研究生: |
蔡名峰 Rock Ming-Feng Tsai |
---|---|
論文名稱: |
應用貝氏信賴網路方法為基之工作流程風險分析系統 BBN-Based Analytical Workflow Management System Using Risk Management Approach |
指導教授: |
張瑞芬
Amy J.C. Trappey |
口試委員: | |
學位類別: |
碩士 Master |
系所名稱: |
工學院 - 工業工程與工程管理學系 Department of Industrial Engineering and Engineering Management |
論文出版年: | 2005 |
畢業學年度: | 93 |
語文別: | 英文 |
論文頁數: | 68 |
中文關鍵詞: | 工作流程管理 、風險管理 、計畫評核術 、貝氏信賴網路 、風險因子 |
外文關鍵詞: | Project Risk Management, Workflow Management System, PERT, Bayesian Belief Network, risk factors |
相關次數: | 點閱:2 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
中文摘要
近年來,新產品的設計與開發需要越來越多的複雜設計與全球協同研發,為了達到有效率的產品研發設計,專案管理的工作流程管理(WfMS)扮演了一個相當重要的腳色,協助產品設計研發人員來管理、分析整個工作流程的狀況,迅速掌握工作進度與成本。而風險管理是屬於專案管理的另一部份,其針對工作流程分析、收集在各工作節點的風險因子,並應用相關風險管理理論來進行風險的分析、計算與預測,主要在處理及減少造成工作流程失敗的不確定因素,而達到降低成本、減少研發時間或增加利潤。
在本篇論文中,利用計畫評核術(Program Evaluation and Review Technique, PERT)的專案管理方法來對產品的工作時間與成本進行預測與計算,並且使用貝氏信賴網路理論(Bayesian Belief Network, BBN)來建構工作流程之風險因子的關係圖與風險分析,在論文中主要先收集與記錄工作流程節點的各類風險因子,然後以貝氏信賴網路的分析為基準,利用機率與網路圖來表示節點與風險因子的關聯,然後藉由期望值推算結果表示對於工作流程的影響,並調整計畫評核術中使用的資料數據,最後以常態機率圖表示預定完工時間達成機率與計算工作流程的工具與人力成本,提供設計者決策是否執行該設計的依據。如果執行該工作流程,在執行完成後會將風險因子的相關數據回饋到資料庫,調整風險因子的成本、時間與機率。而當決策者拒絕執行該流程設計,設計人員則必須使用MS Visio來重新設計與上傳新的流程圖,並重新進行風險評估直到達成專案的預設目標才可被執行。
關鍵字:工作流程管理、風險管理、計畫評核術、貝氏信賴網路、風險因子
Abstract
In recent years, new product development becomes more complex and needs more collaborative work than before. In order to support efficient product design, Workflow Management System (WfMS) plays an important role to help manager to control and analyze the status of workflow. Also, Project Risk Management (PRM) is used to collect and analyze the risk factors of tasks in the projects.
This thesis proposes Bayesian Belief Network (BBN) methodology for building risk factors relationship graph based on quantitative risk analysis. Program Evaluation and Review Technique (PERT) is used to estimate the probability of completion time and the sum of cost. Therefore, factors of the tasks in the workflow are collected, analyzed, and recorded in the database. Bayesian Belief Network use probabilities and network map to display the relationships between each node, and infer the influences of the workflow by calculating expected values of time and cost. PERT uses the result from BBN analysis to adjust processing time of tasks. PERT displays the probability of completed days by normal distribution charts and calculates the cost of manpower and tools. A project manager can use the report of risk analysis to make decision about execution or rejection of workflow designs. If a workflow is executed, executing members of each task needs to input data of factors and update the record to database. Else, a project manager must redesign the workflow and upload a new workflow to make analysis till to conform the requirements of projects.
Keywords: Project Risk Management (PRM), Workflow Management System (WfMS), PERT, Bayesian Belief Network (BBN), risk factors
References
[1] Abdomerovic, M., and Blakemore, G., 2002, “Project process interactions,” International Journal of Project Management, Vol. 20, pp. 315-323.
[2] Akintoye, A.S. and MacLeod, M.J., 1997, “Risk Analysis and Management in Construction,” International Journal of Project Management, Vol. 15, Issue. 1, pp. 31-38.
[3] Anderson, D.K., and Merna, T., 2003, “Project management strategy – project management represented as process based set of management domains and the consequences for project management strategy,” International Journal of Project Management, Vol. 21, pp. 423-435.
[4] Armitage, K., 2002, “Project management – concept and some basic principles,” The British Journal of Administrative Management, Vol. 34, pp. 10-11.
[5] Baccarini, D. and Archer, R., 2001, “The Risk ranking of Projects: a methodology,” International Journal of Project Management, Vol. 19, pp. 139-145.
[6] Bae, J., Bae, H., Kang, S.H. and Kim, Y., 2004, “Automatic Control of Workflow Processes Using ECA Rules,” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, pp. 1010-1023.
[7] Carr, V., Tah, J.H.M., 2001, “A fuzzy approach to construction project risk assessment and analysis: construction project risk management system,” Advances in Engineering Software, Vol. 32, Issue. 10-11, pp. 847-857
[8] Chen, C.H., Ling, S.F., and Chen, W., 2003, “Project scheduling for collaborative product development using DSM,” International Journal of Project Management, Vol. 21, pp. 291-299.
