It is more acceptable to design a system that canoperate as best as it can; when there is an exception, it can be handled by the system. We call such a system an exception-aware system.Exceptions provide great opportunities for the systems to learn, correct themselves, and evolve. To build an exception aware system, it is beneficial to clarify the nature of exceptions to get guidelines in the systems development. As shown in Figure 2.1, known, detectable, and resolvable form three dimensions for the exception knowledge space. The known dimension is usually captured through exception specification. Supervision is one of the approaches to enlarge exception knowledge space in the detectable dimension. To resolve exceptions, capable exception handlers should be available that make up the resolvable dimension of the exception knowledge space. Any position in this exception knowledge space can be represented as an exception point. The exception knowledge of an exception aware system is the set of all those points.KnownResolvable DetectableLearning systemSupervisionHandlingFigure 2.1 Three-dimensional analyses of exceptions•Known: Every person’s knowledge is limited. The same is true for a system. The world is governed by rules that either we know or we are still investigating, and our knowledge continues to expand through learning. As this learning process continues and unknown or uncertainties become known, the decision may be revised and other uncertainties may be considered. When a system cannot meet the new situation, exceptions occur. We call these kinds of exceptions unknown exceptions, since they are beyond the system’s current knowledge. Otherwise, we consider them known. For example, during the transport of the newborn infant, an unknown exception may be caused by an abnormal situation that has not been met before. A basic solution to unknown exceptions is to build an open system that is able to learn and can be adapted to handle those exceptions.•Detectable: Exceptions can be classified based on a system’s capabilities to detect an exception. If systems can notice the occurrence of an exception then we call it a detectable exception; otherwise we consider it undetectable. An unknown exception is usually undetectable because there is no way forthe system to know about it until further improvement to the system is accomplished to achieve that capability. Sometimes an unknown exception might be detected as another known exception.Detection of an exception depends on the system’s capabilities. For example, if there is no equipment on board to measure certain situations, e.g., neurologic checking of the newborn infant, exceptions related to neurologic situations might not be detected. Moreover, if there is no mapping from the errors occurring in the measuring equipment in which an equipment related exception should be raised to a workflow system’s exception, that equipment exception will not be detected either. If the system can notice that there is an exception, it may be possible for the system to derive capable exception handlers to handle such exceptional situations.•Resolvable: Undetectable exceptions are not resolvable at the time of occurrence, for their occurrences are unknown to the system. Also, there are certain known exceptions that may be ignored during system modeling time for certain specific reasons, such as the frequency of their occurrences is so low, the effect caused by the exceptions to the system can be ignored. When such exceptions actually occur, the system cannot handle them (e.g., the Y2K bug). For example, on board there are necessary medicines for commonly occurring health conditions for newborn infants. When a medicine is not on board but is needed for a situation that rarely occurs, then the corresponding exception to the process is not resolvable at that time. Based on the system’s handling capability, exceptions can be categorized into two categories: resolvable and irresolvable. When exceptions occur, the system can derive a solution to resolve the deviations. Such exceptions are called resolvable exceptions. When exceptions occur, but the system cannot derive a solution to solve the deviation to meet the requirement, then it is called irresolvable exceptions.Based on the above perspective, exception aware systems should be built to have adequate initial exception knowledge represented as exception points. To deal with exceptional situations, a system actually finds an exception point in the exception knowledge space through propagation and masking. Propagation allows a system to propagate an exception to a more appropriate system component to find an appropriate exception point. Masking usually means when there are several exception points, the one that is close to where exception is detected is the best candidate. Defeasible workflow is proposed in section 3 to support a systematic way of propagation and masking.3Defeasible workflowOrganizational processes are often dynamic. They evolve over time and often involve uncertainty. To adapt to its environment, a workflow should be flexible enough that necessary modifications to its specifications and instances are allowed. They need to be complemented with execution support or run-time solutions such as dynamic scheduling, dynamic resource binding, runtime workflow specification, and infrastructure reconfiguration. For example, uncertainties in clinical decision-making processes, such as incomplete datain the report, should be eliminated as early as possible, preferably at the design stage. However, if this is not possible at runtime exceptions should be raised and handled. The clinical decision-making is a process by which alternative strategies of care are considered and selected. Those alternatives can be potentially limited if more useful contexts are available during the clinical decision-making. Furthermore, the following basic facts about clinical decision processes [6] have shown that in very complicated situations, necessary contexts should be captured in order to make correct decisions efficiently:•“Human and environmental influences are frequently complex, uncertain and difficult to control”.Necessary context can help analyze the complex situations.•“Decisions should be clear-cut and error-free. The nursing and medical professions have expressed an interest in the precision and objectivity by which decisions are made, while simultaneously retaining an individualistic, holistic approach to patient management”. The context-dependent reasoning approach is one of the solutions to support such decision-making processes.