首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
本文提出了一种基于描述逻辑的本体和规则的半自动业务流程配置框架。设计并实现了可配置节点本体及业务规则本体,提出七类元规则指导业务规则的撰写。最后提出基于C-iEPC的流程配置算法,对可配置流程进行配置。本文使用案例进行验证,结果证明本文方法能够在降低人工成本的基础上,取得与国际主流的问卷式流程配置方法相近的效果,并使用经验验证的方法证明了本文方法的实用性和有效性。  相似文献   

2.
本文设计并实现了基于Java注解的规则引擎Drools业务规则开发框架.该开发框架针对Drools业务规则存在的无法语法检查、无法调试等问题,基于Java注解技术,直接使用Java语言实现业务逻辑,单元测试通过后生成Drools业务规则,从而提升代码质量并提高开发效率.  相似文献   

3.
One of the main barriers to the successful migration of legacy systems is lack of information about the system to be migrated.With the complexity of modern information systems, it is rarely the case that an organisation has a complete end-to-endunderstanding of its systems, business processes and information. This is particularly true of the business rules enforced by suchsystems, which are often poorly documented (if at all) and incompletely understood by those who own, use and maintain suchsystems. These business rules must be migrated, along with the other system functionality, but this is difficult when they areburied deep within the source code of the system. In this paper, we propose a method for the discovery of business rules throughinspection of the source code of legacy systems. We also describe the results of a comprehensive evaluation exercise undertakenwithin BT, in which the method was applied to a legacy system about to undergo migration. The results of this study indicatedconsiderable success for the method in extracting valid business rules, but also highlighted some weaknesses. Most significantly,the cost of applying the method is a factor of the size and complexity of the system being analysed, and not of the number ofbusiness rules elicited. In order to address this, we propose a cut-down version of the method that can be used to produce a quickestimate of the likely yield of business rules from a program. Together, these two forms of the method aid personnel engaged insystem migration projects in making maximum use of the scarce resources are available for business rule discovery.  相似文献   

4.
莫启  笪建  代飞  朱锐  林雷蕾  李彤 《电子学报》2018,46(10):2551-2560
私有过程是构建协同业务过程基础,其正确与否对业务协同实施产生直接影响.为此,提出了一种逐步求精构建私有过程的方法.首先,定义私有过程,并将其控制流抽象为四种基本块,即顺序块、并发块、选择块及迭代块;然后,针对四种基本块提出各自的精化规则,并以此为基础提出了私有过程构建方法;最后,从理论上证明了通过该方法建立的私有过程具有工作流网特性且是正确的.通过对协同制造中供应链建模并与现有的、典型的方法对比分析,结果表明:相对已有的工作,本文方法能够更加有效地对私有过程进行建模.  相似文献   

5.
一种以过程为中心的基于工作流的信息系统开发与应用   总被引:3,自引:2,他引:1  
文章从软件开发方法方面对信息系统中如何利用工作流技术来弥补传统信息系统对业务流程控制逻辑缺乏支持的缺陷,进行了深入研究.并提出了一种以过程为中心的信息系统概念,强调以组织的经营过程为主线来构筑信息系统,而不只是单纯从信息处理角度来考虑.对过程的支持主要利用工作流技术,它可以将过程与实现过程的功能和数据之间进行分离,从而提高信息系统对过程改变的灵活性。  相似文献   

6.
商业银行稽核系统的ETL设计及改进方法   总被引:2,自引:2,他引:0  
在数据仓库项目的实施中,为了实现整个ETL过程的顺利执行,需要针对单个ETL过程和整个数据流程进行协调调度处理,以保证数据按照我们的转化规则和业务逻辑正确地进入数据仓库.本文介绍某银行稽核系统ETL的设计方法,并给出一些改进的建议.  相似文献   

7.
越来越多的企业采用面向服务的架构来构建其信息基础设施,并通过执行Web服务流程来实现其业务逻辑。然而,当前作为工业界标准的服务流程建模语言BPEL4WS只能支持非常有限的运行时动态性,难以适应复杂多变的业务需求。针对这一问题,提出了在BPEL4WS及其执行引擎之上,实现基于语义的服务流程动态细化的机制——在BPEL4WS中增加目标类型的活动以及流程的语义描述;扩展现有BPEL4WS执行引擎使之能够执行带有目标活动的流程,并能够根据目标描述与流程的数据内容,在运行时为目标活动匹配与绑定子流程。  相似文献   

8.
In recent years, numerous studies have identified and explored issues related to web‐service‐oriented business process specifications, such as business process execution language (BPEL). In particular, business rules are an important cross‐cutting concern that should be distinguished from business process instances. In this paper, we present a rule‐based aspect oriented programming (AOP) framework where business rule aspects contained in business processes can be effectively separated and executed. This is achieved by using a mechanism of the business rule itself at the business rule engine instead of using existing programming language‐based AOP technologies. Through some illustrative examples, this work also introduces a method by which business rule aspects, separated through an external rule engine, can be represented and evaluated. We also demonstrate how they can be dynamically woven and executed by providing an implementation example which uses two open‐source‐based products, the Mandarax rules engine and Bexee BPEL engine.  相似文献   

