Where can buy Management of information, process and cooperation: third international workshop, mipa

Page 1


Management of Information, Process and Cooperation: Third International Workshop, MiPAC 2016, Hangzhou, China, September 23, 2016, Revised Selected Papers 1st Edition Jian Cao

Visit to download the full and correct content document: https://textbookfull.com/product/management-of-information-process-and-cooperation -third-international-workshop-mipac-2016-hangzhou-china-september-23-2016-revise d-selected-papers-1st-edition-jian-cao/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Management of Information, Process and Cooperation: Third International Workshop, MiPAC 2016, Hangzhou, China, September 23, 2016, Revised Selected Papers 1st

Edition Jian Cao

https://textbookfull.com/product/management-of-informationprocess-and-cooperation-third-international-workshopmipac-2016-hangzhou-china-september-23-2016-revised-selectedpapers-1st-edition-jian-cao/

E Learning and Games 10th International Conference

Edutainment 2016 Hangzhou China April 14 16 2016

Revised Selected Papers 1st Edition Abdennour El Rhalibi

https://textbookfull.com/product/e-learning-and-games-10thinternational-conference-edutainment-2016-hangzhou-chinaapril-14-16-2016-revised-selected-papers-1st-edition-abdennourel-rhalibi/

Applied Computer Sciences in Engineering Third Workshop on Engineering Applications WEA 2016 Bogotá Colombia September 21 23 2016 Revised Selected Papers 1st

Edition Juan Carlos Figueroa-García

https://textbookfull.com/product/applied-computer-sciences-inengineering-third-workshop-on-engineering-applicationswea-2016-bogota-colombia-september-21-23-2016-revised-selectedpapers-1st-edition-juan-carlos-figueroa-garcia/

Graphical Models for Security Third International

Workshop GraMSec 2016 Lisbon Portugal June 27 2016

Revised Selected Papers 1st Edition Barbara Kordy

https://textbookfull.com/product/graphical-models-for-securitythird-international-workshop-gramsec-2016-lisbon-portugaljune-27-2016-revised-selected-papers-1st-edition-barbara-kordy/

Machine Translation 12th China Workshop CWMT 2016

Urumqi China August 25 26 2016 Revised Selected Papers 1st Edition Muyun Yang

https://textbookfull.com/product/machine-translation-12th-chinaworkshop-cwmt-2016-urumqi-china-august-25-26-2016-revisedselected-papers-1st-edition-muyun-yang/

Data Management and Analytics for Medicine and Healthcare Second International Workshop DMAH 2016 Held at VLDB 2016 New Delhi India September 9 2016 Revised Selected Papers 1st Edition Fusheng Wang

https://textbookfull.com/product/data-management-and-analyticsfor-medicine-and-healthcare-second-international-workshopdmah-2016-held-at-vldb-2016-new-delhi-indiaseptember-9-2016-revised-selected-papers-1st-edition-fushengwang/

Knowledge Representation for Health Care HEC 2016

International Joint Workshop KR4HC ProHealth 2016 Munich Germany September 2 2016 Revised Selected Papers 1st Edition David Riaño

https://textbookfull.com/product/knowledge-representation-forhealth-care-hec-2016-international-joint-workshop-kr4hcprohealth-2016-munich-germany-september-2-2016-revised-selectedpapers-1st-edition-david-riano/

Information Security Applications: 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers 1st Edition Dooho Choi

https://textbookfull.com/product/information-securityapplications-17th-international-workshop-wisa-2016-jeju-islandkorea-august-25-27-2016-revised-selected-papers-1st-editiondooho-choi/

Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers 1st Edition Kefei Chen

https://textbookfull.com/product/information-security-andcryptology-12th-international-conference-inscrypt-2016-beijingchina-november-4-6-2016-revised-selected-papers-1st-edition-

Third International Workshop, MiPAC 2016

Hangzhou, China, September 23, 2016

Revised Selected Papers

Communications inComputerandInformationScience686

CommencedPublicationin2007

FoundingandFormerSeriesEditors: AlfredoCuzzocrea,Dominik Ślęzak,andXiaokangYang

EditorialBoard

SimoneDinizJunqueiraBarbosa

Ponti ficalCatholicUniversityofRiodeJaneiro(PUC-Rio), RiodeJaneiro,Brazil

PhoebeChen

LaTrobeUniversity,Melbourne,Australia

XiaoyongDu

RenminUniversityofChina,Beijing,China

JoaquimFilipe

PolytechnicInstituteofSetúbal,Setúbal,Portugal

OrhunKara

TÜBİTAKBİLGEMandMiddleEastTechnicalUniversity,Ankara,Turkey

IgorKotenko

St.PetersburgInstituteforInformaticsandAutomationoftheRussian AcademyofSciences,St.Petersburg,Russia

TingLiu

HarbinInstituteofTechnology(HIT),Harbin,China

KrishnaM.Sivalingam

IndianInstituteofTechnologyMadras,Chennai,India

TakashiWashio

OsakaUniversity,Osaka,Japan

Moreinformationaboutthisseriesathttp://www.springer.com/series/7899

ManagementofInformation, ProcessandCooperation

ThirdInternationalWorkshop,MiPAC2016

Hangzhou,China,September23,2016

RevisedSelectedPapers

ShanghaiJiaoTongUniversity

Shanghai China

Xiangtan China

ISSN1865-0929ISSN1865-0937(electronic) CommunicationsinComputerandInformationScience

ISBN978-981-10-3995-9ISBN978-981-10-3996-6(eBook) DOI10.1007/978-981-10-3996-6

LibraryofCongressControlNumber:2017932643

© SpringerNatureSingaporePteLtd.2017

Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped.

Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse.

Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors giveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforanyerrorsor omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations.

Printedonacid-freepaper

ThisSpringerimprintispublishedbySpringerNature TheregisteredcompanyisSpringerNatureSingaporePteLtd.

Theregisteredcompanyaddressis:152BeachRoad,#21-01/04GatewayEast,Singapore189721,Singapore

Preface

ThisvolumecollectstheproceedingsoftheInternationalWorkshoponManagementof Information,Processes,andCooperation(MiPAC2016,formallyProcess-Aware Systems)heldinHangzhou,China,onSeptember23,2016,co-locatedwiththe6th ChinaConferenceonBusinessProcessManagement(ChinaBPM2016).Following thesuccessofPAS2014andPAS2015,MiPAC2016providedaninternationalforum forexploringchallengingresearchissuesintheareasofdata/informationmanagement, servicescomputing,businessprocessesandworkflows,andsoftwareengineering, aimingatdevelopingtechniquesforeffectivesoftwaredevelopmenttosupportenterpriseapplications.

Asthethirdeditioninthisworkshopseries,MiPAC2016acceptedeightquali fied papersfrom14submissions.Thesesubmissionsreportedonup-to-dateresearch findingsandapplicationcasestudies.

WewouldliketothanktheProgramCommitteemembersfortheirreviewsofthe submittedpapers.Weexpressourgratitudetotheotherconferencecommittees, especiallytotheProgramCommitteechairs,JieWangandJianxunLiu,andthe SteeringCommitteefortheirvaluableguidance,andtothepublicitychair,Cheng Zhang,forhiseffortsinpublishingworkshopupdatesandpromotingtheworkshopin theregion.Specialthankstothepublicationchair,XiaoLiu,forhisgreatefforts,andto theorganizationchair,ShuiguangDeng,andotherstaffatZhejiangUniversityfortheir attentivepreparationsforthisworkshop.

WewouldalsoliketotakethisopportunitytothankthestaffatSpringerfortheir efficientworkonthepublicationoftheworkshopproceedings.Lastbutnotleast,we arethankfultotheauthorsofthesubmissions,thepresenters,andalltheother workshopparticipants theworkshopcouldnotbeheldwithouttheircontributions andinterest. February2017JianCao

Organization

MiPAC2016wasorganizedinHangzhou,China,byZhejiangUniversity.

