Computer Science ›› 2020, Vol. 47 ›› Issue (1): 66-71.doi: 10.11896/jsjkx.181102110

• Computer Science Theory • Previous Articles     Next Articles

Chaotic Activity Filter Method for Business Process Based on Log Automaton

LI Juan,FANG Xian-wen,WANG Li-li,LIU Xiang-wei   

  1. (College of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Anhui 232001,China)
  • Received:2018-11-16 Published:2020-01-19
  • About author:LI Juan,born in 1992,postgraduate.Her main research interests include Pet net and Business process management;FANG Xian-wen,born in 1975,Ph.D,professor,Ph.D supervisor,is member of China Computer Federation (CCF).His main research interests include Petri net and trusted software.
  • Supported by:
    This work supported by the National Natural Science Foundation of China (61572035,61272153,61402011) and Natural Science Foundation of Anhui Province,China (1508085MF111).

Abstract: Business process event logs sometimes contain chaotic activities,which are a kind of activity independent of process state and free from process constraints,and may happen anytime and anywhere.The existence of chaotic activities can seriously affect the quality of business process mining,so filtering chaotic activities becomes one of the key contents of business process management.At present,the filtering method of chaotic activity mainly filters infrequent behavior from the event the log,and the filtering method based on high frequency priority is not effective in filtering chaotic activities in the log.In order to solve the above problems,a method based on log automata and entropy is proposed to filter chaotic activities in logs.Firstly,a suspicious chaotic activity set with high entropy is obtained by calculating the direct preset rate and direct posterior set rate of activity.Then,the log automata is constructed from the event log.From the log automata model,the intersection of the activity set of infrequent arc and the activity set of high entropy in the log is calculated to obtain the chaotic activity set.Finally,the conditional occurrence probability and behavior profile are used to determine the dependence between the chaotic activity and other activities,so as to decide whether to delete the chaotic activity completely in the log or to keep the chaotic activity in the correct position in the log to delete other activities.The effectiveness of the method is verified by case analysis.

Key words: Petir net, Chaotic activity, Log automaton, Entropy, Conditional occurrence probability, Behavioral profile

CLC Number: 

