计算机科学 ›› 2019, Vol. 46 ›› Issue (7): 315-321.doi: 10.11896/j.issn.1002-137X.2019.07.048

• 交叉与前沿 • 上一篇    下一篇

基于流程切的过程模型挖掘方法

宋健,方贤文,王丽丽   

  1. (安徽理工大学力学与光电物理学院 安徽 淮南232001)
  • 收稿日期:2018-06-01 出版日期:2019-07-15 发布日期:2019-07-15
  • 作者简介:宋 健(1991-),男,硕士生,主要研究方向为Petri网,E-mail:1529139842@qq.com;方贤文(1975-),男,博士,教授,主要研究方向为Petri网和可信软件,E-mail:280060673@qq.com(通信作者);王丽丽(1982-),女,副教授,主要研究方向为业务流程管理。
  • 基金资助:
    国家自然科学基金资助项目(61572035,61272153,61402011),安徽省自然科学基金资助项目(1508085MF111),安徽省高校自然科学基金资助项目(KJ2014A067,KJ2016A208)资助

Process Model Mining Method Based on Process Cut

SONG Jian,FANG Xian-wen,WANG Li-li   

  1. (College of Mechanics and Optoelectronics Physics,Anhui University of Science and Technology,Huainan,Anhui 232001,China)
  • Received:2018-06-01 Online:2019-07-15 Published:2019-07-15

摘要: 在业务流程挖掘过程中,过程挖掘的目的是从事件日志中挖掘出满足人们需要的模型,以此来改善和优化过程模型。以往的研究都是从频繁日志中挖掘模型,将低频日志直接删除,该类方法使得挖掘的模型不完整,且在行为上会引发死锁或其他异常情况。文中提出基于流程切的过程模型挖掘方法,该方法从事件日志中挖掘过程模型,对事件日志采用流程切的形式进行分割,不仅考虑到频繁行为,还考虑了低频模式下的行为;尤其针对异常的环状结构会引起流程图的边缘结构发生异常的问题,流程切可以很好地进行处理。利用这种方法得到的模型比较全面完善,能够提高有效性和精确度。利用评价指标对构建的模型进行优化,从而得出最优模型。最后,通过具体事例验证了所提方法的有效性。

关键词: Petri网, 低频模式, 过程挖掘, 流程切, 事件日志

Abstract: The purpose of process mining is to mine the model that meets people’s needs from the event log in the mi-ning process of business process,so as to improve and optimize the process model.In previous studies,models were mined from frequent log,and low-frequency log was deleted directly,which makes the mined model incomplete and may cause a deadlock or other abnormalities.This paper proposed a process model mining method based on process cutting.The method mines the process model from the event log and segments the event log in the form of a process cutting,not only taking into account the frequent behaviors,but also the behaviors in the low-frequency mode.In particular,aiming at the proplem that the abnormal circular structure will cause abnormality for edge structure of the flow chart,the process cutting can handle it well.The model obtained by proposed method is more comprehensive and perfect,and the validity and accuracy of the model can be improved.The evaluation index was used to optimize the constructed model and the optimal model was obtained.Finally,the effectiveness of the method was verified by concrete examples.

Key words: Event log, Low frequency mode, Petri net, Process cut, Process mining

中图分类号: 