SteeringCommittee

JianwenSuUCSantaBarbara,USA

YunYangSwinburneUniversityofTechnology,Australia

JianmingWangTsinghuaUniversity,China LiangZhangFudanUniversity,China

GeneralChair

JianCaoShanghaiJiaoTongUniversity,China

ProgramChairs

JieWangStanfordUniversity,USA JianxunLiuHunanUniversityofScienceandTechnology,China

OrganizationChair

ShuiguangDengZhejiangUniversity,China

PublicityChair

ChengZhangAnhuiUniversity,China

PublicationChairs

XiaoLiuDeakinUniversity,Australia

ProgramCommittee

JidongGeNanjingUniversity,China

JinjunChenUniversityofTechnologySydney,Australia

XiaoLiuDeakinUniversity,Australia

JieWangStanfordUniversity,USA ChengZhangAnhuiUniversity,China

ZhimingZhaoUniversityofAmsterdam,TheNetherlands ChunOuyangQueenslandUniversityofTechnology,Australia

JianweiYinZhejiangUniversity,China LiangZhangFudanUniversity,China

Contents

ProcessModeling

FlexibleManufacturingChain:ASCMforElectronicCommerceEnterprise inClothingIndustryBasedonActiviti............................3 HenghengWei,JidongGe,ChuanyiLi,ZhongjinLi,MiaomiaoLei, andHaiyangHu

ProcessEnactment

CrowdsourcingComplexTaskAutomaticallybyWorkflowTechnology....17 QiangZheng,WenyanWang,YangYu,MaolinPan,andXiaohuiShi

AnAdaptiveSchedulingMechanismforAnalyticalWorkflowModel......31 YanYaoandJianCao

DataDrivenServiceComputing

MonitoringasaServiceBasedonPub/SubSystemoveraCloud Environment..............................................49 DingyuYangandChunleiJi

TheFaultToleranceofBigDataSystems.........................65 XingWu,ZhikangDu,ShujiDai,andYazhouLiu

AMarket-BasedAnalysisofBiddingStrategyBetweenWebService ProvidersandUsers.........................................75 BingShi,ZhaoweiWang,andGuangyiHu

ALightweightHash-BasedMutualAuthenticationProtocolforRFID......87 ZhangbingLi,XiaoyongZhong,XiaochunChen,andJianxunLiu

PhotovoltaicPowerPredictionModelBasedonParallelNeuralNetwork andGeneticAlgorithms......................................99 GaoweiXuandMinLiu

AuthorIndex ............................................111

ProcessModeling

Flexible Manufacturing Chain: A SCM for Electronic Commerce Enterprise in

Clothing Industry Based on Activiti

Hengheng Wei1,2, Jidong Ge1,2(✉), Chuanyi Li1,2, Zhongjin Li1,2, Miaomiao Lei1,2, and Haiyang Hu1,2,3

1 State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing 210093, China gjdnju@163.com

2 Software Institute, Nanjing University, Nanjing 210093, China

3 School of Computer, Hangzhou Dianzi University, Hangzhou 310018, China

Abstract. With the business development of the process, the manager needs to improve the automation, efficiency and reliability of the business process manage‐ment, especially in manufacturing area. To solve this problem, we have designed and implemented a supply chain management system, FMC (Flexible Manufac‐turing Chain), which integrates different aspects of the BPM lifecycle in a unified platform based on Activiti workflow engine. FMC is an effective system to model and execute flexible, data-driven, and user-centric business processes. It enables users to create process models graphically and flexibly, execute process more automatically, monitor the real-time process execution information and improve the process according to the deviations from conformance checking. The FMC system is used as a demo in this article, which is a supply chain system that provides a whole complex product line service including many departments and tasks.

Keywords: Supply chain management · Process modeling · Process execution · Process improvement · Process monitor

1Introduction

Business Process Management (BPM) is an approach to systematically model, manage and improve business operations inner or among organizations. In BPM, sequences or relationships of business operations are usually described by means of process models that consist of partially ordered control and data flow nodes and can be executed auto‐matically by business process management systems. Process-aware information systems (PAISs) provide support for business processes at the operational level [1, 2] and sepa‐rate process logic from application code, relying on explicit process models. Partici‐pating in the BPM lifecycle requires that each user role is able to create, evolve or execute such process models [3].

FMC (Flexible Manufacturing Chain) is a supply chain management system, which integrates numerous functions and provides an intuitive user interface for the end users

© Springer Nature Singapore Pte Ltd. 2017

J. Cao and J. Liu (Eds.): MiPAC 2016, CCIS 686, pp. 3–14, 2017.

DOI: 10.1007/978-981-10-3996-6_1

to participate in the entire BPM lifecycle. The system is implemented by the industry standard BPMN [4], the Business Process Model and Notation. Usually, users can execute and control the business process through workflow process engine such as JBPM [5] and Activiti [6], the workflow engine is the core component of FMC system and supply parse, execution and management for BPMN process definitions, FMC chooses Activiti as workflow engine because of its good services, nice integration features with spring framework and its rich log information. However, process execution may deviate from process models due to unexpected happenings or because some employee found a more suitable way achieving the same goal in actual situation. Generally, there are two ways to find deviations between original designed process model and actual running process model, one is process mining and the other is conformance checking.

The basic idea of process mining is to diagnose processes by mining event logs for knowledge [7]. Event logs are the starting point for process mining. The data of the event log can be mined and different aspects about the underlying process can be analyzed. Business process mining, or process mining for short, aims at the automatic construction of models explaining the behavior observed in the event log. Common process mining algorithms discover actual process through the extraction of order relations from event logs, and we can discover deviations from comparison between discovered process and original process.

Conformance checking is applied to measure alignment between designed model and behavior logs, it replays the log event traces on the designed process to evaluate the process in different aspects such as fitness, generalization and precision to find the deviations. FMC workflow system develops and uses process mining and conformance checking plugin on ProM [8] platform, ProM is an open source process mining suit, which can be used for studying process mining cases, and it also integrates a log import tool named XEsame, it can receive different data sources such as database and generate the XLog or XES file which can be used as inputs of conformance checking plugins. We use the BPMN Analysis plugin as conformance checking plugin and develop a χ-algorithm [9] with post-task events plugin on ProM to help improve business process.

With the improve suggestions from process improve module, process designers can modify the process model to a more reliable and efficient version, on the other hand, the accurate and real-time process execution information should also be achieved from process monitor to help users. This system can improve order execution efficiency and reliability as well as save human power.

Section 2 introduces the application scenario used for the demonstration. Section 3 presents the FMC supply chain process management system architecture. Fundamental techniques are described in Sect. 4. Section 5 then describes how the application scenario can be supported with the FMC system. Finally, Sect. 6 concludes the paper.

2Application Scenario

The case in this article is derived from a China clothes manufacturing company that provides a whole product line service which is very complex and consists of many departments and tasks. Concretely speaking, the services consist of clothes design,

material purchase, sample make, volume production, mass customization, storage, delivery etc. Each part of these services includes a lot of task nodes conducted by different departments. FMC utilizes BPMN as process modeling language, we give a description of sample make segment of the whole process model in Fig. 1, we can see there are multiple nodes and different structures in the segment, for example, the veri‐fication tasks make concurrent structures respectively, and there is also choice structure, loop structure and sequence structure. These structures compose the whole process and form the process execution logic with the variables in the process model.

In the past, the process flow and business logic of the clothes manufacturing process are combined together, designers must spend lots of time and effort to update the process, the process cannot adapt to the change requirement, and sometimes the execution and notification of tasks need to be finished by human power, which is inefficient and unre‐liable. The clothes manufacturing process execution has a high demand for efficiency, conciseness and reliability.

There should be a graphical interface for designers to create and edit business process easily. The process management and business logic should be separated and the process model should be modified flexibly and better not to restart the process instance. Through structural modeling of business process, the execution of tasks should be judged and executed by process management system automatically to improve process efficiency and reliability, and then the new tasks will be accurately notified to the related users. Multiple process models should be able to be deployed and managed by the system. The users can involve in several workflows at the same time and manage their customized process instances and tasks in a unified manner. Real-time process execution information and statistical information of business processes should be monitored in a respective dashboard, for example, how many process instances are in production status and which is the slowest task in the finished process instances, the execution state of every process instance should be displayed to related users. As well as we know, the deviations will occur compared to the reference model, so the process model should be improved by providing these deviations to model designers and the process instances should be executed more accurately and efficiently.

Fig. 1. Sample make BPMN segment.

3System Architecture

Figure 2 illustrates the major components of the system architecture. In particular, FMC is implemented as a Java EE application utilizing the Activiti BPM engine for process execution, the architecture of FMC consists of three main components including Web User Interface, process management and information management which are respec‐tively discussed in the following sections.

3.1Web User Interfaces

Web User Interfaces are based on J2EE web framework. It provides functions for users to execute process operation as well as business operation, receive feedback information graphically. It also enables users to participate in different workflow processes concur‐rently, so the workflow processes can be shareable between different users after authen‐tication. It interacts with the process management component to deploy, execute, monitor, analyze and improve the workflow processes. We separate the user operations from process operation module and business execution module. The functions of each component are as follows:

•Process operation module: it allows users to create and edit the BPMN 2.0 process model, deploy the process model to the workflow engine in the process management component through web interface, and then the process model can be executed. Users can join the workflow process through authentication, a workflow process can be executed by different users and a user can join different processes. The process oper‐ation module also includes process modification to improve the efficiency and simplicity of process model through interaction with the process improve module in the process management component.

Fig. 2. A SCM system architecture

•Business execution module: when new tasks are notified to users, users finish the tasks and submit user execution results and process variables to the process control module of the process management component through web interface, and process control module will execute the task and change the process information database.

3.2Process Management Component

Process Management Component is the core component of the workflow management system architecture, which receives the process inputs from web user interface, and deals with the inputs. Firstly, it can parse process model file definitions and save BPMN model files to database. Secondly, it can receive the execution choices from users, then the workflow engine will analyze the choices with the workflow process information data and update process instances and produce new tasks, then new tasks can be notified to users as well as the monitoring information. Finally, the process can be improved through conformance checking between the logs and the current process models in use, the logs can give expression to the behavior habits of users, then, the improvement suggestions will be provided to model designers to update the process model and make the execution of process more efficient and reliable, the use of BPMN designer makes the modification of process model easily and friendly. The process version management module is used to manage different versions of process definitions with the same process name. The process rollback module is used to roll back the database to previous state when business exceptions or process exceptions are occurred. Through the process management component, the execution and management for business processes can be more automatic, effective, efficient and reliable. This component includes process control module, process monitoring module, process improvement module and process deploy module. The functions of each component are as follows:

•Process control module: it provides the execution, analysis and process version management mechanism to realize the automation and flexibility of business process control. We use Activiti workflow engine to execute the process, and we realize the process analysis sub-module based on different service interfaces such as runtime service interface, history service interface, identify service interface and so on to interact with the core engine to receive user execution results, invoke the core engine to execute and get the information such as new tasks to notify users. Generally, the process management module interacts with the information management component to read and update the process data and is the core module of the workflow manage‐ment system.

