<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Design it like Darwin 2.0</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jonas Manderscheid</string-name>
          <email>jonas.manderscheid@fim-rc.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maximilian Röglinger</string-name>
          <email>maximilian.roeglinger@fim-rc.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tobias Ruby</string-name>
          <email>tobias.ruby@fim-rc.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johannes Seyfried</string-name>
          <email>johannes.seyfried@fim-rc.de</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>FIM Research Center, University of Augsburg</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Project Group Business &amp; Information Systems Engineering of the Fraunhofer FIT</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Process redesign is an important and valuable phase of the business process management (BPM) lifecycle. However, human creativity and objectiveness regarding continuous redesign initiatives are limited and biased. To overcome these limitations, we propose computational support based on evolutionary algorithms. Our software tool extends a formerly published proof of concept. Novelties have been introduced by including a new data structure, new mutation and crossover operators as well as an extended evaluation of unambiguous process designs explicitly considering time objectives. Finally, the tool provides new computation process (re-) design support to the BPM community.</p>
      </abstract>
      <kwd-group>
        <kwd>business process management</kwd>
        <kwd>process redesign</kwd>
        <kwd>computational intelligence</kwd>
        <kwd>evolutionary algorithm</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Background and Significance to the BPM field</title>
      <p>
        Business process management (BPM) is an acknowledged way to facilitate
value-creating process improvement activities [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Nevertheless, process (re-) design mainly
relies on human intuition limiting the solution space [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The practical toolkit for process
(re-) design still lacks computational support [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], even though algorithms can
outperform humans in creating and benchmarking processes due to their speed and neutrality
[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Consequently, computational intelligence (CI) in terms of machine learning
abilities has been introduced to business process (re-) design in the mid-nineteens. After
initial process automation approaches [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], CI’s rising popularity meanwhile facilitated
computational tool support for process (re-) design [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The tool portfolio ranges from
semi-automatic approaches to the successfully application of evolutionary algorithms
(EA), as part of CI, for automatic process (re-) design [
        <xref ref-type="bibr" rid="ref7 ref8">7,8</xref>
        ].
      </p>
      <p>
        EAs describe heuristics tightly related to Darwin’s approach of natural selection,
known as survival of the fittest [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], as the idea behind EA is similar to the BPM
lifecycle: developing improved generations of business processes. In doing so, EA start with
a population of known and/or randomly created genomes (i.e., process designs). EA
operators then mimic the BPM lifecycle phases and foster the evolution of this
population by creating new generations of genomes based on the most valuable existing ones.
The mutation operator randomly replaces sub-processes with new gateways and/or
tasks, whereas the crossover operator combines proven sub-processes of existing
genomes (see Sect. 2). The valuation of genomes is done by a fitness function depending
on predefined criteria. The evolution cycle repeats until it results in a (potentially local)
optimum or it is terminated manually.
      </p>
      <p>
        Afflerbach et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] provide the first EA application that allows for exclusive splits
and covers elementary process design elements (i.e., tasks, input/output objects, and
sequence flows). In addition, it aggregated multiple dimensions of process performance
to the main economic factors of cash flows and the risk considering time, quality, and
flexibility [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. They confirm the usefulness of their EA design in a proof of concept.
However, the proof of concept still lacks scalability, platform- and vendor
independence, well-defined interfaces, visualization and analysis functionalities as well as a
direct integration of performance effects. We therefore present a stand-alone process
(re) design tool Design it like Darwin 2.0 that addresses many of these shortcomings. The
tool enables researchers and practitioners to create new process designs based on any
set of tasks (e.g., gathered by process mining). Particularly, the import/export feature
provides well-defined interfaces as further step towards a highly automated BPM
lifecycle.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Design it like Darwin 2.0 – The Tool</title>
      <p>Regarding the tool presentation, we start with an architectural overview followed by a
description of the significantly enhanced backend features. Finally, we present the new
analytics and visualization functionalities.</p>
      <p>
        The tool is a dynamic single page C# web application that also implements an
application programming interface (API). Up to 19 settings allow for the customization of
the EA itself (e.g., the maximum number of generations or population size) as well as
process improvement goals (e.g., weights for the performance dimensions and the
decision-makers’ risk attitude). Input data regarding tasks (i.e., name, description,
expected cash flow and variance, and execution time), input/output objects, input/output
dependencies, process attributes, and attribute coverage can be inserted via user
interface (see Fig. 1) or by a JSON file upload.
