Conceptual Modeling of Inventory Management Processes as a Thinging Machine

12/03/2018
by   Sabah Al-Fedaghi, et al.
0

A control model is typically classified into three forms: conceptual, mathematical and simulation (computer). This paper analyzes a conceptual modeling application with respect to an inventory management system. Today, most organizations utilize computer systems for inventory control that provide protection when interruptions or breakdowns occur within work processes. Modeling the inventory processes is an active area of research that utilizes many diagrammatic techniques, including data flow diagrams, Universal Modeling Language (UML) diagrams and Integration DEFinition (IDEF). We claim that current conceptual modeling frameworks lack uniform notions and have inability to appeal to designers and analysts. We propose modeling an inventory system as an abstract machine, called a Thinging Machine (TM), with five operations: creation, processing, receiving, releasing and transferring. The paper provides side-by-side contrasts of some existing examples of conceptual modeling methodologies that apply to TM. Additionally, TM is applied in a case study of an actual inventory system that uses IBM Maximo. The resulting conceptual depictions point to the viability of FM as a valuable tool for developing a high-level representation of inventory processes.

READ FULL TEXT

page 5

page 7

page 8

page 9

research
10/26/2021

Software Engineering Meets Systems Engineering: Conceptual Modeling Applied to Engineering Operations

Models are fundamentally crucial to many scientific fields, including so...
research
02/28/2019

Thinging for Computational Thinking

This paper examines conceptual models and their application to computati...
research
06/27/2021

Pairing Conceptual Modeling with Machine Learning

Both conceptual modeling and machine learning have long been recognized ...
research
03/17/2022

Towards Axiomatic Foundations for Conceptual Modeling: An Example

Conceptual modeling is a strongly interdisciplinary field of research. A...
research
03/30/2020

Modeling Network Security: Case Study of Email System

We study operational security in computer network security, including in...
research
09/30/2019

Authentication Modeling with Five Generic Processes

Conceptual modeling is an essential tool in many fields of study, includ...
research
05/30/2023

Reviewing BPMN as a Modeling Notation for CACAO Security Playbooks

As cyber systems become increasingly complex and cybersecurity threats b...

Please sign up or login with your details

Forgot password? Click here to reset