A Verification And Validation Of Business Process Modeling Using Petri Nets (Case Study of Telkom University FRI Laboratory Business Architecture Domain)


  • Alvan Kamal Telkom University
  • Muharman Lubis Telkom University
  • Fitriyana Dewi Telkom University
  • Matias Garcia Constantino Belfast University




Enterprise Architecture, Business Process, Verification, Validation, Scrum, Petri Nets, WoPed, Dependencies.


Enterprise Architecture is an approach that is present to form a sustainable organization. However, the average company that has implemented Enterprise Architecture does not see and does not know whether the existing business processes in the company are currently running well, and have been effective and efficient in achieving company goals or not. These conditions make validation and verification of business processes important. In this research, business process testing using the Scrum method with Petri Nets supported by WoPed tools is considered to verify and validate the business architecture design. Testing using the Scrum method is carried out through six stages, namely product backlog, sprint planning, sprint backlog, sprint review, and sprint retrospective. The test results show that several requirements are not met. This condition will have an impact on the efficiency and effectiveness of business processes. Furthermore, gap analysis is carried out with dependencies analysis, there are business processes that have not been verified and validated due to errors in the process that cause time constraints to work on more than one task simultaneously optimally, there is a process stage that is too long so that it hampers the efficiency and effectiveness of business processes.


Download data is not yet available.


D. W. Nugraha, M. Y. Helmi, M. H. K. Saputra, B. R. Kartawinata, M. Pradana, and D. Maharani, “Developing Web-Based E-News Application as an IT-Based Facility”.

N. R. F. Rozi, A. Nurhayati, and S. A. Rozano, “Implementation OSPFv3 For Internet Protocol Verses 6 (IPv6) Based On Juniper Routers Use Emulator Virtual Engine–Next Generation (Eve-NG),” Int. J. Eng. Contin., vol. 3, no. 1, pp. 1–11, 2024.

D. Wissal, D. Karim, and K. Laila, “Adaptive enterprise architecture: initiatives and criteria,” in 2020 7th International Conference on Control, Decision and Information Technologies (CoDIT), IEEE, 2020, pp. 557–562.

N. Dedić, “FEAMI: a methodology to include and to integrate enterprise architecture processes into existing organizational processes,” IEEE Eng. Manag. Rev., vol. 48, no. 4, pp. 160–166, 2020.

A. Mijuskovic, R. Bemthuis, A. Aldea, and P. Havinga, “An enterprise architecture based on cloud, fog and edge computing for an airfield lighting management system,” in 2020 IEEE 24th International Enterprise Distributed Object Computing Workshop (EDOCW), IEEE, 2020, pp. 63–73.

W. Febriyani, F. M. Kistianti, and M. Lubis, “Validation and verification of business architecture process based on the V. model,” in 2022 Seventh International Conference on Informatics and Computing (ICIC), IEEE, 2022, pp. 1–6.

S. Bourmpoulias and K. Tarabanis, “A systematic mapping study on Enterprise Architecture for the Education domain: Approaches and Challenges,” in 2020 IEEE 22nd Conference on Business Informatics (CBI), IEEE, 2020, pp. 30–39.

R. Ehrensperger, C. Sauerwein, and R. Breu, “Current practices in the usage of inter-enterprise architecture models for the management of business ecosystems,” in 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC), IEEE, 2020, pp. 21–29.

Y. I. Alzoubi and A. Q. Gill, “An empirical investigation of geographically distributed agile development: The agile enterprise architecture is a communication enabler,” IEEE Access, vol. 8, pp. 80269–80289, 2020.

N. A. Ahmad, S. M. Drus, and H. Kasim, “Factors that influence the adoption of enterprise architecture by public sector organizations: an empirical study,” IEEE Access, vol. 8, pp. 98847–98873, 2020.

M. Munirah, A. Alwi, and R. M. I. Pulungan, “Survey Metode Formal dalam Verifikasi dan Validasi,” JUITA J. Inform., vol. 4, no. 1, pp. 1–11, 2016.

A. Basir, A. Fadlil, and I. Riadi, “Enterprise architecture planning sistem informasi akademik dengan togaf ADM,” J-SAKTI (Jurnal Sains Komput. dan Inform., vol. 3, no. 1, pp. 1–10, 2019.

A. Aldea, E. Vaicekauskaitė, M. Daneva, and J. P. S. Piest, “Assessing resilience in enterprise architecture: a systematic review,” in 2020 IEEE 24th International Enterprise Distributed Object Computing Conference (EDOC), IEEE, 2020, pp. 1–10.

Z. Zhou, Q. Zhi, S. Morisaki, and S. Yamamoto, “A systematic literature review on enterprise architecture visualization methodologies,” IEEE Access, vol. 8, pp. 96404–96427, 2020.