9.
现代企业的应用程序和信息已成为公司相当重要的资产,大多数企业都希望此应用能够提供业务流程全面的支持.这就意味着应用程序和业务流程应该紧密结合,然而,应用程序的每次修改都会减少其结构对其未来变化的鲁棒性.基于对业务流程通信便捷性的目的,本文采用实例验证的方法,结合Drools优化车间调度问题,用Web Sevices 和BPEL加以实现,并以机械加工流程为例加以验证,得出了BPEL和Drools结合能够较好实现加工流程的多服务调用和交互和通信的结论.  相似文献   

10.
Mobile agent is widely used in area such as parallel distributed computing for higher performance. But security issues threaten both the algorithm and data running on mobile agent system. The sensitive information within mobile agent code is inclined to be reverse engineered on a host platform. Obfuscation provides effective protection in this case with little execution time and storage size overhead. In this paper, we propose an obfuscation algorithm based on self-modifying code to prevent mobile agent code from attack at function level. We implement the algorithm and prove the efficacy of the algorithm.  相似文献   

11.
Information technology (IT) infrastructure is the foundation of information sharing, storage, and processing upon which the entire business depends and it changes not only inner organizational structures but also outer competitive conditions. An IT infrastructure that possesses elements unique to a particular organization and difficult to duplicate can produce competitive advantage. To achieve this advantage, not only the inner integration of technology, personnel and business process in a firm is needed, but also a platform for electronic commerce is required. The purpose of this study is to establish the whole concept framework for IT infrastructure, based on competitive advantage, and to propose ideas about the construction of IT infrastructure system.  相似文献   

12.
Business process redesign and improvement has become an increasingly attractive subject in the wider area of business process intelligence. Although there have been many attempts to establish a business process redesign framework, there is little work on the actual optimisation of business processes with given objectives. Furthermore, most of the attempts to optimise a business process are manual and do not involve a formal automated methodology. This paper proposes a process improvement approach for automated multi-objective optimisation of business processes. The proposed framework uses a generic business process model that is formally defined. The formal definition of business processes is necessary to ensure that the optimisation will take place in a clearly defined, repeatable and verifiable way. Multi-objectivity is expressed in terms of process cost and duration as two key objectives for any business process. The business process model is programmed and incorporated into a software optimisation platform where a selection of multi-objective optimisation algorithms can be applied to a business process design. This paper outlines a case study of business process design that is optimised by the state-of-the-art multi-objective optimisation algorithm NSGA2. The results indicate that, although business process optimisation is a highly constrained problem with fragmented search space, a number of alternative optimised business processes that meet the optimisation criteria can be produced. The paper also provides directions for future research in this area.  相似文献   

13.
基于语义度量的RDF图近似查询   总被引:1,自引:0,他引:1       下载免费PDF全文
  相似文献   

14.
论文针对目前网银系统和电子支付存在交易风险的缺陷,模拟了传统的银行柜台纸质交易方式,运营方将消费者的商务请求生成支付、交付及清算合同,并通过向银行方发起执行支付合同;运营方从消费方完成扣款,向商家发起执行交付合同;消费者从商家收到货,向银行方发起执行清算合同;商家与运营方完成资金清算。本方法还建立了运营方和消费者、银行、商家之间的三重代理与认证机制以及通过电子合同解析执行隐蔽了真实银行账号的措施,从而实现了新型的安全电子支付。  相似文献   

15.
Ubiquitous computing applications or widespread robots interactions execute in unforeseen environments and need to adapt to changeful available services, user needs, and variations of the environment. Context-awareness ability addresses such a need, enabling, through adaptation rules, applications to react to the perceived dynamic variations. Responses to adaptation have to be quick enough to maximize the time during which the application is coherent with its environment. Adaptation rules, associating variations of the environment to application reactions, are usually established at design time. However, in unforeseen and partially anticipated environments, we claim that adaptation rules have to be dynamically extensible to match previously unexpected variations. Our approach enables rule composition and ensures a deterministic result. We propose to use parameter adaptation to quickly respond to environmental variations and dynamic compositional adaptation to provide extensibility to the parameter adaptation. To foster even lower response times, we internalize context-awareness processing and decision into the application.  相似文献   

16.
杨锐 《现代电子技术》2007,30(16):75-76,82
给出了一种采用Servlet技术实现基于B/S结构的信息管理系统中数据采集的方法:利用Servlet将数据采集代理集成到整个B/S结构中,让用户可以通过远程的浏览器访问Web服务器来控制数据采集代理的运行以实现数据获取。该方法的有效性已在某订单分析系统中得到实现和验证。  相似文献   

17.
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies.  相似文献   

18.
王仁 《电子世界》2014,(9):18-19
针对煤炭集团公司建设"一站式"综合信息管理平台过程中,各个不同业务系统中相关联的数据实体,由于表示方法、业务实体、业务系统采用的技术以及存储数据库的类型等的不同,导致大量异构数据需要转换。本文通过提出一种基于XML格式的数据转换方法,根据目标业务实体的复杂结构和目标数据实体的数据生成规则,把复杂的数据转换过程分解为一个或多个简单的数据转换单元,大大提高了数据转换的效率和准确性,具有较和高的实际应用价值。  相似文献   

19.
本文主要针对无线网络中的大量用户和大量WAP网站的安全可信问题,提出了一种基于用户和业务的双向安全可信框架.在双向安全可信框架下,网络可以对用户和业务进行分级评价,进而决定是否允许用户访问业务或业务内容通过网络进行发布.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号