•“Standardization of management plans is usually accompanied by paying less attention to differences in patients’ needs”. This actually means such standardization should consider individual differences that can only be achieved by adding exceptions to the standardization. Those exceptions are actually used to capture necessary context when the standardized plans are enforced.Defeasible workflows target workflow applications in the dynamic and uncertain business environment by capturing more workflow contexts and supporting context-dependent reasoning processes. They are characterized as follows:•Organizational processes are modeled through JECA rules (see below).•When no default consequences can be derived during the execution, or the conflicts occur that cannot be resolved in the default evaluation, exceptions will be raised. WfMSs will try to derive capable handlers to handle the raised exceptions.•If none of the derived handlers are suitable, or handlers cannot be derived, past experiences in handling exceptions will be sought and reused by retrieving and adapting similar exception handling cases stored in the case repository.•Human interaction will be necessary if no acceptable solutions can be automatically derived. Solutions provided by a person, who is usually a specialist, will be abstracted, and stored into the case repository.3.1 JECA RulesW e have extended the well known ECA rules specification as Justified Event-Condition-Action (JECA) rules to model business logic based on work in context-dependent reasoning [7]. There are several workflow prototypes (e.g. [8, 9]) that have adopted ECA rules as modeling tools. However, the contexts that can be captured by ECA rules are limited. The C in an ECA rule, which is used to capture rules evaluation context, is used as a condition that should be satisfied so that the action specified in that ECArule can be executed. That is, an ECA rule, once triggered, can only be denied if its condition cannot be satisfied. This makes ECA rules incapable in modeling workflows in uncertain business environments. In JECA rules, justification (J) provides a reasoning context for the evaluations of ECA rules to support context dependent reasoning processes in dealing with uncertainties. Each JECA rule r (j, e, c, a) consists of four parts as follows:•Justification (j): Justification forms the reasoning context in which evaluation of the specific JECA rule to be performed. Usually it is specified as a disqualifier, i.e., a JECA rule will be disqualified if its justification is evaluated true.•Event (e): when event occurs, related JECA rules will be evaluated. We say the JECA rules are triggered.•Condition (c): logic constraints to be satisfied so the action in the rule can be taken if the rule is not disqualified.•Action (a): necessary actions to be taken if this rule is not disqualified, and events occur, conditions are met.Consider a simple rule-processing algorithm given in Algorithm 3.1. This algorithm executes JECA rules by picking up a triggered rule one by one. When there are no more triggered rules, execution will terminate.while there are triggered JECA rules do:1. find a triggered JECA rule r2. evaluate r’s condition and justification3. if r’s condition is true, and justification is not true then execute r’s actionAlgorithm 3.1 A simple JECA rule execution algorithmConsider the following example of exception handling rule in dealing with an exception related to cardiac disease d. In this rule, the exception is related to certain type of cardiac disease d, and the corrective action is to take an initial assessment for this type of cardiac disease d. The justification provides a reasoning context (as commonly followed in this medical specialty) that if there are one or more blood family members of opposite sex who had this type of cardiac disease d before, then this disease cannot be this type of cardiac disease d. The initial assessment can only be performed if the justification doesn’t disqualify this JECA rule.Event: Cardiac disease d related exception eventCondition: Risk factor is heart murmurs (related to the type Cardiac Disease d)Action: Initial Assessment for Cardiac Disease dJustification: Blood family member of opposite sex does have this type of Cardiacdisease dThe above example, if modeled in ECA rules, can be:Event: Cardiac disease d related exception eventCondition: Risk factor is heart murmur (related to the type Cardiac Disease d) and Blood family member of opposite sex doesn't have this type of Cardiac disease dAction: Initial Assessment for Cardiac Disease d.When a cardiac disease d related exception event actually occurs, necessary contexts should be available so that the condition in that ECA rule can be checked, i.e., the risk factor is heart murmur and blood family member of opposite sex does have this type of cardiac disease. If the condition "Blood family member of opposite sex does have this type of cardiac disease d" cannot be checked true, then this ECA rule cannot be satisfied. Is it correct not to model that condition of "Blood family member of opposite sex does have this type of cardiac disease d" in the ECA rule? The ECA rule then becomes:Event: Cardiac disease d related exception eventCondition: Risk factor is heart murmur (related to the type Cardiac Disease d)Action: Initial Assessment for Cardiac Disease d.However, the answer is no, because this ECA rule cannot model that the action should not be executed when condition "Blood family member of opposite sex does have this type of cardiac disease d" is true. In the approach of JECA rules, the condition of "Blood family member of opposite sex does have this type of cardiac disease d" is a justification for that JECA rule. If the justification cannot be evaluated true, then the JECA rule will not be disqualified. So the action in that JECA rule can be executed if the risk factor of heart murmur is true.3.2 JECA rules evaluationTo apply the context-dependent reasoning processes [7], those JECA rules are transformed into a form that is usually used in the context-dependent reasoning, called default [7]. A default has three parts, prerequisite(P), justification (J), and consequence(C) specified in logic expressions. Those defaults are constructed through JECA rules with mappings from J to justifications, C to prerequisite and A to consequence. Usually E in a JECA rule is associated with the justifications and prerequisite