[9] Chiou, J., (Advisor: Prof. Trappey A.J.C.), 2003, “Design a Workflow Based Collaborative Project Management Platform – Using IC Design Project as an Example,” M.S. Thesis, Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu, Taiwan.
[10] Chung, P.W.H., Cheung, L., Moore, J., 2003, “Knowledge-based process management – an approach to handling adaptive workflow,” Knowledge-Based Systems, Vol. 16, pp. 149-160,
[11] de Klerk, A.M., 2001, “The Value of Project Risk Management,” Portland International Conference on Management of Engineering and Technology, Vol. 2, pp. 570-576
[12] Doernemann, H., 2002, “Tool-Based Risk Management Made Practical,” IEEE Joint International Conference on Requirements Engineering(RE’02), Essen, Germany, September 09-13, pp.192
[13] Fakas, G.J. and Karakostas, B., 2004 “A Peer to Peer (P2P) Architecture for Dynamic Workflow Management,” Information Software Technology, Vol. 46, pp. 423-43.
[14] Fan, C.F., Yu, Y.C., 2004, “BBN-based software project risk management,” Journal of Systems and Software, Vol. 73, Issue. 2, pp. 193-203
[15] Ke, S., (Advisor: Prof. Trappey A.J.C.), 2004, “Designing an Expert System Based Workflow Management System to Integrate Project Flow and Process Logics,” M.S. Thesis, Department of Industrial Engineering and Engineering Management, National Tsing Hua University, Hsinchu, Taiwan.
[16] Øien, K., 2001, “Risk indicators as a tool for risk control,” Reliability Engineering and System Safety, Vol. 74, Issue. 2, pp. 129-145
[17] Romano, N.C., Chen, F., and Nunamaker, J. F., 2002, “Collaborative project management software,” Proceedings, The 35th Annual Hawaii International Conference on System Sciences (HICSS’02), Big Island, Hawaii, January 07-10, Vol. 1, pp. 20.
[18] Sage, A.P., 1992 “Risk Management System Engineering,” Proceedings, Intelligent Systems for the 21st Century of IEEE International Conference on Systems, Man and Cybernetics, October 22-25, Vancouver, BC, Vol. 2, pp. 1033-1038.
[19] Shih, H.M., and Tseng, M. M., 1996, “Workflow technology-based monitoring and control for business process and project management,” International Journal of Project Management, Vol. 14, pp. 373-378.
[20] Trappey, C.V., Trappey, A.J.C., and Hsu, F.C., 2003, “Adapted risk control approach for SoC design project management,” Proceedings, The International Symposium on Product Life Cycle Management (PLM’2003), Bangalore, India, July 16-18.
[21] Uher, T.E., and Toakley, A.R., 1999, “Risk Management in The Conceptual Phase of A Project,” International Journal of Project Management, Vol.17, Issue. 3 , pp. 161-169
[22] Van der Aalst, W.M.P., 1999, “On the automatic generation of workflow processes based on product structures,” Computers in Industry, Vol. 39, pp.97-111.
[23] Ward, S. and Chapman, C., 2003, “Transforming Project Risk Management into Project Uncertainty Management,” International Journal of Project Management, Vol. 21, Issue 2, pp. 97-105.
[24] Williams, R.C., Walker, J.A. and Dorofee, A.J., 1997, “Putting Risk Management into Practice,” Software in IEEE, Vol. 14, Issue. 3, pp. 75-82
[25] Zhuge, H., 2002, “A process matching approach for flexible workflow process reuse,” Information and Software Technology, Vol. 44, pp. 445-450.
[26] Muriithi, N., Crawford, L., 2003, “Approaches to project management in Africa: implications for international development projects,” International Journal of Project Management, Vol. 21, Issue. 5, pp. 309-319.
[27] Gabriel, E., 1997, “The lean approach to project management,” International Journal of Project Management, Vol. 15, Issue. 4, pp. 205-209.
[28] Wirth, I., 1996, “How generic and how industry-specific is the project management profession,” International Journal of Project Management, Vol. 14, Issue. 1, pp. 7-11.
[29] Steyn, H., 2002, “Project management applications of the theory of constraints beyond critical chain scheduling,” International Journal of Project Management, Vol. 20, Issue. 1, pp. 75-80.
[30] Cozman, F.G., 2000, “Generalizing variable elimination in Bayesian Networks,” Proceedings, Probabilistic Reasoning in Artificial Intelligence, Atibaia, Brazil, Norvember 20.
[31] Hunt, M., von Konsky, B., Venkatesh, S., Petros, P., 2000, “Bayesian Networks and decision tree in the diagnosis of female urinary incontinence,” Proceedings, The 22nd Annual EMBS International Conference, Chicago IL., July, 23-28.
[32] Cox, M.A.A., 1995, “Simple normal approximation to completion time distribution for a PERT network,” International Journal of Project Management, Vol. 13, pp. 265-270.
[33] Mummolo, G., 1997, “Measuring uncertainty and criticality in network planning by PERT- path technique,” International Journal of Project Management, Vol. 15, pp. 377-387.
[34] Abbasi, G.Y., Mukattash, A.M., 2001, “Crashing PERT networks using mathematical programming,” International Journal of Project Management, Vol. 19, pp. 181-188.