•Process deploy module: it receives the process model definition file from users, then it sends the model files to the workflow engine to check and parse. The parsed process data will be saved to database and the process model definition will be saved in workflow process definition files repository. Then the process can be started to execute.

•Process monitor module: the function of this module is to monitor the process execu‐tion in real time. With the execution of the process, users usually want to know statistical information of the process involved in, in the clothes manufacturing

scenario, for example, which orders have finished, aborted, pending or running, and the progress and execution time of related processes. The monitor module needs to interact with the process information in database and return the monitoring informa‐tion described in graph or table format.

•Process improve module: the module is used to provide improvement suggestions to the model designer. The process models are designed according to the experience of obtained via expert interviews to initially configure a process. During execution however the operational process typically starts deviating from this reference model, for example, due to new regulations that have not been incorporated into the reference model yet, or simply because the reference model is not accurate enough. It imple‐ments through process mining plugins or checking conformance between the log recorded in the log information database and the original process model stored in the workflow process definition files repository, and then the deviations are presented to model designer to improve the process model.

3.3Information Management Component

Information Management Component interacts with process management component, it is designed to store the process-related and business-related data, which includes two main modules, one is workflow process definition file repository which saves the process model definition files deployed to the workflow engine, and another is data persistence management module, this module includes log information sub-module, process infor‐mation sub-module and business information sub-module. The log information submodule saves the historic process instances and tasks execution records automatically and these historic process-related tables are applied to find valuable information for process monitoring function. The process information sub-module mainly includes process-related runtime tables such as process instance table, activity instance table, task instance table and variable instance table. The business information sub-module includes business operation data which includes many business entity tables designed by business developers.

4Fundamental Techniques

4.1Business Process Modeling Language

The Business Process Model and Notation (BPMN) is an OMG specification that not only defines a standard on how to graphically represent a business process, but now also includes execution semantics for the elements defined, and an XML format on how to store and share process definitions. Process modeling language should contain several key model elements to compose a common process definition. Some key model elements usually used in manufacturing scenario are described as follows:

1.Events: They are used to model the occurrence of a particular event. We use the start event to indicate the start of the process and end events to define the end of the process.

2.Activities: These define the different actions that need to be performed during the execution of the process. Different types of tasks usually are used to describe the model execution such as user tasks, and service tasks. The user tasks are used to represent the business operations, and many related attributes, such as user task id, executor id, variables and judge conditions. The service tasks are used to execute automated operations such as sending emails to customers.

3.Gateways: gateways are used to define multiple paths in the process. Depending on the type of gateway, these might indicate parallel execution, choice. Parallel execu‐tions are represented by an inclusive gateway node and converging strategy while choice structures are described by an exclusive gateway node and diverging strategy.

4.Process variables: variable elements define input and output data in the workflow process and they will be used in task nodes and sequence flows which define the different connect relations to judge and confirm execution paths.

We integrate Activiti Modeler to FMC system as open-source web-based editor to create and edit the process models for users. The process models will be saved into workflow process definition file repository so that they can be executed. Figure 1 shows the sample make BPMN segment.

4.2Process Monitoring Mechanism

When the process is executed, the system is supposed to monitor the status of the process. The system provides monitoring module to gather process status and statistics informa‐tion according to the customized monitor requirement of different users. For example, the produce managers want to know all running, aborted and finished produce tasks of different process instances in one period time. The structure of process monitor module is described in Fig. 3. Firstly, different users send monitor request through web interface, when servers get requests, they will invoke different service interfaces of process anal‐ysis module to compute statistic and real-time process information to users. Finally, the monitoring web page will be updated.

4.3Process Improvement Mechanism

Process models are used to abstract and structure the business process. With the usage and development of the process model, some deviations will occur compared to the reference model, for example, due to new regulations that have not been incorporated into the reference model yet, or simply because the reference model is not accurate enough [10]. So the users have the demands to improve and update the process models accurately. There are two ways to find deviations between designed process and actual executions. The one way is process mining technique. We implement a process mining algorithm with post-task event trace log as input on ProM, and generate the discovered process model in Petri net formats, then the deviations can be found through the compar‐ison between discovered Petri net and designed model. Another way is conformance checking plugin which takes event logs and designed process model as input and generate the evaluation result in different aspects such as fitness, generalization and

Business Process Miner

Workflow Engine

Process Deploy Process Update

ProM Platform

XEsame

.XLog File BPMN Suggestions

Data management

Task Operations Log Database

Conformance Checker

Workflow Process Files Repository

precision. With the system running for a period, the task and event log recorded in the database are able to react the actual execution situation, then we use the log format converter to transform the original log files with SQL format to XLog or XES log format that the plugins on ProM [8] can use, then we use the converted log file and process model from repository as inputs to invoke the conformance checker or process mining plugin on ProM. As a result, discovered deviations will be provided to model designers. The structure of the improve module is described in Fig. 4. If model designers modify original process model, the running process instances will be deployed on different versions according to if they can be updated to the new process model.

Fig. 3. Process monitor mechanism
Fig. 4. Process improvement mechanism

5System Demo

5.1Environment Setting Up

The FMC system is implemented as a J2EE application. The web system integrates spring framework business system, BPMN Designer, MySQL database and Activiti workflow engine. The process management component is developed based on BPMN Designer and Activiti workflow engine. The business execution component is developed as a web system and process and business logs are persisted in MySQL database. And an easy-to-use web interface is designed for process users to interact with server.

5.2Demonstration Steps

The FMC supply chain management system has been used in a clothes manufacturing company in china. In the manufacturing industry, the technologies and environment are developed and changed very often, to improve efficiency and enhance the market competitiveness. The business processes in use of the manufacturing company often needs re-engineering and improvement. In the past, when the business processes are remodeled, the employees need to understand and learn new rules for a long time. During the time, the running orders have to be executed offline. This problem is solved using the FMC supply chain management system. When the business processes are need to improved, process designers can use process improve module to help provide optimi‐zation suggestions and then modify the process models on BPMN designer graphically. With the help of the graphically process designer, process control module and process improvement module, the efficiency and competitiveness of the manufacturing company are improved.

Currently, the system has been applied to manage business processes of clothes manufacturing company. The whole business process functions are shown as follows in Fig. 7. We design the following steps to show the function and the general operating procedures:

1.If a business process will be managed by FMC system, users firstly need to create process models in BPMN2 format with graphical web BPMN process designer. The process will be deployed on workflow engine on server. When the workflow process definition files are received by workflow engine, the engine will parse the files firstly. The nodes with different types will be structured and persisted in the process data‐base.

2.Processes in FMC system are shareable and users can join different processes. When the processes are started, process instances will be created and executed. After users execute business tasks, the execution result will be send to workflow flow engine. The engine analyses and executes related process instances according to the result variables, current process instance state and the relations between task nodes. Then the new tasks will be created through process definition and sent to related users.

3.The process instance has several process states which are Started, Running, Aborted and Finished. Real-time state information of process instances will be collected by process monitor module. this information will be presented to users according to

users’ customization with graphs or tables. Figures 5 and 6 show the monitor of running process instances and tasks, which describe the monitoring of process instances and activity instances respectively. Figure 5 shows a list of historic process instances that the user has joined in. The process instances are described from different aspects such as id, time, states so on. Through the process progress button, the Fig. 6 shows the process activities. The yellow boards represent the finished route composed of user tasks and finish time when user tasks are operated. The red boards represent the current tasks for execution. The process monitoring function helps users to get real and important information of executions.

4.When the business process system has running for a period of time, process improve‐ment module allows the business process adaptable to unpredictable changes and can find deviations between logs and models which can provided to process engine as suggestions. We use XEsame on ProM platform to convert process operation records in MySQL database into standard log format which can be used by the conformance checking and process mining plugins on ProM platform. Then the

Fig. 5. Process instance monitor
Fig. 6. Activity instance monitor in BPMN graph (Color figure online)

process engine will invoke the process mining or conformance checking plugins to find deviations and present it to related users. Finally, the process model can be updated to adapt the actual scenario.

5.The system also adopts Spring-Hibernate transaction manager to manage process and business transactions, so the business data and process instance state can roll back to the previous state when the exceptions or the errors happened during the current task execution.

Figure 7 shows the whole supply chain process model. FMC uses BPMN modeling language, the process model contains many complex order relations consist of exclusive gateway, parallel gateway and sequential flows. There are only one start event and many end events in the process. BPMN model language provides a convenient way to create, modify processes for users graphically.