in the default that the JECA rule is mapped to. In order to apply the defaults, the prerequisite of the defaults should be proved. It is required the defaults should be justified. This means the justifications should not deny the applicability of the default. Consequence, the third part in default, forms a belief set through extension computation [7]. Please refer to [7] for detailed information about extension computation. Conflicts such as inconsistencies existing in the belief set should be resolved by non-monotonic reasoning process in whichreasoning results may become invalid if more facts become available, or reasoning context has changed. An algorithm of execution of JECA rules through default evaluation is given in Algorithm 3.2.while there are triggered defaults do:1. find related defaults2. evaluate defaults through context dependent reasoning, resolve anyconflicts in the belief set3. actions in the belief set will be executedAlgorithm 3.2 JECA rule processing through default evaluationT he defaults will be clustered into several sets called domains. Each default is associated with a local reasoning unit. If the local reasoning unit cannot make an acceptable decision, another reasoning unit at that domain that can get access to domain context will be consulted. A global reasoning unit is responsible for decision making in the global context. The local reasoning unit can also make a decision according to the partially available information without consulting another local unit or a unit at a higher level. This clustered reasoning architecture is well suited in workflow management because organizational processes modeled by workflows are clustered and/or layered in nature in which local decisions can often be reached. The criteria used in clustering can be either one or a combination of the following:•Security: For security reasons, defaults must be clustered so sensitive information can be exchanged ina controlled manner. In the infant transport example certain medical records that may contain sensitiveinformation, such as HIV, abnormal behavior of the infant's parents, should be securely controlled. •Organization: It is natural to cluster defaults into several domains to model the organizational structure in that organization. In the infant transport example the defaults can be grouped according to the organizational roles those health professionals can play.•Performance: To provide better performance, it is necessary to cluster the defaults into several domains in which defaults can be more efficiently found and evaluated.3.3 Conflict resolutionD uring JECA rules evaluation, dynamic resolution is used to select default values (resources, algorithms, routing, numerical values, etc.) and resolve conflicts. Inconsistent information as well as coarse rule granularity in JECA rules can lead to conflicts during default evaluation. The conflicts may lead to exceptions if the conflicts cannot be resolved in the default evaluation. Conflicts in default evaluation can be either one or more of the following:•Temporal conflict: defaults formed in subsequent time result in conflicts. For example, the healthcare professionals make two decisions separately. The decisions are specified in defaults that are fed into the workflow systems in the order the decisions are made. It is possible that the two decisions mayresult in conflicts. The first decision may involve certain kinds of drugs to be applied. The second decision may involve drugs that should not be applied after the drugs in the first decision are applied. •Role conflict: defaults formed or evaluated by different role may result in conflicts. The healthcare professionals on board may have different opinions about the situation of the infant. During the assignment of healthcare professionals to the transport of infant, there may exist role conflicts, such as agents not available, an agent who can play that the caregiver role is not suitable to attend the infant. •Semantic conflict: An example that might lead to semantic conflicts is alternative interpretation of the consequence of defaults. This is possible due to the nature of non-monotonic reasoning that is context dependent. If the contexts are different, interpretations in different contexts may also be different.T o resolve those conflicts, the defaults are assigned priorities, or more generally, are ordered by partial ordering relations regulated in business policies (organizational, security, etc.). That is, some defaults may be preferable to others, and assuming they are applicable, they should be used first. To resolve any inconsistencies, polices are based on one of the following criteria:•Special: Preference will be given to exceptions over normal cases. For example, whenever a local decision cannot be made in the default evaluation, an exception is always raised.•Hierarchical: Consequences derived at higher positions in the hierarchy will be favored over those at lower positions. In the infant transport application, if the medical situation of the infant becomes serious, the decision made from the personnel at a higher position who can be responsible for the action taken will be preferred.•Temporal: Consequences from latest defaults will be favored over earlier ones. In the infant transport application, the personnel on board may consult the experts in the MCG’s care unit (NICU). During the decision making process, the experts in the NICU might give one suggestion at one time, and later they might come up with another suggestion. The later one might be given a higher priority during the decision making process.•Semantic: Interpretations that are more plausible will be preferred to less plausible ones. In the example application, if a symptom is discovered and if it might be caused by several different reasons, the personnel on board may derive one that he believes is the most reasonable.3.4 Rule graphsIn rule execution, there is a danger of non-termination. In this section, we give a sufficient condition for the termination of rule execution over a JECA rule set by extending the rule graphs in [10]. Furthermore we adapt the results from rule analysis [11] for workflow modeling. Further details about rule analysis related proofs appear in [10, 11]. We ensure termination of evaluation of J and C in JECA rule evaluation, we limit the logic expressions used in specifying J and C components of JECA rules to be quantifier free. Furthermore, we assume that facts that need to be checked in rule evaluations are finite.。