  • TP391
[1]WIL V D A.Process Mining:Data Science in Action[M]. Springer Publishing Company,Incorporated,2016.
[2]LEEMANS S J J,FAHLAND D,AALST W M P V D.Scalable process discovery and conformance checking[J].Software & Systems Modeling,2018,17(2):599-631.
[3]CHABROL M,DALMAS B,NORRE S,et al.A process tree- based algorithm for the detection of implicit dependencies[C]∥IEEE Tenth International Conference on Research Challenges in Information Science.IEEE,2016:1-11.
[4]SANI M F,ZELST S J V,AALST W M P V D.Repairing Outlier Behaviour in Event Logs [C]∥International Conference on Business Information Systems.Cham:Springer,2018.
[5]HUANG Y,WANG Y,HUANG Y.Filtering Out Infrequent Events by Expectation from Business Process Event Logs[C]∥2018 14th International Conference on Computational Intelligence and Security (CIS).IEEE Computer Society,2018.
[6]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient Process Model Discovery Using Maximal Pattern Mining[C]∥International Conference on Business Process Management.Cham,2015:441-456.
[7]LU X,FAHLAND D,BIGGELAAR,et al.Detecting Deviating Behaviors Without Models[C]∥International Conference on Business Process Management.Cham:2015:126-139.
[8]ROJAS E,MUNOZ-GAMA J,SEPU'LVEDA M,et al.Process mining in healthcare:A literature review[J].Journal of Biomedical Informatics,2016,61:224-236.
[9]PULSANONG W,POROUHAN P,TUMSWADI S,et al.Using inductive miner to find the most optimized path of workflow process[C]∥International Conference on ICT and Knowledge Engineering.IEEE,2017:1-5.
[10]BURATTIN A.Heuristics Miner for Time Interval[C]∥Esann 2010,European Symposium on Artificial Neural Networks.Bruges,Belgium:DBLP,2015:85-95.
[11]LINGALA N,SRI NAMACHCHIVAYA N,PERKOWSKI N,et al.Particle filtering in high-dimensional chaotic systems[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2012,22(4):047509.
[12]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314.
[13]MANNHARDT F,DE LEONI M,REIJERS H A,et al.Data-Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]∥International Conference on Advanced Information Systems Engineering.Cham:Springer,2017:545-560.
[14]SANI M F,ZELST S J V,AALST W M P V D.Improving Process Discovery Results by Filtering Outliers Using Conditional Behavioural Probabilities [C]∥International Conference on Business Process Management.Cham:Springer,2017:216-229.
[15]TAX N,SIDOROVA N,AALST W M P V D.Discovering more precise process models from event logs by filtering out chaotic activities[J].Journal of Intelligent Information Systems,2019,52(1):107-139.
[1] YANG Jie,WANG Guo-yin,LI Shuai. Neighborhood Knowledge Distance Measure Model Based on Boundary Regions [J]. Computer Science, 2020, 47(3): 61-66.
[2] WANG Ya-ge, KANG Xiao-dong, GUO Jun, HONG Rui, LI Bo, ZHANG Xiu-fang. Image Compression Method Combining Canny Edge Detection and SPIHT [J]. Computer Science, 2019, 46(6A): 222-225.
[3] DU Xiu-li, ZUO Si-ming, QIU Shao-ming. Adaptive Dictionary Learning Algorithm Based on Image Gray Entropy [J]. Computer Science, 2019, 46(5): 266-271.
[4] ZHANG Fang, ZHAO Shu-liang, WU Yong-liang. Data Scaling Method for Multi-scale Data Mining [J]. Computer Science, 2019, 46(4): 57-65.
[5] ZHANG Ju, GENG Hai-jun, LIU Jie-qi. Intra-domain Energy Efficiency Routing Scheme Based on Network Entropy [J]. Computer Science, 2019, 46(2): 76-80.
[6] SHEN Xian-bao, SONG Yu-qing, LIU Zhe. Adaptive Integrated Method Based on Sorting Selection Metrics [J]. Computer Science, 2019, 46(12): 237-241.
[7] SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340.
[8] ZHU Pei-pei, LONG Min. Recommendation Methods Considering User Indirect Trust and Gaussian Filling [J]. Computer Science, 2019, 46(11A): 178-184.
[9] ZHANG Mao-yin, ZHENG Ting-ting, ZHENG Wan-rong. Interval-valued Intuitionistic Fuzzy Entropy Based on Exponential Weighting and Its Application [J]. Computer Science, 2019, 46(10): 229-235.
[10] ZHANG Xin-ming, CHENG Jin-feng, KANG Qiang, WANG Xia. Improved Shuffled Frog Leaping Algorithm and Its Application in Multi-threshold Image Segmentation [J]. Computer Science, 2018, 45(8): 54-62.
[11] DU Xiu-li, ZHANG Wei, GU Bin-bin, CHEN Bo, QIU Shao-ming. GLCM-based Adaptive Block Compressed Sensing Method for Image [J]. Computer Science, 2018, 45(8): 277-282.
[12] CAO Rui, FANG Xian-wen, WANG Li-li. Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile [J]. Computer Science, 2018, 45(8): 310-314.
[13] ZHENG Shu-fu,YU Gao-feng. Attribute Transfer and Knowledge Discovery Based on Formal Context [J]. Computer Science, 2018, 45(6A): 117-119.
[14] HE Ming, YANG Peng, YAO Kai-sheng, ZHANG Jiu-ling. TEFRCF:Collaborative Filtering Personalized Recommendation Algorithm Based on Tag
Entropy Feature Representation
[J]. Computer Science, 2018, 45(6A): 465-470, 486.
[15] ZHANG Pan-pan, PENG Chang-gen, HAO Chen-yan. Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference [J]. Computer Science, 2018, 45(6): 130-134.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHANG Jing and ZHU Guo-bin. Hot Topic Discovery Research of Stack Overflow Programming Website Based on CBOW-LDA Topic Model[J]. Computer Science, 2018, 45(4): 208 -214 .
[2] WENG Li-guo, KONG Wei-bin, XIA Min and CHOU Xue-fei. Satellite Imagery Cloud Fraction Based on Deep Extreme Learning Machine[J]. Computer Science, 2018, 45(4): 227 -232 .
[3] ZHANG Wen-bo and HOU Xiao-rong. Estimation Algorithm of Atmospheric Light Based on Gaussian Distribution[J]. Computer Science, 2018, 45(4): 301 -305 .
[4] HU Qing-cheng, ZHANG Yong, XING Chun-xiao. K-clique Heuristic Algorithm for Influence Maximization in Social Network[J]. Computer Science, 2018, 45(6): 32 -35 .
[5] LI Hang, ZANG Lie, GAN Lu. Search of Speculative Symbolic Execution Path Based on Ant Colony Algorithm[J]. Computer Science, 2018, 45(6): 145 -150 .
[6] ZHANG Wen-ya, XU Hua-zhong and LUO Jie. Moving Objects Detection under Complex Background Based on ViBe[J]. Computer Science, 2017, 44(9): 304 -307 .
[7] QIAN Ji-de, CHEN Bin, QIAN Ji-ye, ZHAO Heng-jun, CHEN Gang. Machine Vision Based Inspection Method of Mura Defect for LCD[J]. Computer Science, 2018, 45(6): 296 -300,313 .
[8] WANG Hao-liang and GAO Jian-hua. Segmentation and Application of Multilevel Morphology Model in GUI Testing[J]. Computer Science, 2017, 44(9): 190 -194, 199 .
[9] GAO Hang, MU Xiao-dong, YI Zhao-xiang ,TONG Tong, YUAN Tan-en. Routing Algorithm Based on Meteor-burst Communication[J]. Computer Science, 2018, 45(7): 84 -89 .
[10] WANG Xiao-fang, XIE Zhong-wen, LI Tong, CHENG Lei, ZHENG Jiao-jiao and LIU Xiao-fang. Saas Service Evolution Consistency Checking with Tenant Tolerance[J]. Computer Science, 2018, 45(5): 147 -155 .