6Conclusion

This paper introduces the FMC supply chain management system from architecture and fundamental techniques aspects, and uses a clothes manufacturing scenario to

Fig. 7. The whole supply chain process model

demonstrate the functions of the system. Through the management of the business process, the users are able to create the structured process models graphically through web interface, to deploy them on server to execute semi-automatically, to monitor the customized real-time process or business execution information, and improve the process according to the deviations from conformance checking and process mining. This system improves the efficiency and reliability of the process execution and manage‐ment, and allows the process model to adapt to the actual situation accurately and flexibly. A web-based user interface offers an intuitive way to manage process models. The management effect of the clothes manufacturing scenario proves the availability of FMC system.

Acknowledgments. This work was supported by the The National Key Research and Development Program of China (No. 2016YFC0800803), the National Natural Science Foundation, China (No. 61572162, 61572251), and the Fundamental Research Funds for the Central Universities. Jidong Ge is the corresponding author.

References

1. Weske, M.: Business Process Management: Concepts, Languages, Architectures. Springer, Heidelberg (2012)

2. Manfred, R., Weber, B.: Enabling Flexibility in Process-aware Information Systems: Challenges, Methods, Technologies. Springer, Heidelberg (2012)

3. Ingo, W., Paik, H.-Y., Benatallah, B.: Form-based web service composition for domain experts. ACM Trans. Web 8(1), 2 (2013)

4. Object Management Group: A standard Business Process Model and Notation (BPMN). http:// www.bpmn.org/

5. A flexible Java Business Process Management (BPM) Suite. http://www.jbpm.org/

6. A light-weight workflow and Business Process Management (BPM) Platform. http:// www.activiti.org/

7. van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Electron. Notes Theore. Comput. Sci. 121, 3–21 (2005)

8. Process Mining Group: An Open Source framework for process mining algorithms (2016). http://www.processmining.org/prom

9. Wang, D., Ge, J., Hu, H., et al.: A new process mining algorithm based on event type. In: Proceedings of International Conference on Dependable, Autonomic and Secure Computing, pp. 1144–1151. IEEE (2011)

10. Buijs, J.C.A.M., Rosa, M., Reijers, H.A., Dongen, B.F., van der Aalst, W.M.P.: Improving business process models using observed behavior. In: Cudre-Mauroux, P., Ceravolo, P., Gašević, D. (eds.) SIMPDA 2012. LNBIP, vol. 162, pp. 44–59. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40919-6_3 14H. Wei

ProcessEnactment

Crowdsourcing Complex Task Automatically by Workflow Technology

School of Data and Computer Science, Sun Yat-Sen University, Guangzhou, China {zhengq27,wangwy9,shixhui}@mail2.sysu.edu.cn, {yuy,panml}@mail.sysu.edu.cn

Abstract. Micro-task Crowdsourcing market has become a new trend that convenes a large population of workers to solve the task proposed by a requester online. But these micro-tasks in the market are always simple and independent. To solve complex tasks in real world, some recursive decomposition approaches were proposed and some tools were developed. However, the process of solving complex tasks still involve lots of manual work. How to make this process more automatic? In this paper, we present a new crowdsourcing process model which includes a state machine model of a task and a relation model of tasks. Based on this process model, we design a crowdsourcing platform with the help of state machine workflow technology. With the support of this platform, we can define and execute a crowdsourcing process. In the process of the execution, the platform can manage dependencies between tasks. By means of this platform, one can develop many kinds of crowdsourcing applications with less programming, higher speed and quality. At the end of this paper, a case study is given to demon‐strate the practicability of our model and platform.

Keywords: Crowdsourcing · Workflow · State machine · Automation

1Introduction

Crowdsourcing is a powerful mechanism to complete tasks on the Internet. Recently, crowdsourcing is widely applied in real world. It adopts crowd intelligence and creativity in solving problem. By crowdsourcing, various tasks that are difficult to complete by machine, such as labeling the images, discovering new galaxies (galaxyzoo.org) [1, 2], can be accomplished. These tasks do not acquire any specialized skill. Yet a great deal of tasks demand on specific groups, ranging from crowdsourcing t-shirt designs (Thread‐less) to software testing (UTest) [3, 4]. Crowdsourcing is also applied in the labor and commercial market to find proper buyers and sellers from different countries (Odesk and Elance) [5].

One of the most popular general-purpose crowdsourcing markets for diverse tasks is Amazon Mechanical Turk (MTurk) and it has been used to research crowdsourcing problems. Tasks on it can vary from images annotation to audio transcription. These tasks, called micro-tasks, are simple, repetitive, independent and cost less time.

© Springer Nature Singapore Pte Ltd. 2017

J. Cao and J. Liu (Eds.): MiPAC 2016, CCIS 686, pp. 17–30, 2017.

DOI: 10.1007/978-981-10-3996-6_2

18Q. Zheng et al.

Compared with typical micro-tasks on the Mechanical Turk, tasks in life are very complex and take a lot of time. They need technicians from different field to work collaboratively. To make this happen in crowdsourcing market, these complex tasks are often decomposed into subtasks. The process of decomposition is very complex. When should it be decomposed and how to break down it are fully decided and executed by crowd workers. This is a completely recursive process with artificial participation. To automatically solve complex tasks, we propose a crowdsourcing process model on the foundation of state machine workflow technology. In addition to, we illustrate how to design a crowdsourcing platform which supports this model. A variety of crowd‐sourcing applications can be built quickly by this platform.

2Related Work

Early, crowdsourcing was used to process large datasets like tagging and classification that were outside the reach of autonomous algorithms. Using crowdsourcing, these tasks can be solved more efficiently, quickly and accurately. But, these tasks don’t have any creativity.

Later, more and more problems can be solved via distributed human computation. Soylant provides a word processing interface that uses crowd workers to help with proofreading, document shortening, editing and commenting tasks [6]. VizWiz, an iPhone app which enables blind user to recruit remote sighted workers to help them with visual problems in nearly real-time [7]. Legion is a system that allows end users to easily capture existing GUIs and outsource them for collaborative, real-time control by the crowd [8]. More and more problems of particular type can be solved through crowd‐sourcing.

Previously, there are three ways to solve complex tasks. TurKit, a toolkit for deploying iterative tasks to MTurk [9]. Its crash-and-rerun programming model that makes TurKit possible, along with a variety of applications for human computation algorithms [10]. The requester must decide how to divide task by hard code before it is posted on MTurk. Crowd‐Forge uses the framework of map-reduce to divide complex work into smaller steps [11]. It cannot support iteration or recursion and require the task designer to specify the sequence of activities. The third method is a combination of Price-Divide-Solve algorithm and Turbo‐matic tool. The PDS algorithm guides workers through the process of converting large and complex tasks into micro-tasks appropriate for crowd markets [12]. The Turkomatic is a tool for iteration. It can post each step in the best decomposition schemas on Amazon Mechan‐ical Turk [13]. It does not provide crowd workers with the ability to edit workflow. In those toolkits, they rely on MTurk to complete micro-tasks. As a result, they lack the control ability of the whole process. They describe the process of accomplishing complex tasks as workflow, but they do not give business process definition for workflow.

At present, there are two business process modeling standards. One is XPDL defined by WfMC (Workflow Management Coalition). Another is BPMN defined by OMG (Object Management Group). Because the decomposition process of complex task is dynamic, both traditional standard cannot be used for modeling the process of crowdsourcing. Therefore, we use state machine workflow technology to solve this problem.

3.1State Machine

A finite-state machine (FSM) is a mathematical model of finite computation used to design both computer programs and sequential logic circuits. It is conceived as an abstract machine that has a finite number of states. The machine only stays in one state at a given time. It can transfer from one state to another by a triggering event and condi‐tion. This is called a transition. A FSM contains a list of its states, and the triggering condition for each transition. It’s a mathematical model can be described as follows. A deterministic finite state machine is a quintuple (�� , S , s0, �� , F ), where Σ is the input alphabet (a finite, non-empty set of symbols); S is a finite, non-empty set of states; s0 is an initial state; an element of S ⋅ �� is the state-transition function �� :S ×Σ → S ⋅ F is the set of final states.

Faced with state explosion problems and the lack of ability to describe concurrency, David Harel proposed Statechart diagram [14]. Statechart puts forward concurrent, hierarchy, communication concepts base on FSM and has a better description ability. Later, Object Management Group (OMG) adopted Statechart model to establish UML state machine specification, and World Wide Web Consortium (W3C) published State Chart XML (SCXML) base on Statechart [15, 16]. They have some common concepts, for example State, Composite State, Event, Condition, Action and Transition. The state refers to a situation of object in its life cycle. That an object stay in some particular state is bound to meet certain conditions and wait for some events. Transition is a kind of relationship between two states, when a certain event occurs and satisfies specific guard condition, source state will transfer to the target state with a certain action. A transition in diagram often expressed like this: Event [Condition]/Action.