For the backend calculation, we implemented the following key functionalities, which
enhance the existing proof of concept of Afflerbach et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]:
      </p>
      <p>Greedy Algorithm. We apply a greedy algorithm to generate new genomes while
randomly combining tasks according to their input/output objects, dependencies, and
gateways. This choice significantly influences the performance. The resulting genomes
are feasible (i.e., process attributes constraints and data input/output dependencies are
considered), but rarely optimal in the first iteration. Besides, we can force the greedy
algorithm to create only feasible genomes to facilitate an automated initial process
design.</p>
      <p>Tree structure. We present processes as directed trees (see Fig. 2). Tree nodes
correspond to parallel, sequential, and exclusive gateways, where leaves correspond to
tasks. Thereby, we explicitly consider the semantics of BPMN gateways and their
semantics in EA operations (mutation and crossover) and, thereby, extend the overall
solution space compared to the existing proof of concept.</p>
      <p>A1
A3</p>
      <p>A2</p>
      <p>A4
A5</p>
      <p>AND
SEQ</p>
      <p>SEQ
A1</p>
      <p>A2</p>
      <p>A3</p>
      <p>XOR
A4</p>
      <p>A5</p>
      <p>
        Genome Operators. With the introduction of the directed tree, we also further
developed the implemented EA operators according to Poli et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. The crossover
operator randomly switches two nodes of two genomes, while the mutation operator
generates new subtrees using the greedy algorithm to replace existing ones. We also
allow for limiting the tree depth to avoid unnecessarily complex process designs with
multiply duplicated gateways and/or tasks not contributing to better solutions.
      </p>
      <p>
        Varying Crossover-/Mutation-Rates. As varying crossover and/or mutation rates
is critical to the success of EAs, we start with a high mutation probability and a low
crossover probability that will decrease or increase respectively by 1/ per generation
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], where n represents the number of generations. Thereby, we ensure a broad
exploration of the solution space at the beginning and a narrow solution space
exploitation at the end, fostering the convergence of the EA.
      </p>
      <p>
        Multi-criteria Evaluation. We explicitly model the information related to the
process performance dimension time (i.e., fixed completion time per task) to foster the
use of exclusive and parallel gateways. We finally calculate the genomes’ fitness as an
individually weighted average of the task-related cash flows and time estimations based
on user preferences [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This calculation covers the process performance dimensions
time and cost.
      </p>
      <p>
        Pain factor. We widened the solution space by infeasible (i.e., violated
input-outputconstraints) and overly complex (e.g., redundant gateways or parallel gateways with
only one path) process designs. As the best solution is close to the boundary between
the solution space of feasible and infeasible designs, we tackle the best solution from
both sides. To cope with such designs, we introduced a pain factor as a negative
adjustment in their fitness, punishing infeasible and overly complex solutions. Besides,
we ensure at least one feasible solution per generation through the greedy algorithm
(see above) or the elitist selection [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>For the presentation of the results, we introduced new analytics and visualization
features. The analytics tab displays the development of several performance indicators
in real-time (e.g., the fitness development, the percentage of feasible process designs,
or the evaluation runtime, see Fig. 3). Besides, the analytics tab always presents the
best process design so far as BPMN graph and provides a BPMN 2.0 XML file
download for further processing.
Design it like Darwin 2.0 is a ready-to-use fully automated process (re-) designer
applicable to academic and industrial contexts. We invite the BPM community to
challenge their own process design ideas.</p>
      <p>
        From an evaluation perspective, we compared the enhanced algorithm to the proof
of concept in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] based on the same travel agent process from a modified real-life
scenario. The greedy algorithm generates populations with thousands of genomes as
recommended for EAs based on tree structures within seconds. As the best solution is
close to the boundary, the example process already reveals the value of the extended
solution space (i.e., feasible and infeasible designs). Even though the overall average
of feasible genomes is about 10 to 15 percent per generation owing to infeasible process
designs, the tool identifies the optimal solution more quickly than the initial proof of
concept. Therefore, our proposed enhancements also have significant effects on
performance.
      </p>
      <p>
        To further develop our tool, we plan to extend the fraction of supported BPMN
elements (i.e., all BPMN gateways and events) and, therefore, the complexity of supported
processes as a next step. Besides, we intend to support process with loops of recurring
tasks. To do so, we must upgrade the underlying data structure to a directed graph and
implement corresponding EA operators according to Walker et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. We expect
particular challenges when extending our tool to support also declarative process models.
      </p>
      <p>The tool, installation instructions, and example data is available at
https://github.com/rubytobi/Design-it-like-Darwin-2.0. Additionally, we provide a
screencast showing the basic workflow with the application.</p>
      <p>The tool and its source code is available under MIT License.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Dabaghkashani</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A Success Model for Business Process Management Implementation</article-title>
          .
          <source>International Journal of Information and Electronics Engineering</source>
          <volume>2</volume>
          (
          <issue>2</issue>
          ),
          <fpage>725</fpage>
          -
          <lpage>729</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Sharp</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McDermott</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Workflow modeling. Tools for process improvement and applications development / Alec Sharp, Patrick McDermott, 2nd edn</article-title>
          .
          <source>Artech House</source>
          , Boston, London (
          <year>2009</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Zellner</surname>
          </string-name>
          , G.:
          <article-title>A structured evaluation of business process improvement approaches</article-title>
          .
          <source>Business Process Management Journal</source>
          <volume>17</volume>
          (
          <issue>2</issue>
          ),
          <fpage>203</fpage>
          -
          <lpage>237</lpage>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          :
          <article-title>Business Process Management. A Comprehensive Survey</article-title>
          .
          <source>International Scholarly Research Notices Software Engineering</source>
          <year>2013</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>37</lpage>
          (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Hammer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Champy</surname>
          </string-name>
          , J.:
          <article-title>Reengineering the corporation: A manifesto for business revolution</article-title>
          .
          <source>Business Horizons</source>
          <volume>36</volume>
          (
          <issue>5</issue>
          ),
          <fpage>90</fpage>
          -
          <lpage>91</lpage>
          (
          <year>1994</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klein</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malone</surname>
            ,
            <given-names>T.W.:</given-names>
          </string-name>
          <article-title>The process recombinator. A tool for generating new business process ideas</article-title>
          .
          <source>In: Proceedings of Information Systems</source>
          ,
          <volume>178</volume>
          -
          <fpage>192</fpage>
          (
          <year>1999</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Vergidis</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Saxena</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tiwari</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>An evolutionary multi-objective framework for business process optimisation</article-title>
          .
          <source>Applied Soft Computing</source>
          <volume>12</volume>
          (
          <issue>8</issue>
          ),
          <fpage>2638</fpage>
          -
          <lpage>2653</lpage>
          (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Low</surname>
            ,
            <given-names>W.Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Weerdt</surname>
          </string-name>
          , J. de, Wynn, M.T.,
          <string-name>
            <surname>ter Hofstede</surname>
            ,
            <given-names>A.H.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>van der Aalst</surname>
            ,
            <given-names>W.M.P.</given-names>
          </string-name>
          , vanden Broucke, S.:
          <article-title>Perturbing event logs to identify cost reduction opportunities. A genetic algorithm-based approach</article-title>
          .
          <source>In: Proceedings of Evolutionary Computation</source>
          ,
          <fpage>2428</fpage>
          -
          <lpage>2435</lpage>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Fogel</surname>
          </string-name>
          , D.B.:
          <article-title>What is evolutionary computation? IEEE Spectrum (</article-title>
          <year>2000</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Afflerbach</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hohendorf</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Manderscheid</surname>
          </string-name>
          , J.:
          <article-title>Design it like Darwin. A value-based application of evolutionary algorithms for proper and unambiguous business process redesign</article-title>
          .
          <source>Journal of Information Systems Frontiers</source>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Limam</given-names>
            <surname>Mansar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Reijers</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.A.</surname>
          </string-name>
          :
          <article-title>Best practices in business process redesign</article-title>
          .
          <article-title>Use and impact</article-title>
          .
          <source>Business Process Management Journal</source>
          <volume>13</volume>
          (
          <issue>2</issue>
          ),
          <fpage>193</fpage>
          -
          <lpage>213</lpage>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Poli</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Langdon</surname>
            ,
            <given-names>W.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McPhee</surname>
            ,
            <given-names>N.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Koza</surname>
            ,
            <given-names>J.R.:</given-names>
          </string-name>
          <article-title>A field guide to genetic programming</article-title>
          . Lulu Press (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Lin</surname>
          </string-name>
          , W.-Y.,
          <string-name>
            <surname>Lee</surname>
          </string-name>
          , W.-Y.,
          <string-name>
            <surname>Hong</surname>
          </string-name>
          , T.-P.:
          <article-title>Adapting crossover and mutation rates in genetic algorithms</article-title>
          .
          <source>Journal of Information Science and Engineering</source>
          <volume>19</volume>
          (
          <issue>5</issue>
          ),
          <fpage>889</fpage>
          -
          <lpage>903</lpage>
          (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Walker</surname>
            ,
            <given-names>J.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miller</surname>
            ,
            <given-names>J.F.</given-names>
          </string-name>
          :
          <article-title>The Automatic Acquisition, Evolution and Reuse of Modules in Cartesian Genetic Programming</article-title>
          .
          <source>Transactions of Evolutionary Computation</source>
          <volume>12</volume>
          (
          <issue>4</issue>
          ),
          <fpage>397</fpage>
          -
          <lpage>417</lpage>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>