  • TP391.9
[1]VAN DER AALST W,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs[J].IEEE Transactions on Knowledge & Data Engineering,2004,16(9):1128-1142.<br /> [2]VAN DER AALST W M P.Process Mining:Discovery,Con- formance and Enhancement of Business Processes[M].Springer Publishing Company,Incorporated,2011.<br /> [3]VAN DER AALST W M P,VAN DONGEN B F,HERBST J,et al.Workflow mining:a survey of issues and approaches[J].Data & Knowledge Engineering,2003,47(2):237-267.<br /> [4]VAN DER AALST W M P,WEIJTERS A.Process mining:a research agenda[J].Computers in Industry,2004,53(3):231-244.<br /> [5]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314.<br /> [6]EICHST DT S,LINK A,HARRIS P,et al.Efficient implementation of a Monte Carlo method for uncertainty evaluation in dynamic measurements[J].Metrologia,2012,49(3):401.<br /> [7]POURMASOUMI A,KAHANI M,BAGHERI E.Mining variable fragments from process event logs[J].Information Systems Frontiers,2017,19(6):1423-1443.<br /> [8]WEN L,VAN DER AALST W M P,WANG J,et al.Mining process models with non-free-choice constructs[J].Data Mining and Knowledge Discovery,2007,15(2):145-180.<br /> [9]BUSI N,PINNA G,VAN DER AALST W.An Iterative Algorithm for Applying the Theory of Regions in Process Mining[R].Department of Technology Management,Eindhoven University of Technology,2007:16-38.<br /> [10]YZQUIERDO-HERRERA R,SILVERIO-CASTRO R,LAZO- CORT S M.Sub-process discovery:opportunities for process diagnotics[M]∥Enterprise Information Systems of the Future.Berlin Heidelberg:Springer,2013:48-57.<br /> [11]BOUSHABA S,KABBAJ M I,BAKKOURY Z.Process disco- very:Automated approach for block discovery[C]∥2014 International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE).IEEE,2014:1-8.<br /> [12]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discovering Infrequent Behavioral Patterns in Process Models[C]∥International Conference on Business Process Management.Springer,Cham,2017:324-340.<br /> [13]吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.<br /> [14]WEIDLICH M,POLYVYANYY A,DESAI N,et al.Process Compliance Measurement Based On Behavioral Profiles [J].Advanced Information Systems Engineering,2010,6051:499-514.<br /> [15]KUNZE M,WEIDLICH M,WESKEM.Querying process mo- dels by behavior inclusion[J].Software & Systems Modeling,2015,14(3):1105-1125.<br /> [16]WEIDLICH M,MENDLING J,WESKE M.Efficient Consistency Measurement Based on Behavioural Profiles of Process Mo-dels[J].IEEE Transactions on Software Engineering,2011,37(3):410-429.
[1] 李清, 刘伟, 管梦真, 杜玉越, 孙红伟.
基于逻辑博弈决策Petri网的应急决策建模与分析
Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net
计算机科学, 2022, 49(4): 294-301. https://doi.org/10.11896/jsjkx.210300224
[2] 陶小燕, 闫春钢, 刘关俊.
基于WFT-net验证合理性的动态数据精炼策略
Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net
计算机科学, 2021, 48(7): 99-104. https://doi.org/10.11896/jsjkx.200700125
[3] 赖祥威, 郑万波, 吴燕清, 夏云霓, 冉啟华, 董银环.
矿山事故应急救援数字预案的任务协同流程网络模型及时效分析
Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan
计算机科学, 2021, 48(6A): 596-602. https://doi.org/10.11896/jsjkx.200500041
[4] 宁玉辉, 姚喜.
一种应急指挥系统的设计与实现
Design and Implementation of Emergency Command System
计算机科学, 2021, 48(6A): 613-618. https://doi.org/10.11896/jsjkx.201000136
[5] 王吴松, 方欢, 郑雪文.
基于分组公平控制流结构的流程变体合并方法
Process Variants Merging Method Based on Group-fair Control Flow Structure
计算机科学, 2021, 48(12): 170-180. https://doi.org/10.11896/jsjkx.201100157
[6] 杨皓然, 方贤文.
基于概率和时间因素的Petri网业务流程一致性分析
Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor
计算机科学, 2020, 47(5): 59-63. https://doi.org/10.11896/jsjkx.190500119
[7] 李娟,方贤文,王丽丽,刘祥伟.
基于日志自动机的业务流程混沌活动过滤方法
Chaotic Activity Filter Method for Business Process Based on Log Automaton
计算机科学, 2020, 47(1): 66-71. https://doi.org/10.11896/jsjkx.181102110
[8] 孙书亚, 方欢, 方贤文.
日志诱导下的形态学片段流程聚类方法
Log-induced Morphological Fragments Process Clustering Method
计算机科学, 2019, 46(8): 71-77. https://doi.org/10.11896/j.issn.1002-137X.2019.08.011
[9] 苏庆,林昊,黄剑锋,何凡,林志毅.
基于Petri网编码的动态图水印技术研究
Study on Dynamic-graph Watermarking Based on Petri Net Coding
计算机科学, 2019, 46(7): 120-125. https://doi.org/10.11896/j.issn.1002-137X.2019.07.019
[10] 郝惠晶, 方贤文, 王丽丽, 刘祥伟.
基于Petri网行为紧密度的有效低频行为模式分析
Analysis of Effective Low-frequency Behavioral Patterns Based on Petri Net Behavior Closeness
计算机科学, 2019, 46(2): 321-326. https://doi.org/10.11896/j.issn.1002-137X.2019.02.049
[11] 宋健, 方贤文, 王丽丽, 刘祥伟.
基于行为轮廓的业务流程隐变迁挖掘方法
Method of Mining Hidden Transition of Business Process Based on Behavior Profiles
计算机科学, 2019, 46(12): 334-340. https://doi.org/10.11896/jsjkx.180901654
[12] 曹蕊, 方贤文, 王丽丽.
基于通讯行为轮廓挖掘条件非频繁行为的方法
Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile
计算机科学, 2018, 45(8): 310-314. https://doi.org/10.11896/j.issn.1002-137X.2018.08.056
[13] 何路路, 方欢.
带数据流的面向服务的业务流程模型变化传播Petri网方法
Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net
计算机科学, 2018, 45(6A): 545-548.
[14] 赵培海, 王咪咪.
基于三维行为关系图的模型一致性检测方法
Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph
计算机科学, 2018, 45(6): 156-160. https://doi.org/10.11896/j.issn.1002-137X.2018.06.027
[15] 高雅楠,方贤文,王丽丽.
基于Petri网行为紧密度的业务流程配置优化分析
Optimized Analysis of Business Process Configuration Based on Petri Net Behavior Closeness
计算机科学, 2017, 44(Z6): 539-542. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.120
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!