3.2State Machine and Workflow

The state machine is widely used in many fields. In software design field, UML state machine diagram are used to model lifecycle and dynamic behaviors of an object or system. In the course of business process, state diagram as a modeling approach are used to build workflow model. There are many scholars introduce how to use Statechart modeling workflow. Yang Dong couples state with activity and expand the types of events in Statechart [17]. Wai Yin Mok make an analogy between four common work‐flow patterns and some concepts in Statechart and point out three properties model should satisfy: Termination, Confluence, Observable Determinism [18]. Kushnareva use Statechart to model Crisis Management and solve the problem of the process of dynamic change [19]. Guy Redding adds region and gateway to expand the state machine to support flexible process model [20]. State machine diagram is also used to model the lifecycle of business artifact in Artifact-Centric process model [21]. More than others, wendy dwell on the possibility of Statechart as workflow Specification [22]. Again, in a engineering application, windows workflow foundation framework and OSWorkflow engine support using state machine to establish workflow model [23, 24]. Here, using

20Q. Zheng et al.

state machines diagrams modeling workflow model is called state machine workflow technology.

4Modeling

In order to solve complex task automatically on single platform without the support of other third-party tools, the following modelling method which combines the PDS algo‐rithm and state machine workflow technology is proposed.

4.1Conceptual Meta-model of Crowdsourcing

To define and introduce the model, some basic concepts are defined as following: Task: task is the question posted by requester. It can be classified into simple task and complex task.

Simple task (STask): These tasks can be solved by worker directly and don’t need to be divided. It is also equivalent to the micro-task.

Complex task (CTask): Tasks should be decomposed into several parallel subtasks. These subtasks are CTask or STask.

Figure 1 is conceptual meta-model of crowdsourcing which shows the relationship between CTask and STask. Round box represents CTask and ellipse represents STask. A directed edge ea,b implies that task B is one of subtasks of task A. The solution of task A is composed of B and C’s solution.

4.2Modeling Life Cycle of Crowdsourcing Task Object

According to object-oriented thinking, a task can be regard as an object. The task will experience a series of steps until it gets solution. Each step can be considered as what needs to be done in a particular state. These states can be expressed by object lifecycle. The life cycle of task object can be varied. Figure 2 presents a kind of lifecycle of task by State Machine Diagram. It contains the following basic state S = {Initial, Judging, Decomposing, DecomposeVoting, Waiting, Solving, SolveVoting, Merging, Final}. The Initial and Final state are pseudo-states. Waiting state is a flag state. Each of the remaining state corresponds to a certain number of work items, which are performed by workers or service. Relevant states in our model are explained as following.

Fig. 1. Conceptual meta-model

Fig. 2. The lifecycle of crowdsourcing task

Judging state: The current task is undergoing artificial judge phase. It requires a certain number of people to judge whether current task is complex. The definition of complex task should be determined by crowd experts.

Decomposing state: The current task is complex and it requires some workers to decompose it into smaller tasks.

DecomposeVoting state: The current task already has several decomposition schemas. It needs some workers to vote on which is the most reasonable and reliable one.

Solving state: The current task is simple and it requires a certain number of workers to solve it.

SolveVoting state: The current task has been solved by several workers. It is time to vote for the best solution.

Waiting state: It is a flag state and the only function is to wait on those events that are delivered when subtasks get their solution.

Merging state: The current task is complex and its all subtasks have gotten their solution. All the subtasks’ solutions are assembled into solution of the current task by crowd workers or service task.

4.3Crowdsourcing Process Modelling

During task execution, crowdsourcing process model is generated automatically according to meta-model and task’s lifecycle model. In state machine workflow, state machine diagram is process definition of workflow instance. If a requester issues a task A, a new workflow instance corresponding to task A will be started. This instance will go through such a process.

1.Determine whether or not task associated with this instance is complex in Judging state, if the task is a CTask go to 2, otherwise go to 6.

2.Each of workers in this step gives a decomposition strategy of task associated with this instance. The decomposition strategy is made up of several small steps. Then go to 3.

3.Several decomposition solutions were produced. They will be voted by several workers to obtain the best decomposition solution. Each step in the best decomposition scheme will be released to the platform as a subtask of current task. Each subtask has its own workflow instance. For each subtask, go to 1. For current task, go to 4.

4.Wait for each subtask generated in 3 to send an event. The event means current subtask has been done. Thereafter, go to 5.

22Q. Zheng et al.

5.Now, each subtask of task has been completed. According to their solution and order, platform assembles the solution of the current task and send an event signifying the completion of current task to its parent task. Then go to 8.

6.Current task is regarded as a STask and solved by some workers. Then go to 7.

7.At this point, the task already has several solutions and the best solution will be selected by several workers. Finally, send an event signifying the completion of current task to its parent task. Then go to 8.

8.Now, current task is accomplished.

Among these steps, the tasks which experience a step sequence including 1, 2, 3, 4, 5, 8 have a process of decomposing and merging. The Relationships between tasks and subtasks are recorded during decomposition. Finally, it is used to complete merging process.

Figure 3 shows the lifecycle of task A. The dotted line connects the task and its lifecycle. The red state indicates workflow instance have gone through, while green state means workflow instance stays in it. Task A has gone through Judging, Decomposing, DecomposeVoting state. The best decomposition strategy has been found in Decomo‐seVoting state.

When workflow instance exits DecomposeVoting state, the exit action regards each step of the decomposition strategy as a subtask and launch a corresponding workflow instance. In this case, if the best decomposition policy of task A are B, C and D, then task A enters Waiting state to wait task B, C, D to be solved. Figure 4 express the status after exiting the DecomposeVoting.

Once subtasks B, C, D begin their life cycles, they also need to be judged whether or not it is a complex task. When C is judged to be a complex task and B, D are judged to be simple tasks. B and D are solved by workers directly. Then C experiences the same life cycle as A and generates two subtasks E, F. According to the concept of meta-model and decomposition process, it gradually forms a tree structure. The left side in Fig. 5 is a tree generated in decomposition process.

Fig. 3. Lifecycle of task A (Color figure online)

As can be seen from the decomposition process, the tree generated by it has the following characteristics.

1.Leaf nodes correspond to simple tasks and all non-leaf nodes are complex tasks.

2.Node with one degree doesn’t exist.

3.The height and degree of the tree are completely determined by the decomposition process with artificial participation.

Each state machine instance in tree must hold same reference to this tree. When current task is divided into a series of subtasks, the state machine instance of each subtask is inserted into the tree as a child of current node. Each subtask judged to be Complex task repeats the above process, then decomposition tree is built. This tree records the decomposition rela‐tionship between tasks. With the tree, the merging process begin to perform. Once the task is broken down, it will wait for its subtasks to be solved and send event to it. Finally, STask is solved by workers directly and CTask is solved by merging algorithm

Fig. 5. A tree generated in decomposition process
Fig. 4. A recursive process of task A

Another random document with no related content on Scribd:

15. THE GIRL WHO MARRIED A STAR.

[16]

One night two pretty young maidens were sleeping on top of a summer arbor They were ill with monthly sickness. One said, “Kario, I love that little bright star, and I wish it was my husband.” That same night, while sleeping, the girl was taken away up in the heavens, to live with her husband, he giving her instructions what to do and what not to do. He could not always stay at home, as he was in the chase. One of the instructions was that the woman should never dig up an Indian turnip at slough-like places. While her husband was away, the woman determined she would discover the mystery connected with her husband’s injunction. When she had dug the turnip she saw what the mystery was. She saw the people living on this earth looking like crawling insects.

When she saw this she cried and cried and cried. She went to an old woman for comfort. The old woman saw that the woman had been crying; so she questioned her and found out her trouble. The woman answered that she could easily be relieved of her trouble. So she advised her to collect all the sinew she could find from the meat her husband brought.

The girl told her husband she wanted all the sinew there was in all the game he killed, even the very smallest piece. Her husband did as she asked, not knowing her intention. When a very large number had been made the woman took the sinew and went to the old woman, who began to make what she had promised to make for her. “Come

back in a few days,” she said, “and I will have the thread ready for you. Remember to come when your husband goes on a long chase.”

The husband started on a chase, and the girl went to the old Woman’s lodge and told her that her man had gone. The old woman got her sinew rope and fixed it around the woman’s waist and began to let her down—down—down. She went with her first child on her back. The place she started down was where she had dug up the forbidden root. The twine was lacking about twenty or more feet. The old woman was an old spider, it was found. Old Spider-Woman did not have enough cobweb and sinew, so the woman hung on the rope, not able to touch the earth.

When her husband returned he found his wife missing. He began to look for her. He thought at once of his order, and so went out where she usually dug. He found a stick in the grass. He discovered the rope tied around the stick, and his wife and child hanging away down near the earth. He picked up a stone and talked to the stone, saying, “Do not harm the boy, but kill the mother.” Down—down— went the stone, and struck the young mother on the head; it cut the rope and her body fell; but the boy was safe. The boy stayed by his mother’s body and fed himself at her breast for a time. Her body began to decay.

The boy went off and got into a cornfield, not knowing that it was corn. When lonesome he returned to his mother. The owner of the field was an old woman. She saw the footprints in her field. She wondered what it could be. She made a little ball and a crooked stick, also a little bow and arrows. She thought if it was a girl she would take the ball and crooked stick, but if it was a boy he would take the bow and arrows. When the old woman looked she found the little fellow had taken the bow and arrows.

The old woman was very joyful. The little fellow had done much damage to her squash vines with his bow and arrows. She went out and hid in the field, waiting for the little fellow The boy came as usual with his weapons and the old woman sprang out and caught him, saying, “Oh, atine, atine; you are to come home with me.”