M. Smajevic, S. Hacks, and D. Bork, “Using knowledge graphs to detect enterprise architecture smells,” in The Practice of Enterprise Modeling: 14th IFIP WG 8.1 Working Conference, PoEM 2021, Riga, Latvia, November 24–26, 2021, Proceedings 14, Springer, 2021, pp. 48–63.

T. R. Yudantoro, B. Suyanto, A. U. Chasanah, J. T. Elektro, and P. N. Semarang, “Sistem Informasi Manajemen Toko Berbasis Web dengan Menggunakan Barcode Scanner untuk Entri Data,” JTET (Jurnal Tek. Elektro Ter., vol. 6, no. 1, pp. 10–17, 2017, [Online]. Available: https://jurnal.polines.ac.id/index.php/jtet/article/view/1186

T. Shouzhong and H. Minlie, “Mining microblog user interests based on TextRank with TF-IDF factor,” J. China Univ. Posts Telecommun., vol. 23, no. 5, pp. 40–46, 2016, doi: 10.1016/S1005-8885(16)60056-0.

Y. Masuda, A. Zimmermann, D. S. Shepard, R. Schmidt, and S. Shirasaka, “An adaptive enterprise architecture design for a digital healthcare platform: toward digitized society–industry 4.0, society 5.0,” in 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), IEEE, 2021, pp. 138–146.

W. Dedi, Triono, Muhajiroh, “Perancangan Sistem E-Commerce Batik Sopiyan Hadi Berbasis Web,” Sisfotek Glob., vol. 7, no. 1, pp. 124–129, 2017.

R. M. Van Wessel, P. Kroon, and H. J. De Vries, “Scaling Agile Company-Wide: The Organizational Challenge of Combining Agile-Scaling Frameworks and Enterprise Architecture in Service Companies,” IEEE Trans. Eng. Manag., vol. 69, no. 6, pp. 3489–3502, 2021.

O. Nugroho, “Implementation of Marker Based Tracking Method in the Interactive Media of Traditional Clothes Knowledge-Based on Augmented Reality 360,” J. Comput. Sci. Inf. Technol. Telecommun. Eng., vol. 1, no. 2, pp. 37–43, 2020.

C. R. Pinheiro, S. Guerreiro, and H. São Mamede, “Automation of enterprise architecture discovery based on event mining from API gateway logs: State of the art,” in 2021 IEEE 23rd Conference on Business Informatics (CBI), IEEE, 2021, pp. 117–124.

M. F. Arifin and D. Fitrianah, “Rekomendasi Penerimaan Mitra Penjualan Studi Kasus : PT Atria Artha Persada,” no. January 2018, 2018, doi: 10.22441/incomtech.v8i1.2198.

H. F. Al-Turkistani, S. Aldobaian, and R. Latif, “Enterprise architecture frameworks assessment: Capabilities, cyber security and resiliency review,” in 2021 1st International Conference on Artificial Intelligence and Data Analytics (CAIDA), IEEE, 2021, pp. 79–84.

J. D. Rittelmeyer and K. Sandkuhl, “Effects of artificial intelligence on enterprise architectures-a structured literature review,” in 2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW), IEEE, 2021, pp. 130–137.

Lubis, M., Kartiwi, M., & Zulhuda, S. (2016, October). Current state of personal data protection in electronic voting: Demand on Legislature's Bill. In 2016 International Conference on Informatics and Computing (ICIC) (pp. 233-238). IEEE.

Lubis, A. R., Prayudani, S., Lubis, M., & Nugroho, O. (2022, July). Sentiment Analysis on Online Learning During the Covid-19 Pandemic Based on Opinions on Twitter using KNN Method. In 2022 1st International Conference on Information System & Information Technology (ICISIT) (pp. 106-111). IEEE.

Akrim, Lubis, M., & Lubis, A. R. (2020, April). Classification of Tajweed Al-Qur'an on Images Applied Varying Normalized Distance Formulas. In Proceedings of the 3rd International Conference on Electronics, Communications and Control Engineering (pp. 21-25).

Lubis, A. R., Lubis, M., & Azhar, C. D. (2019). The effect of social media to the sustainability of short message service (SMS) and phone call. Procedia Computer Science, 161, 687-695.

Prasetyo, S. J., Lubis, M., Witjaksono, R. W., & Azizah, A. H. (2019, October). Critical failure factors in enterprise resource planning (ERP) implementation: case study of PT. Toyota astra motor Indonesia. In 2019 Fourth International Conference on Informatics and Computing (ICIC) (pp. 1-5). IEEE.




How to Cite

Kamal, A., Lubis, M., Dewi, F., & Constantino, M. G. (2023). A Verification And Validation Of Business Process Modeling Using Petri Nets (Case Study of Telkom University FRI Laboratory Business Architecture Domain). Electronic Integrated Computer Algorithm Journal, 1(1), 26–31. https://doi.org/10.62123/enigma.v1i1.5

Most read articles by the same author(s)