Computer Science ›› 2016, Vol. 43 ›› Issue (11): 94-97.doi: 10.11896/j.issn.1002-137X.2016.11.017

Previous Articles     Next Articles

Method of Process Models Mining Based on Quasi Indirect Dependence

HUA Pei, FANG Xian-wen and LIU Xiang-wei   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Process mining aims to achieve the reasonable process model which we need from the event logs recorded by information system,which helps us to improve or rebuild the business process.In the past,the process model based on the direct dependence between the tasks has a lot of limitations.Although there are many methods can discover indirect dependence,they do not do analysis from the perspective of the process behavior.The process mining algorithm based on quasi indirect dependence takes the behavioral profiles into account and the initial model is established according to the behavioral profiles.Then model is adjusted based on incremental logs and quasi indirect dependence.Finally,the optimal model is selected according to the evaluation criteria.This method is especially suitable for mining the process model with indirect dependence.

Key words: Process mining,Behavioral profiles,Event logs,Quasi indirect dependence

[1] van der Aalst W.Service Mining:Using Process Mining to Discover,Check,and Improve Service Behavior[J].IEEE Transactions on Services Computing,2013,6(4):525-535
[2] Buijs J C A M,van Dongen B F,van der Aalst W M P.Mining Configurable Process Models from Collections of Event Logs[J].Business Process Management.Springer Berlin Heidelberg ,2013,8094:33-48
[3] Leemans S J J,Fahland D,van der Aalst W.Discovering Block-Structured process models from incomplete event logs[J].Application and Theory of Petri Nets and Concurrency Lecture Notes in Computer Science,2014,8489:91-110
[4] van der Aalst W.Decomposing Petri nets for process mining:A generic approach [J].Distributed and Parallel Databases,2013,31(4):471-507
[5] Claes J,Poels G.Merging event logs for process mining:A rule based merging method and rule suggestion algorithm[J].Expert Systems with Applications,2014,41(16):7291-7306
[6] Ouyang C,Cheng H J,Juan Y C.An Integrated mining approach to discover business process models with parallel structures:towards fitness improvement[J].International Journal of Production Research,2014,53(13):1-29
[7] Wen Li-jie,van der Aalst W M P,Wang Jian-min,et al.Mining Process Models with Non-Free-Choice Constructs[J].Data Mi-ning and Knowledge Discovery,2007,15(2):145-180
[8] Fang Xian-weng,Hao Wen-jun.The Approach of Analyzing the Smallest Change Domain in Process Models based on Petri Nets [J].Applied Mathematics and Information Sciences,2012,6(3):943-949
[9] Smirnov S,Weidlich M.Business Process Model Abstractionbased on Synthesis from Well-structured Behavioral Profiles[J].International Journal of Cooperative Information Systems,2012,21(1):55-83
[10] Rozinat A,Van der Aalst W M P.Conformance checking ofprocesses based on monitoring real behavior [J].Information Systems,2008,33(1):64-95

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .