USA: +1(715)227-4880, UK: +44-7896988486, AU:+61-452503850


Computing Skills Assignment Help

Matlab Assignment Help





1.0 Introduction

This project will highlight the changes, which reflect in the total check-up process of Ballarat Dentistry. This project will highlight the typical condition of a dentistry, which follows several models and processes in order to make everything under control. The whole process involves some methods for which a patient's checkup time is reduced to a shorter period as compared to the previous processes and models, which was followed by them.

2.0 Business Process Modeling Report for Ballarat Dentistry

Documenting a model for the business processes is much valuable for any organisation as it guides a path to be followed, which includes:

       Programmes and processes improvements

       Enhances in the increase of the efficiency on a daily basis

       Enhances to give proper knowledge to the staffs and also helps to advance the understandings of the business

2.1 Process categorisation model

Porter’s Five Value Model describes the following:

       Bargaining Power of the suppliers

It suggests the ability of the suppliers to boost up the prices of the services and goods.

       Bargaining Power of the Customers

It suggests the ability of the customers to drive the prices down of any product (tandfonline.com, 2018).

       Threats of New Entrants

The strength of a company may be altered with the new entrants in the competition.

       Threats of Substitute Products

The substitute products of the competitors, if used, can pose a threat to the organisation.

       Competition with rival Industry

The total numbers of company pose a threat to the organisation as large number of competitors serves large services to the customers.

2.2 Capability Maturity Model

The development process of the software of a company depends on a certain model. The Capability Maturity Model helps in refining the same by maintaining the process of software development of the organization (de Oca et al. 2015, p.188). This model enhances the track of a five-level process, which helps the organisations to advance in the methodologies of software processes.

The application of the above model involves the following in several stages, which include:

       Initial Level

In the beginning, these processes are chaotic and are more disorganised. However, the overall success depends on the effort of an individual (Stavrou et al. 2014, p.121).

       Repeatable Level

On the following level, some basic techniques pertaining to the project management are built.

       Defined Level

This consists of a defined level where an organisation usually develops the standard software through integration, standardisation, and documentation.

       Managed Level

In the following level, an organisation controls and monitors the several processes through analysis and collection (Jeston, 2014, p.13).

       Optimising Level

This level enhances in the improvements through monitoring and feedback processes.

2.3 Case function matrix

According to Dijkman et al. (2011, p.498), it is obvious for any organisation to maintain a large repository for future purposes. This enhances in documenting and in improving their mode of operations throughout. Upon consideration of these types of repositories, it assists in retrieving those types of problems, which are much closer to the given fragment and to the given model (Rosa et al. 2017, p.2). This paper will highlight on the three metrics of the process repositories, which are similar for the model adopted by the Ballarat Dentistry. The repositories include the following:

       The comparison of the attributes and the labels which are linked to the model elements process with the similarity of node matching

       The comparison of the label elements with the process models of topology for the similar structure of the model.

       The comparison of the element labels for capturing the causal relations, which are much similar to the behavior.

2.3 7PGM discussion for 7PMG Mendling process

According to Mendling et al. (2010, p.10), 7PMG refers to the recommendations of creating a process model from the very base and enhances in improving the same. Therefore, it ensures to create that process which improves the previous models too. These guidelines, however, make a research, which is totally based on this model (Braun et al. 2015, p.471). This also set some guidelines based on which the research is built. The 7PMG also makes that insight where there is are various ways to demonstrate the usual same behavior that had already been used in the process model. These models are also similar to the dissimulation, which is already researched from the perspective of verifying the same (Fan et al. 2016, p.66). The 7PMG model also clarifies the most important properties, which are used in changing the processes of the model with the help of the following guidelines:

G1: It includes the usage of a very few models. The model size also has an undesirable effect, which is based on error understandability and likelihood too (Zhu et al. 2016, p.8). However, these huge models have a critical effect and hard to understand too which has a high risk of errors too.

G2: It helps in minimising the whole route for every element. The more the degree of total elements, hence, the total number of the outputs and inputs taken together helps in the further understanding of the model (Berg et al. 2014, p.542). As a result, it becomes quite difficult in understanding the same model too. However, there is always a good bonding in between the maximum or average degree of the elements and the errors of modeling too.

G3: It further states the usage of only one start and one end of any event. As seen in the above figure, the models depicted over there also shows the usage of only one tab for starting as well as ending an event (Helbig et al. 2016, p.72). Moreover, the total number of the end and start events are always positive too.

G4: Is suggests making the model a good structure. As seen in the above two diagrams all the two models are beautifully structured as and all are aligned with one another too. It is structured in such a way that all the split connectors of the model are connected to the respective joints or corners of the model (Kawamoto and de Almeida, 2017, p.6). However, the unstructured models are mostly liked to be seen with several errors. It is created in such a way that any person can be easily able to understand the same without any problem.

2.4 7PGM discussion for 7PMG Mending process of Routing

G5: There is a clear avoidance of routing the elements in the model. The models which have the XOR and the AND connectors are free from errors too. However, if there consists of more critical connections, then there is a chance of getting the errors in a similar way.

G6: It also supports the usage of the activity labels in a wide range. As there is a wide range of explorations, which are generally used, in the proper process of the models, thus it actually discloses all the previous existences of the two major popular processes (Chen and Wang, 2018, p.333). From this, the conclusion can be easily drawn that the people can easily consider the object style as “Inform Complaint” which is as more vital in using the labels of the action-noun too.

G7: It highly reflects the decomposition of the models if it contains less than total number of fifty elements. This frames a guideline, which is highly linked with the G1, which is highly insisted, by the high linking of the errors and size (Fox-Lent et al. 2015, p.211). Considering the models, which are having more than fifty elements there, contains a high probability of error. Thus, as a result, all the higher models are split up into further sub-models too.

2.5 Cycle time for Repository node matching process

Cycle time is the total time required for the completion of a process, where a patient gets in the dentistry for the checkup. The time counts from then only until the completion of the whole process until the patient checks out.

Considering the whole process as the total number of patients to be 10 in that Ballarat Dentistry, and the number of doctors to be 100, and the total number of nurses to be 100 and there will be more than 1 ambulance. Assuming these values to be a fiction value, the whole cycle time would be 25 min for each patient. A good model always ensures less amount of time to be required for this scenario.

2.6 Cycle time for Topology Process

Considering the whole process as the total number of patients to be 25 in that Ballarat Dentistry, and the number of doctors to be 50, and the total number of nurses to be 10 and there will be more than 1 ambulance. Assuming these values to be a fiction value, the whole cycle time would be 35 min for each patient. As this process is much more complex than the previous one, still it did not take that much time for completing the whole cycle. Though it seemed that it is complex, still it went in a good way, as the whole model was much systematic.

2.7 Redesign for Repository node matching process

According to Reijers and Mansar (2005, p.333), the design of the Business Process is created in such a way that it helps in boosting the business in order to improve the satisfaction of the customers. Upon using heuristics model, it is concluded that all the Product Elements, Project Environment, Criteria for Quality, Techniques of testing and the Oracles are all linked with this model (Cortes et al. 2017, p.17). However, as a result, about the completion of this process, there is a flaw also pertaining to this model, which states that the project environment was not met as seen in the diagram, there are some external services too. This affects the project environment. Rethink model of process design shows that Empathies, define, prototype, test, and ideate are followed by the five parameters for determining the process efficiency.

2.8 Redesign for Topology Process

Heuristic measures had created a deep impact on the Devil’s Quadrangle with the effect of the cost, time, flexibility and the quality. As compared to the diagram of the Topology Process, there is a slight delay of cycle time. Thus, there comes in issue a flaw pertaining to the time. Due to the huge number of the network procedures in this model, the times are increased. 

3.0 Conclusion

The two robust processes include Repository node matching process and Topology Process, which had made things pretty easier. The effectiveness of these models had also reflected in calculating the cycle time for each process. However, this project had also highlighted two flaws, one for each while implementing in their business model. In order to compete with the present market, the business of dentistry needs to incorporate some sort of innovations pertaining to their business. These innovations may include in reducing the overall checkup time for the patients, enhancement of the procedures of checkup and several others. 

4.0 References

Berg, E. and Kilambi, K., Siebel Systems Inc, (2014). Method and apparatus to facilitate development of a customer-specific business process model. U.S. Patent 8,639,542.

Braun, R., Schlieter, H., Burwitz, M. and Esswein, W., (2015). Extending a Business Process Modeling Language for Domain-Specific Adaptation in Healthcare. In Wirtschaftsinformatik (pp. 468-481).

Chen, Y.C. and Wang, Y.J., (2018). Application and development of the people capability maturity model level of an organisation. Total Quality Management & Business Excellence29(3-4), pp.329-345.

Cortes, C.A., Contreras, S.F. and Shahidehpour, M., (2017). Microgrid Topology Planning for Enhancing the Reliability of Active Distribution Networks. IEEE Transactions on Smart Grid, pp.17

de Oca, I.M.M., Snoeck, M., Reijers, H.A. and Rodríguez-Morffi, A., (2015). A systematic literature review of studies on business process modeling quality. Information and Software Technology58, pp.187-205.

Fan, S., Hua, Z., Storey, V.C. and Zhao, J.L., (2016). A process ontology based approach to easing semantic ambiguity in business process modeling. Data & Knowledge Engineering102, pp.57-77.

Fox-Lent, C., Bates, M.E. and Linkov, I., (2015). A matrix approach to community resilience assessment: an illustrative case at Rockaway Peninsula. Environment Systems and Decisions35(2), pp.209-218.

Helbig, T., Henning, S. and Hoos, J., (2016). Efficient engineering in special purpose machinery through automated control code synthesis based on a functional categorisation. In machine learning for cyber physical systems (pp. 67-74). Springer Vieweg, Berlin, Heidelberg.

Hertis, M. and Juric, M.B., (2014). An empirical analysis of business process execution language usage. IEEE Transactions on Software Engineering40(8), pp.738-757.

istqbexamcertification.com (2018), what-is-cmm-capability-maturity-model-what-are-cmm-levels, Available at: http://istqbexamcertification.com/what-is-cmm-capability-maturity-model-what-are-cmm-levels/ [Accessed on 25th May, 2018]

Jeston, J., (2014). Business process management. Abingdon: Routledge

Kawamoto, S. and de Almeida, J.R., (2017), October. Scrum-DR: An extension of the scrum framework adherent to the capability maturity model using design rationale techniques. In Electrical, Electronics Engineering, Information and Communication Technologies (CHILECON), (2017) CHILEAN Conference on (pp. 1-7). IEEE.

Rosa, M.L., Van Der Aalst, W.M., Dumas, M. and Milani, F.P., (2017). Business process variability modeling: A survey. ACM Computing Surveys (CSUR)50(1), p.2.

Stavrou, V., Kandias, M., Karoulas, G. and Gritzalis, D., (2014), September. Business Process Modeling for Insider threat monitoring and handling. In International Conference on Trust, Privacy and Security in Digital Business (pp. 119-131). Berlin:Springer, Cham.

tandfonline.com (2018), News Available at: https://www.tandfonline.com/doi/abs/10.1080/10580530802384589 [Accessed on 25th May, 2018]

Zhu, X., vanden Broucke, S., Zhu, G., Vanthienen, J. and Baesens, B., (2016). Enabling flexible location-aware business process modeling and execution. Decision Support Systems83, pp.1-9.




  • Number of views:
  • PRICE :
    AU$ 300.00
Security Code  
Urgent Assignment Help

Our Top Experts

Karen Betty

Holding a PhD degree in Finance, Dr. John Adams is experienced in assisting students who are in dire need...

55 - Completed Orders

Daphne Lip

Canada, Toronto I have acquired my degree from Campion College at the University of Regina Occuption/Desi...

52 - Completed Orders

Mr Roberto Tuzii

Even since I was a student in Italy I had a passion for languages, in fact I love teaching Italian, and I...

102 - Completed Orders

Harsh Gupta

To work with an organization where I can optimally utilize my knowledge and skills for meeting challenges...

109 - Completed Orders


JOB OBJECTIVE Seeking entry level assignments in Marketing & Business Development with an organization...

202 - Completed Orders


Current work profile Project manager- The Researchers Hub (2nd Jan 2016 to presently working) Researc...

20 - Completed Orders

Tan Kumar Ali

Sales Assistant, Mito Marina Assigned to the Stationery dept – assisted in merchandising, stock taking...

100 - Completed Orders

Wesenu Irko

Personal Profile Dedicated and highly experienced private chauffeur. High energy, hardworking, punctua...

200 - Completed Orders

Lizzy Darley

I'm Lizzy, full time education specialist in English, Essay Writing, Economics and Maths. Having Assi...

109 - Completed Orders


HSC PREPARATION I specialise in English coaching programs for HSC students. My personalised and results-...

202 - Completed Orders