She took the boy home and gave him food, such as fresh corn mush, succotash, and squash. The boy seemed quite happy. When the woman went out to work he amused himself with his arrows, shooting little birds in the field, and on his grandmother’s return he would bring the birds for her to eat. She was a happy grandmother, proud of her little grandson. The boy grew larger. When he began to make his own bows and arrows to his taste he began to bring home larger game, such as deer and antelope. His grandmother was still happier.

The boy’s grandmother was accustomed to place under a curtain which was always closed, a big wooden pan of whatever they had to eat, before she went to her work. The boy, noticing this, made up his mind to find out what it was. While she was gone, he moved the curtain and beheld a huge serpent with large yellow eyes. The boy said within himself: “Ah! here is the one that eats up everything that grandmother puts here.” He took his bow and arrows and shot and shot, until he killed it.

The boy’s grandmother came in. The boy spoke up, and said: “Grandmother, I have killed the bad one that ate up everything you placed under that curtain.” The old woman appeared glad of it, but was hurt at heart. She covered the serpent and placed it in a pool. The serpent said that he could not do anything, because the boy was gifted with a great mysterious power of his father. The dead serpent was the husband of this grandmother.

The grandmother, wounded at heart, planned to have the boy killed in some way. She forbade him to ever go into the timber near by, because there were all sorts of dangers there. In this timber, she said, was a bear that wanted to tear him into small strips. When the old woman had gone he started out to the forbidden place. He found the bear, captured him and thought he was strong and would do to haul corn and wood for his grandmother. On her return she saw the great, big black-bear tied. The boy spoke up, saying, “I have here a strong animal which will work for us.” The old woman appeared to be happy, but felt hurt that the boy could have captured the bear. She was the owner of all animals around, both good and bad. She turned

the bear loose and explained the case to the boy, saying she could not use the bear in any way.

One day the boy was gone all day and all night. His grandmother now thought him dead. Roaming around, the boy found a tipi. In the tipi were four strong-looking men. Around the fire was the meat of a whole buffalo and an elk. The boy stood on one side looking at the game. The men were playing with plum dice in a basket. The interest of these men was very noticeable. One man’s nose got very dirty, but he would not move to clean it. The boy outside did not like it. He took his arrow and shot through the hole he was peeping through. The arrow cleaned the man’s nose. The men rushed out and gave the boy a hearty welcome, for they had already heard of his wonderful doings. They took him in and gave him a whole buffalo to eat. He began to eat, and ate as much as usual. The men began to ask why he did not eat more. He said he could not, as he had had his fill. The men ate heartily. They cleared the meat that was before them. The men asked him to stay all night. They invited him to join them on a hunting trip.

Next day they started. They killed an elk. They dressed it and found a fœtus. As courtesy, the hunters took the fœtus and placed it before the boy to take home with him. The boy was affected. He asked them to remove the fœtus. He was standing by a tree. He started up the tree. The men, seeing he was afraid of it, moved it, little by little, toward him. They were afraid of him and were trying to do everything to get rid of him. The boy was afraid of the fœtus. He would not come down while it was in the way. The men came home. By and by a man was sent out to see if the boy was there. Coming to the spot he found the boy still there. The boy asked the man to remove the fœtus. He refused. He went home and reported all he had seen. In about four days the men came around and found the boy still there. They found him very thin, and suffering for food and water. He would not come down while the fœtus was there. The men made a conditional offer,—if he would deliver up to them his grandmother they would remove the fœtus. The boy said he would. They removed the fœtus. The boy started home at once. He told his

grandmother what had happened and what he had done. Out of love for his life he had given her up to these men.

The grandmother was happy on his return. She said she would grant his request. About two days after, she and the boy started out where the men were. They stopped at the entrance of the tipi until they heard a voice from within asking them to step in. The boy said, “Nawa, I have done what I agreed to do. Here is my grandmother.” “Ah ho! Ah hi!” they replied, “you were honest and have done as you agreed to do. That is the way for noble boys to do. As this is a bargain for your life we will do all we can for you to turn our power and skill over to you.” Now they began to teach the boy the ceremony of catching eagles and of hunting. “It was our desire to have your grandmother, and as you have been true to your agreement, we are glad.” All were satisfied. The grandmother and son then went home.

The next day the boy started out on the prairie for game. He met a camp of Snakes, mostly deadly Rattlesnakes, and there were all the other kinds of Snakes. They were glad to have him come. They invited him in. They gave him the best seat. He knew what danger there was to meet. So as he sat down he took out a smooth stone which he used for sharpening his knife, and placed it in his anus. The room was clean and there was a ridge around the fire for a pillow. Time and again he noticed a Snake disappear and attack him where he had defended himself. He knew it. They said: “He must be hungry. Give him something.” They gave him a spleen. He took it and looked at it. He replied that he could not eat it raw; so he poked up the fire and threw the spleen in. It cracked and made the audience wild. The spleen was the teeth of all these Snakes. The boy knew the secret and could not be fooled so easily.

The Snakes, resting on the square pillow-like structure, demanded of the boy that he relate some happenings or stories, to pass the night pleasantly. He refused to be first. He agreed to take his turn with them. They began. Each Snake had for his subject the life of their guest and that of his grandmother. When all were through with their stories the boy began his story: “Nesaru commanded the winds to blow; at evening they stop, the trees stop rustling, the grass keeps

on for a while, but they all fall asleep.” This much of the story put a part of them to sleep. “Nesaru sends hurricanes of trials and hardships in our lives; the same to all kinds of trees and to large, deep rivers; they rage and beat against their banks, the water gets dirty, there comes on the gentle night, soft breezes, the trees quiet down, the rivers are calmed, the waters clear up and they are asleep.” This was the end of the boy’s story. The remainder of them fell asleep.

The boy thought of how he was to have been treated, and he decided to be avenged. He took from his belt his sharp knife and cut along a straight line on the square structure, cutting off the head of every Snake until he came to the last one, which slid away, saying as he went, “Old-Woman’s-Boy, I will remember all.”

As the boy left he was very particular as to how he should carry himself. Having gone many miles he thought all danger was over. He placed his arrows around him, bidding them to awaken him when danger was near.

While he was sleeping his enemy came. Before the arrow could give the alarm the Snake entered his body. Grasping his knife he cut his stomach open. Up went the snake’s head to his breast. He cut his breast open Up it went to his throat. He cut his throat open. Up it went, into his head, and rested there. His father above knew all of this. He sent a great wind which turned the boy’s head over, so that his opened œsophagus turned toward the wind. Then came a hard rain, filling every corner of his head. The Snake’s head would peep out of the boy’s head, but the boy would say, “Old-Woman’s Grandson is still alive.” There came a scorching heat, and the water began to make the Snake peep out its head, but the boy would say, “Old-Woman’s-Grandson is still alive.” It got too hot for the Snake. It fled, and the boy sprang to his feet and caught it. “You will suffer punishment, and you will always be ashamed and crawl on your body in the dirt, your head down, avoiding all decent creatures that Nesaru made.” He took the Snake and knocked his head on a flat rock until it was flat and its eyes were close to its mouth.

The reason the boy was afraid of the fœtus was that it was the time of the year when all young animals are as yet unborn, and the cluster of stars to which the boy’s father belonged is never seen at this time to come up with the rest. The boy knew that his father could not be present to help him, and so he did not dare to do anything to help himself.

FOOTNOTES:

[16] Told by White-Bear.

16. NO-TONGUE AND THE SUN AND THE MOON.[17]

There was a young man in a village who wanted to be great. In olden times the chief thing among the people was to be a great warrior. The young men in those times used to go out among the hills, and then find a place to stand and mourn. They used to stay away from home four or five days without drinking or eating.

Now this particular young man went out alone, upon a high hill, to mourn. In the afternoon a little bird came to him, and said: “This is not the place where you should stand. I will show you where you must stand.” So the little bird flew and the boy followed. The bird stopped at a certain place, and the boy stood there. Late in the evening a man came to the boy. The man was all painted red, and he said to him: “I am glad to see you. You are going to be my son, and I am going to take you with me now All I want from you is your tongue.” So the young man pulled his tongue out, cut it off and handed it to the man. As he handed his tongue to the man he fell down and died. It was now dark, and as the young man fell the Moon rose and saw this young man fall down, and the Moon said to himself: “That man who has killed this young man is always trying to do something that is not right. I know who that man is; it is the Sun. I know that he has taken this young man’s tongue.” So the Moon went to the young man and touched his feet, and the young man waked and sat up.

When No-Tongue saw the strange man he did not know what to do. He was not the same man who had taken his tongue This man

looked white, because he was the Moon. The Moon asked NoTongue why he had given away his tongue and to whom he had given it. No-Tongue answered, “How can I talk without a tongue?” The Moon said, “Speak, and tell me.” So the boy spoke, and he found that he was able to talk. So he began to tell what the man looked like. The Moon said he was sure that the man was the Sun. Then the Moon spoke to No-Tongue, and said: “The Sun was trying to kill you. No-Tongue, hereafter you shall be my son; but let your other father, the Sun, come after you first. I must tell you what to say. You will not be killed by the Sun. The Sun is coming for you tomorrow morning, and when you go up to our dwelling place (the heavens) he is going to show you some things that he has. You must now be careful not to take the new things that he has, but you shall take the old things. Take the old weapons. The Sun thinks a great deal of these old weapons.” This is all that the Moon said. The Moon then disappeared.

