Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Process mining through dynamic analysis for modernising legacy systems

Process mining through dynamic analysis for modernising legacy systems

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Software — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Information systems age over time and become legacy information systems which often embed business knowledge that is not present in any other artefact. The embedded knowledge must be preserved to align the modernised versions of the legacy systems with the current business processes of an organisation. Modernisation efforts to preserve business knowledge typically consider different software artefacts as knowledge sources (e.g. code, databases, documentation etc.). Usually, the business knowledge needed to modernise a respective legacy system is statically recovered by reverse engineering techniques. Unfortunately, there is much knowledge that is only known during system execution. This study provides a semi-automatic technique based on dynamic analysis, combined with static analysis to instrument the source code for obtaining event log models. The event log represents a mapping between the pieces of source code executed and the business activities that they support. The obtained event log can then be used to mine the business processes embedded in legacy systems. In addition, the feasibility of the technique is validated by means of a formal case study, using a real-life legacy information system. The case study reports that the technique makes it possible to obtain event logs to effectively and efficiently discover business processes.

References

    1. 1)
      • ISO/IEC, ISO/IEC 14764:2006. Software engineering – software life cycle processes – maintenance, 2006, http://www.iso.org/iso/catalogue_detail.htm?csnumber=39064.
    2. 2)
    3. 3)
    4. 4)
      • Ackermann, C., Lindvall, M., Cleaveland, R.: `Recovering views of inter-system interaction behaviors’', Proc. 16th Working Conf. on Reverse Engineering, 2009, p. 53–61.
    5. 5)
      • van der Aalst, W.M.P., van Dongenm, B.F., Günther, C., Rozinat, A., Verbeek, H.M.W., Weijters, A.J.M.M.: `ProM: the process mining toolkit’', Seventh Int. Conf. Business Process Management (BPM'09) – Demonstration Track, 2009, Ulm, Germany, p. 1–4.
    6. 6)
      • Brereton, P., Kitchenham, B., Budgen, D., Li, Z.: `Using a protocol template for case study planning’', Evaluation and Assessment in Software Engineering (EASE'08), 2008, Bari, Italia.
    7. 7)
      • R.K. Yin . (2003) Case study research. Design and methods.
    8. 8)
      • M. Castellanos , K.A.d. Medeiros , J. Mendling , B. Weber , A.J.M.M. Weitjers , J.J. Cardoso , W.M.P. van der Aalst . (2009) Business process intelligence,, Handbook of research on business process modeling.
    9. 9)
      • (2010) CHAOS summary 2010.
    10. 10)
    11. 11)
      • W.-J.v.d. Heuvel . (2006) Aligning modern business processes and legacy systems: a component-based perspective (Cooperative information systems).
    12. 12)
      • Davis, J., Goadrich, M.: `The relationship between precision-recall and ROC curves’', Proc. 23rd Int. Conf. Machine Learning, 2006, Pittsburgh, Pennsylvania, p. 233–240.
    13. 13)
      • B. Moyer . Software archeology. Modernizing old systems. Embed. Technol. J.
    14. 14)
      • Di Francescomarino, C., Marchetto, A., Tonella, P.: `Reverse engineering of business processes exposed as web applications’', 13thEuropean Conf. on Software Maintenance and Reengineering (CSMR'09), 2009, Kaiserslautern, Germany, p. 139–148.
    15. 15)
      • J. Jeston , J. Nelis , T. Davenport . (2008) Business process management: practical guidelines to successful implementations.
    16. 16)
      • E. Gamma , R. Helm , R. Johnson , J.M. Vlissides . (1994) Design patterns: elements of reusable object-oriented software.
    17. 17)
      • J. Miller , J. Mukerji . MDA Guide Version 1.0.1, 2003.
    18. 18)
      • M. Dumas , W. van der Aalst , A. Ter Hofstede . (2005) Process-aware information systems: bridging people and software through process technology.
    19. 19)
