Discovering Process Model from Event Logs by Considering Overlapping Rules

被引:0
|
作者
Effendi, Yutika Amelia [1 ]
Sarno, Riyanarto [1 ]
机构
[1] Inst Teknol Sepuluh Nopember, Dept Informat, Fac Informat Technol, Surabaya, Indonesia
关键词
Decision Mining; Process Mining; Overlapping Rules; Process Discovery; BPMN; Petri Net; Modified Time-based Heuristics Miner;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Process Mining is a technique to automatically discover and analyze business processes from event logs. Discovering concurrent activities often uses process mining since there are many of them contained in business processes. Since researchers and practitioners are giving attention to the process discovery (one of process mining techniques), then the best result of the discovered process models is a must. Nowadays, using process execution data in the past, process models with rules underlying decisions in processes can be enriched, called decision mining. Rules defined over process data specify choices between multiple activities. One out of multiple activities is allowed to be executed in existing decision mining methods or it is known as mutually-exclusive rules. Not only mutually-exclusive rules, but also fully deterministic because all factors which influence decisions are recorded. However, because of non-determinism or incomplete information, there are some cases that are overlapping in process model. Moreover, the rules which are generated from existing method are not suitable with the recorded data. In this paper, a discovery technique for process model with data by considering the overlapping rules from event logs is presented. Discovering overlapping rules uses decision tree learning techniques, which fit the recorded data better than the existing method. Process model discovery from event logs is generated using Modified Time-Based Heuristics Miner Algorithm. Last, online book store management process model is presented in High-level BPMN Process Model.
引用
收藏
页码:645 / 650
页数:6
相关论文
共 50 条
  • [31] Discovering and utilising expert knowledge from security event logs
    Khan, Saad
    Parkinson, Simon
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 48
  • [32] Discovering and Analyzing Contextual Behavioral Patterns From Event Logs
    Acheli, Mehdi
    Grigori, Daniela
    Weidlich, Matthias
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (12) : 5708 - 5721
  • [33] Discovering Queues from Event Logs with Varying Levels of Information
    Senderovich, Arik
    Leemans, Sander J. J.
    Harel, Shahar
    Gal, Avigdor
    Mandelbaum, Avishai
    van der Aalst, Wil M. P.
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS, (BPM 2015), 2016, 256 : 154 - 166
  • [34] Discovering Metric Temporal Business Constraints from Event Logs
    Maggi, Fabrizio Maria
    [J]. PERSPECTIVES IN BUSINESS INFORMATICS RESEARCH, BIR 2014, 2014, 194 : 261 - 275
  • [35] Mining Batch Activation Rules from Event Logs
    Martin, Niels
    Solti, Andreas
    Mendling, Jan
    Depaire, Benoit
    Caris, An
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (06) : 1837 - 1848
  • [36] Discovering process models for the analysis of application failures under uncertainty of event logs
    Pecchia, Antonio
    Weber, Ingo
    Cinque, Marcello
    Ma, Yu
    [J]. KNOWLEDGE-BASED SYSTEMS, 2020, 189
  • [37] Discovering User Communities in Large Event Logs
    Ferreira, Diogo R.
    Alves, Claudia
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT I, 2012, 99 : 123 - 134
  • [38] Discovering and Tracking Organizational Structures in Event Logs
    Appice, Annalisa
    Di Pietro, Marco
    Greco, Claudio
    Malerba, Donato
    [J]. NEW FRONTIERS IN MINING COMPLEX PATTERNS, 2016, 9607 : 46 - 60
  • [39] Discovering Models of Parallel Workflow Processes from Incomplete Event Logs
    Lekic, Julijana
    Milicev, Dragan
    [J]. MODELSWARD 2015 PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2015, : 477 - 482
  • [40] Discovering anomalous frequent patterns from partially ordered event logs
    Genga, Laura
    Alizadeh, Mahdi
    Potena, Domenico
    Diamantini, Claudia
    Zannone, Nicola
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2018, 51 (02) : 257 - 300