In the morning, the Sun came to No-Tongue and took him up into the sky to his home, and said, “Now, my son, I want you to choose of these things that I have here.” No-Tongue took the oldest things. When the Sun saw that No-Tongue took the best things—the oldest ones—he came out from his lodge crying, because this would give No-Tongue a long life, and would also make him become great, and this was what the Sun did not want of No-Tongue. He had thought that No-Tongue would surely take the new things. But if No-Tongue had taken the new things, that would have shortened his life and made it impossible for No-Tongue to become great. Then the Sun began to think of some way to kill No-Tongue, but he never could take back the things No-Tongue had taken, having promised them to him. As they came out from the Sun’s lodge the Sun said: “My son, look. There is your home. Look all around you. You can see everything plainly. When you go home, after two days have passed, you must go on the war-path, and you will conquer old enemies. You will have all you want. You are to be great. But when you, my son, go home, give to me a white buffalo robe.” So the Sun went away. When night came, the Moon came out and spoke to No-Tongue, and asked what the Sun had said to him. No-Tongue told the Moon

all that the Sun had told him, and the Moon said, “Do not give him the white buffalo robe, but give that to me, and get a dark-brown robe for the Sun.” The Moon then began to tell No-Tongue what to do. He told him to get some white clay and make powder out of it, and then pour the white powder all over the robe, so that it would look white. So No-Tongue did as he was told to do.

When the Sun received the white buffalo robe, which really was not white, he was proud of it; furthermore, he was proud that his son had obtained it for him. One day he hung the robe out, and the wind was blowing hard. The wind shook all the white clay out of the robe, so that the robe turned to a dark-brownish color. Then the Sun saw that it was not a real white buffalo robe, and did not like it.

When the Moon and the Sun got together, the Sun said, “I am sorry for what my son has done to me, and now my dear son is going to kill him.” The Sun had a son who belonged to another tribe, and this was the son who was to kill No-Tongue. So the Moon heard all that the Sun had to say.

One night the Moon saw No-Tongue, and told the young man all that the Sun had said. The Moon said that the Sun could not do anything to kill him. The Moon said: “The man that you are to fight with is going to try to shake hands with you, because he is your cousin,—not a real cousin, but because you are the son of the Sun and so is he,—so he is your cousin. He is the one who has been selected to kill you. But do not be afraid; I shall be with you and will help you all I can. Do not shake hands with the young man, your cousin, and if you must shake hands, do not shake with your right hand. Be very careful not to let him strike you first. If you should shake hands with him, strike him. You must not let him strike you first; and when you have killed him, cut his head off and put it under a big stone that shall be near you, so that the Sun will not make him live again. By placing the head under the stone the Sun will be prevented from bringing him to life.” The Moon also said, “Be careful to do what I have told you to do.” No-Tongue was glad. The Moon also told No-Tongue that the young man he was to fight with was named Little-Sun.

Two days after this some warriors went out on the war-path. Before they had gone far the Sun went to No-Tongue, and said: “My son, I am glad you are going on the war-path; I want you to kill a man for me. He is coming. He thinks he is great, but he is not. So kill him for me.” The Sun said all of this, not meaning it, for he was planning that Little-Sun might kill No-Tongue. So the warriors started on the war-path, and in a few days they came to the place which they thought would be a good place to remain for a while. The leaders selected scouts to go out and look over the country. The scouts went up a high hill, and there they met the spies of the enemy coming up from the other side. These did not stop, but turned straight back again, and went and told the enemy, and of course the other scouts turned back and told their leaders that the enemy was coming. So in the morning, the two sets of people came together, and they fought a battle; but before starting the battle there was a man who stood in front of the enemy’s line, and said, “No-Tongue, I want you to come and shake hands with me, for you are amongst those people.” No-Tongue went to him, and when they were nearly together, everybody saw that the two were dressed so as to look very much alike, but they did not know that they were to fight each other; but the two knew that they were to fight, and that they were both sons of the Sun. No-Tongue did what the Moon had told him to do. He killed Little-Sun. Then No-Tongue’s people defeated the enemy. They took many scalps, and returned home.

The Sun became mad at No-Tongue, because he had killed LittleSun, for the Sun had expected No-Tongue to be killed. The Sun had tried three times to kill No-Tongue; so the fourth time, the Sun himself was going to scalp No-Tongue, so that the people would make fun of him. Then the Sun told his other son, Big-Sun, to try and kill No-Tongue. No-Tongue was the only one living. He was the one who had not treated his father, the Sun, right, for the Sun had not treated No-Tongue right in the first place. But No-Tongue had been assisted by the Moon.

The third time the Sun tried to kill No-Tongue, he changed himself into a Buffalo, so that the Buffalo ran after No-Tongue, but the young man, No-Tongue, ran into a mud-hole, and the Buffalo fell in too. No-

Tongue got out of the muddy place, but the Buffalo could not come out, because he was so heavy. No-Tongue told a lot of men to get some dried willows and to place them upon the back of the Buffalo. This they did. They set the wood on fire, so that the Buffalo burned up.

In the evening, when the Sun and Moon were together in the heavens, the Sun said: “I shall do something to No-Tongue, some way.” The Moon heard the Sun say this. Then the Sun said to the Moon: “Just see what my son No-Tongue has done; he burned my back. To-morrow morning I am going to scalp him, so the people in the village will be afraid to see him, and so they will make fun of him.”

Then the Moon went to No-Tongue in the night, and said: “My son, you always like to be up early in the morning, singing. I want you to get a good scalp to-night—one that has hair, just like this. Then kill a dog and get some of its blood, put the blood inside the scalp, and put the false scalp over your head so your hair will not show.”

The boy got the scalp with the hair on it, killed a dog, put some of the blood in the scalp and hung it over his bed. Early in the morning, before the Sun rose, the boy arose, put the scalp over his head, went out, and sang some songs through the village. As the Sun came up in the east the boy heard a noise, and the Sun took the scalp off from the boy, so that the blood ran down. When the Sun saw that he was satisfied. The boy went into the lodge, washed, came out again, and the Sun saw that the boy had hair on, and that he was not really scalped. When the Sun reached the Moon he told him that he was going to let No-Tongue alone until he was old and great, and that he was then going to take him up to his home.

The Moon came to No-Tongue and told him what the Sun, his father, had said. Years went by, and No-Tongue lived peacefully. Finally he became old and blind. At this time the people were about to move away from this place to another place. The Moon came and told old man No-Tongue that it was time his father, the Sun, was coming after him to take him up to his home; and that he himself

would come with the Sun to take him up; that he should not be afraid.

While they were breaking camp the old man took his clothes that he used to wear in his early days, and put them on. He also painted himself. He told the people to go on; that he himself would come later. The people went on. The old man went up on the top of a hill, made a circle of red sticks to represent the Sun, and another of white sticks, to represent the Moon, for the west side. While he was doing this the Sun and Moon came. The Sun wanted to know what the Moon was doing there. No-Tongue said, “My father, the Moon is also my father; he has helped me all along.” So the Sun was satisfied, and the Sun took the old man up to his home.

Several days afterwards, four young men went to the place where the old man had sat, and he was gone. The sticks were there as he had left them, but No-Tongue was gone. He was never heard from or seen again after that. He was called “No-Tongue,” for the Sun had taken his tongue, but after he had failed to kill him, he gave him back his tongue.

FOOTNOTES:

[17] Told by Standing-Bull.

17. HOW BURNT-HANDS BECAME A CHIEF.[18]

There was a large village in a beautiful valley near a large tract of timber. It was in the winter time. Around the outside of the village and over a knoll lived Stanapaat, or Burnt-Hands, a boy of about eleven or twelve years, and his grandmother. The boys in the village came over the knoll to urinate on the tipi of these poor people. In this village lived one of the chiefs who had four daughters, the youngest of which was very charitable toward these poor people. Her name was Last-Child. She brought food to these folks whenever she could. Red-Bear and Black-Bear were the first chiefs of this village. They ruled their people as though they were slaves.

One day Red-Bear gave notice that the whole village was to turn out on an elk hunt. The next day, the people complied with the chief’s orders. The people, as they went through the timber in the deep snow, slaughtered the elk in great numbers. Burnt-Hands with other little fellows followed the chase. He watched the hunters butchering their game. He wished he could kill and take home to his grandmother the nice elk meat. He strode off in another direction, looking around as he went. As he went on he struck a fresh track with drops of fresh blood on clean snow, and there were no footprints of a hunter following. He took up the trail and followed it for a long distance. He found, to his great delight, a dead elk with two arrows through its chest. “Ah ho! Ah ho! The great chief knows I am poor. He has had mercy on me.” While he was looking all over the animal

he heard a voice. He looked up, and who was there but the two chiefs—Red-Bear and Black-Bear.

Red-Bear gave an angry grunt and struck the boy in the face. “Who are you and how did you find this elk? I never expected to find such a worthless burnt-belly looking fellow as you.” Pulling his arrows out of his quiver, he said, “My father will be glad to have you for his meal,” and he shot two arrows through the boy. He dragged him out on the ice to a large air-hole and said, as he dropped him, “Father, I have done as you bid me.”