      • Wang, X., Sun, J., Yang, X., He, Z., Maddineni, S.: `Business rules extraction from large legacy systems’', Proc. Eighth Euromicro Working Conf. Software Maintenance and Reengineering (CSMR'04), 2004.
    20. 20)
      • OMG, QVT: Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, 2008, http://www.omg.org/spec/QVT/1.0/PDF, OMG.
    21. 21)
      • Ratiu, D.: `Reverse engineering domain models from source code’', Int. Workshop on Reverse Engineering Models from Software Artifacts (REM'09), 2009, Lille, France, p. 13–16.
    22. 22)
      • B. Paradauskas , A. Laurikaitis . Business knowledge extraction from legacy information systems. J. Inf. Technol. Control , 3 , 214 - 221
    23. 23)
    24. 24)
      • OMG: ADM Task Force by OMG, 2007, 9/06/2009 [cited 2008, 15/06/2009]. Available at: URL.
    25. 25)
      • do Nascimento, G.S., Iochpe, C., Thom, L.H., Reichert, M.: `A method for rewriting legacy systems using business process management technology’', 11thInt. Conf. Enterprise Information Systems (ICEIS'09), 2009, Milan, Italy, p. 57–62.
    26. 26)
      • Ingvaldsen, J.E., Gulla, J.A.: `Preprocessing support for large scale process mining of SAP transactions', Business Process Intelligence Workshop (BPI'07), 2008, p. 30–41, (LNCS, 4928).
    27. 27)
      • ISO/IEC, ISO/IEC DIS 19506. Knowledge discovery meta-model (KDM), v1.1 (architecture-driven modernization), 2009, http://www.iso.org/iso/catalogue_detail.htm?csnumber=32625, ISO/IEC, p. 302.
    28. 28)
      • P. Ammann , J. Offutt . (2008) Introduction to software testing.
    29. 29)
      • Zou, Y., Hung, M.: `An approach for extracting workflows from e-commerce applications’', Proc. 14th Int. Conf. Program Comprehension, 2006, p. 127–136.
    30. 30)
      • Günther, C.W., van der Aalst, W.M.P.: `A generic import framework for process event logs', Business Process Intelligence Workshop (BPI'06), 2007, p. 81–92, (LNCS, 4103).
    31. 31)
      • V. Khusidman , W. Ulrich . Architecture-driven modernization: transforming the enterprise.
    32. 32)
      • Newcomb, P.: `Architecture-driven modernization (ADM)’', Proc. 12th Working Conf. on Reverse Engineering, 2005.
    33. 33)
      • Lucrédio, D., Fortes, R.P.M., Whittle, J.: `MOOGLE: a model search engine’', 11thInt. Conf. Model Driven Engineering Languages and Systems, 2008, Toulouse, France, p. 296–310.
    34. 34)
      • M. Weske . (2007) Business process management: concepts, languages, architectures (Leipzig, Alemania).
    35. 35)
      • W. van der Aalst , A.J.M.M. Weijters , M. Dumas , W. van der Aalst , A. Ter Hofstede . (2005) Process mining,, Process-aware information systems: bridging people and software through process technology.
    36. 36)
      • ikv++, Medini QVT. http://www.ikv.de/index.php?option=com_content&task=view&id=75&Itemid=77. 2008, (ikv++ technologies ag).
    37. 37)
      • Ye, Y., Fischer, G.: `Supporting reuse by delivering task-relevant and personalized information’', 24thInt. Conf. Software Engineering, 2002, Orlando, Florida, p. 513–523.
    38. 38)
      • Ghose, A., Koliadis, G., Chueng, A.: `Process discovery from model and text artefacts’', IEEE Congress on Services (Services'07), 2007.
    39. 39)
      • M.L. Brodie , M. Stonebraker . (1995) Migrating legacy systems: gateways, interfaces, and the incremental approach.
    40. 40)
      • Garcia, V.C., Lucrédio, D., Durão, F.A.: `From specification to experimentation: a software component search engine architecture’', Ninth Int. Symp. on Component-Based Software Engineering (CBSE 2006), 2006, Västerås, Sweden, p. 82–97.
    41. 41)
      • Pérez-Castillo, R., García-Rodríguez de Guzmán, I., ávila-García, O., Piattini, M.: `MARBLE: a modernization approach for recovering business processes from legacy systems’', Int. Workshop on Reverse Engineering Models from Software Artifacts (REM'09), 2009, Lille, France, p. 17–20.
    42. 42)
      • Cai, Z., Yang, X., Wang, W.: `Business process recovery for system maintenance – an empirical approach’', 25thInt. Conf. on Software Maintenance (ICSM'09), 2009, Edmonton, Canada, p. 399–402.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-sen.2010.0103
Loading

Related content

content/journals/10.1049/iet-sen.2010.0103
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address