In this stream there lived a big White-Bear in a lodge. The young cub heard something drop outside the lodge. He told his father. The old one said, “Go out and see what it is.” The cub saw poor BurntHands in his ragged clothing and with wounds. The cub felt pretty bad for the boy and told his father about him. The father told the cub to bring the boy in. “What a poor boy you are!” said White-Bear. “I know who you are, and how you were treated. I never expected to eat a man from Red-Bear’s tribe. I commanded him to feed me on an enemy. I will have great mercy on you. From now on you shall be my son. You shall treat Red-Bear just as he has treated you. I will enjoy his flesh. I will endow you with all the power I have. I will teach you all, and you shall go back and do as I say.” White-Bear and BurntHands then sat down and began the bear ceremony, Burnt-Hands learning everything and receiving his bundle of medicine and other things. He was then shown the way out by the cub.

Burnt-Hands went on to his grandmother’s little home. When he arrived there he called his grandmother to kindle the fire, as he had come. Before this, when the boys found out that Burnt-Hands’ grandmother was worrying, they would come in, saying, “Grandmother, I have come home,” just to tease her. The old woman thought the boys were teasing her now when Burnt-Hands called. She gave a pitiful cry, saying, “You boys ought to feel satisfied with your teasing now.” “Oh, no, Grandmother! I am here! I was lost on the chase. Following up an elk I strayed off to a place I knew nothing about. I could not find my way home, so I stayed all night.” His grandmother arose. When she had kindled the fire there sat her boy. She rejoiced, for she was glad her boy was alive.

Nobody in the whole village knew what had happened to BurntHands except Black-Bear, who had witnessed what Red-Bear did. He did not like what Red-Bear had done, but he did not say anything.

One day the scouts, on picket duty, saw a large herd of buffalo. The chiefs were notified. They gave notice that everybody should turn out to the chase, and that Red-Bear wanted the hide of the white buffalo that was in the herd. Burnt-Hands heard the call. He told his grandmother to help him make arrows. He also promised her the white buffalo robe. This was a secret surprise to his grandmother, who did not know that he was anything more than a “burnt-belly.”

The next day every one turned out to go on the chase. BurntHands started out on foot with his quiver. A kind young man on horseback caught up with him, and asked him to get on behind him. He did so. While they were riding, the young man told the boy about the white buffalo. The boy asked his friend if he would put the meat and his white hide on his horse for him. They made plans to be together and help each other on the chase. The hunters had all collected on a hill, talking and smoking their pipes. The two arrived and sat around for a long while. Burnt-Hands began to inquire what they were waiting for. They answered they were waiting for the chiefs. “This will not do; if we wait here there may come up a bad storm and we will go home empty handed. Come now, and let us have our chase. Those chiefs will come later, and they will get their share of the meat anyway. I want that white buffalo robe, and when you have taken it off give it to this young man and he will take it home for my grandmother.”

The men were all agreed to what Burnt-Hands said. They thought Red-Bear would kill him and not themselves. They got on their ponies and the chase began The white buffalo was killed and the chase ended. Burnt-Hands was walking along when his friend came and gave him a ride to where they were butchering. He took him where the white buffalo was and the men were standing around looking at the animal. “What are you waiting for now?” said BurntHands. “Get to butchering and give me the hide!” When they had begun, the chiefs came. They gave them a welcome and told Red-

Bear that Burnt-Hands had advised them to start the chase and had already spoken for the hide. Red-Bear and Black-Bear said everything would be all right, and that the boy could have the hide and some meat.

The hunters were all on their way home. Red-Bear ordered them to camp at a certain place. This they did. Burnt-Hands and his friend came to the camp and found the meat cooking, and a comfortable place made for the chiefs. “What is this place for? and are you afraid to sit here?” said Burnt-Hands. “That place is for the chiefs,” said they, “and that meat.” “Come,” said Burnt-Hands to his friend, “sit here with me and enjoy the meat with me.” The young man, with the rest, thought that Red-Bear would surely kill the boy this time. BurntHands and his friend sat down on the robes and ate the meat prepared for Red-Bear. The chiefs came, and Red-Bear ordered another place and food prepared for him. He did not dare to say or do anything to the boy, suspecting his power as he did. Burnt-Hands’ friend and the others thought that Red-Bear had mercy on the poor boy, since he did not hurt him.

Burnt-Hands went home with his friend and pulled off the meat and the white buffalo hide. “Here, grandmother, is what I promised you, and a lot of meat. You now know that I can hunt and bring home game.” His grandmother was at once overjoyed. She thought about the pretty girl who always showed them charity. She sent out for Last-Child, who came in. “You have always been kind to us, and I have always been thankful. I want you to have this hide, and to have a robe made for yourself. You are young yet, and it will become you more than me.” Burnt-Hands was talked about all over the village, but they did not know that he had been blessed by a Bear

A long time after this chase the chief gave out an order for everybody to go on an elk chase. Red-Bear had been accustomed to collect all the elk teeth. This was his object for the hunt. Burnt-Hands heard the order and began to make preparations for the hunt. He promised his grandmother an elk-tooth dress. Burnt-Hands told his grandmother that if any trouble arose on his account she must flee into the timber, and on through other timber, and there wait for him. The next day the chase was to come off. The hunters had great luck

and were talking happily in the woods. There was a cry here and there for Red-Bear to come and get his teeth. Burnt-Hands and his friend were together. He told his friend to take the teeth out for him, for he did not know how. His friend was a little afraid to do it, but Burnt-Hands said it would be all right. The men, too, rather hesitated to let him have the teeth. They told him that Red-Bear had spoken for all the teeth; but he paid no heed to it, and told his friend to take them. Burnt-Hands had collected a lot of teeth, and so had RedBear. The hunters had chased the elk on to a smooth piece of ice and had killed several there. Here, Burnt-Hands and Red-Bear saw each other doing the same work. They met on the last elk, and Burnt-Hands spoke and said: “You have enough teeth. You will keep off and let me have these.” Red-Bear gave an angry grunt, and said, “A child like you cannot have much to say.” As Red-Bear leaned over to take the teeth Burnt-Hands took his war-club and struck him on the head. He took him by the feet and dragged him to the air-hole. “Father, this is what you asked of me.” A great yell was raised, and war was made on the boy.

The boy fled to the village and peeped in, to see if his grandmother had done what he had told her to do. She was gone, and he followed her and found her beyond the second timber as he had directed. “Now,” said he, “take one of these bear claws off my wrist and open the little bag of paint.” This she did, and he began to sing and perform the ceremony. He adorned his grandmother and himself according to the instruction of his Bear father. The people had all turned out to kill him for what he had done. Still others were calling it wrong to harm the boy, and reminded the people of what bad ruling Red-Bear had done.

Burnt-Hands and his grandmother had turned into Bears, and were making a big noise, growling and grunting. Nearer and nearer the warriors circled around the timber, shouting and yelling. The boy told his grandmother to be first to attack. So she did so. She caught Red-Bear’s brother and four or five others of his near relatives. “Now, I will attack,” said Burnt-Hands, “for you must be tired.” He picked out the leaders and the influential men of the village and scalped them and tore them up. The warriors began to retreat. A cry was raised to

end the fight, as many had been killed, but how to stop the boy and the old woman they did not know. They assembled and filled the peace-pipe. They gave it to Last-Child to take to the boy and the old woman. She took the pipe and came toward them, they growling wildly. The boy knew it was the girl. He told his grandmother not to charge at her. The boy accepted the peace-pipe and both smoked it. This ended the fight.

Burnt-Hands asked his grandmother how old she would like to be. She said, “About thirty-eight,” and so she was. The boy made himself about twenty-two, and when all was quiet he married LastChild. Burnt-Hands came to be chief, and had Black-Bear as his slave. The people lived happily under his rule.

FOOTNOTES:

[18] Told by White-Bear.

18. HOW BURNT-HANDS BECAME A CHIEF.[19]

Once there was an old woman and her grandson. They were very poor; they had nothing. The boy’s name was Burnt-Hands. Some warriors got together in the village and planned to go on the warpath. Burnt-Hands heard of it. He told his grandmother that he wanted to join the warriors on the war-path. She told the boy that when he went he must never tell Coyote stories on the war-path. She gave him a round burnt clay ball that had a handle to it. She told Burnt-Hands to go; that the clay ball with the handle was his warclub; that when on the way, when he should become hungry he should place it upon the fire, put kernels of corn upon it, and roast them.

These warriors went out to a camp in the woods. The young man came up with them and lay down by them. The next day they went and in the afternoon they sat down to rest. They made fun of the boy, and said, “Now tell us some Coyote stories.” But the boy refused, and said, “My grandmother told me not to tell Coyote stories while on the war-path.” They coaxed the boy to sing, but he would not sing.

The boy was hungry. As he saw that the men were not moving on he placed his clay ball upon the fire and put some kernels of corn upon it and began to roast them. While he was doing this he said, “I will tell some Coyote stories.” The boy began to tell how the enemy came and attacked a certain war-party. At the same time he kept on roasting his corn.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.