计算机科学 ›› 2019, Vol. 46 ›› Issue (12): 334-340.doi: 10.11896/jsjkx.180901654

• 交叉与前沿 • 上一篇    

基于行为轮廓的业务流程隐变迁挖掘方法

宋健, 方贤文, 王丽丽, 刘祥伟   

  1. (安徽理工大学力学与光电物理学院 安徽 淮南232001)
  • 收稿日期:2018-09-05 出版日期:2019-12-15 发布日期:2019-12-17
  • 通讯作者: 方贤文(1975-),男,博士,教授,主要研究方向为Petri网和可信软件,E-mail:280060673@qq.com。
  • 作者简介:宋健(1991-),男,硕士生,主要研究方向为Petri网,E-mail:1529139842@qq.com;王丽丽(1982-),女,副教授,主要研究方向为业务流程管理;刘祥伟(1977-),女,副教授,主要研究方向为业务流程管理。
  • 基金资助:
    本文受国家自然科学基金(61572035,61272153,61402011),安徽省自然科学基金(1508085MF111),安徽省高校自然科学基金(KJ2014A067,KJ2016A208)资助。

Method of Mining Hidden Transition of Business Process Based on Behavior Profiles

SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei   

  1. (College of Mechanics and Optoelectronics Physics,Anhui University of Science and Technology,Huainan,Anhui 232001,China)
  • Received:2018-09-05 Online:2019-12-15 Published:2019-12-17

摘要: 在业务流程优化过程中,从非频繁行为中挖掘隐变迁是重要任务之一。从非频繁行为中挖掘隐变迁,能够更好地还原流程模型,提高流程的运行效率。文中依据行为轮廓的理论,在频率较高的日志中进行挖掘以获得初始模型。首先利用合理性阈值对事件日志进行过滤,得到有效的低频序列日志;其次利用低频序列日志优化初始模型,通过对各活动间行为轮廓关系与源模型的对比,来找到变化的区域,将可能存在的隐变迁挖掘出来;然后通过优化指标对挖掘到的隐变迁进行进一步验证,从而得到完整的含隐变迁的过程模型;最后通过具体的事例以及仿真对所构建的模型进行分析,并验证该方法的有效性。

关键词: Petri网, 流程模型, 行为轮廓, 隐变迁

Abstract: In the process of business process optimization,mining hidden transitions from infrequent behaviors is one of the important tasks.Mining the hidden transitions from infrequent behaviors can better restore the process model and improve the efficiency of the process.Based on the theory of behavioral profiles,this paper mined logs from relatively high frequency and obtained initial models.Firstly,the event log is filtered by the reasonableness threshold to obtain a valid low-frequency sequence log.Then,the low-frequency sequence log is used to optimize the initial model,and the behavioral profiles relationship between each activity is compared with the source model to find the changed region,and the possible hidden transitions are minned.Next,through the optimization of the indicators to further verify the hidden transitions,a complete and accurate model of the implicit transition process is obtained.Finally,the model is analyzed by concrete examples and simulations to verify the effectiveness of the method.

Key words: Behavioral profiles, Hide transition, Petri net, Process model

中图分类号: 

  • TP391.9
[1]WEIJTERS A J M M,VAN DER AALST W M P,DE MEDEIROS A K A.Process mining with the heuristics miner-algorithm[R].Technische Universiteit Eindhoven,Technical report WP 166,2006:1-34.
[2]CONFORTI R,ROSA M L,HOFSTEDE A H M.Filtering out infrequent behavior from business process event logs[J].IEEE Transactions on Knowledge and Data Engineering,2016,29:300-314.
[3]VAN DER AALST W M P.Process Mining Discovery,Con- formance and Enhancement of Business Processes[M].Berlin:Springer-Verlag,2011:191-211.
[4]BUIJS J C A M,VAN DONGEN B F,VAN DER AALST W M P.A genetic algorithm for discovering process trees[C]//Proceedings of the 2012 IEEE Congress on Evolutionary Computation (CEC),IEEE,2012:1-8.
[5] LEEMANS S J J,FAHLAND D,AALST W M P V D.Using Life Cycle Information in Process Discovery[M]//Business Process Management Workshops.2016:1-12.
[6] AALST W M P V D,KALENKOVA A,RUBIN V,et al. Process Discovery Using Localized Events [M].Application and Theory of Petri Nets and Concurrency.Springer International Publishing,2015:287-308.
[7]NIEK T,BENJAMIN D,NATALIA S,et al.Interest-Driven Discovery of Local Process Models[J].Information Systems,2018:1-16.arXiv:1703.07116.
[8]ROZINAT A,W M PVAN DER AALST.Conformance Tes- ting:Measuring the Fit and Appropriateness of Event Logs and Process Models[J].Computer Science,2005,3812 LNCS:163-176.
[9]吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.
[10]FANG X W,WU J Z,LIU X W.An Optimized Method of Business Process Mining Based on the Behavior Profile of Petri Net[J].Information Technology Journal,2014,13(1):86-93.
[11]WEIDLICH M,WESKE M,MENDLING J.Change propagation in process models using behavioural profiles[C]//2009 IEEE International Conference on Services Computing.Bangalore,India,2009:32-40.
[12]VAN DER AALST W,WEIJTERS T,MARUSTER L.Workflow mining:Discovering process models from event logs[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1128-1142.
[13]CHENG H J,KUMARA.Process Mining on Noisy Logs-Can log sanitization help to improve performance?[J].Decision Support Systems,2015,79(C):138-149.
[14]KUNZE M,WEIDLICH M,WESKE M.Querying process models by behavior inclusion[J].Software & Systems Modeling,2015,14(3),1105-1125.
[15]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discove- ring Infrequent Behavioral Patterns in Process Models[C]//International Conference on Business Process Management.Springer,Cham,2017:324-340.
[1] 李清, 刘伟, 管梦真, 杜玉越, 孙红伟.
基于逻辑博弈决策Petri网的应急决策建模与分析
Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net
计算机科学, 2022, 49(4): 294-301. https://doi.org/10.11896/jsjkx.210300224
[2] 陶小燕, 闫春钢, 刘关俊.
基于WFT-net验证合理性的动态数据精炼策略
Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net
计算机科学, 2021, 48(7): 99-104. https://doi.org/10.11896/jsjkx.200700125
[3] 赖祥威, 郑万波, 吴燕清, 夏云霓, 冉啟华, 董银环.
矿山事故应急救援数字预案的任务协同流程网络模型及时效分析
Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan
计算机科学, 2021, 48(6A): 596-602. https://doi.org/10.11896/jsjkx.200500041
[4] 宁玉辉, 姚喜.
一种应急指挥系统的设计与实现
Design and Implementation of Emergency Command System
计算机科学, 2021, 48(6A): 613-618. https://doi.org/10.11896/jsjkx.201000136
[5] 王吴松, 方欢, 郑雪文.
基于分组公平控制流结构的流程变体合并方法
Process Variants Merging Method Based on Group-fair Control Flow Structure
计算机科学, 2021, 48(12): 170-180. https://doi.org/10.11896/jsjkx.201100157
[6] 冯安然, 王旭仁, 汪秋云, 熊梦博.
基于PCA和随机树的数据库异常访问检测
Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree
计算机科学, 2020, 47(9): 94-98. https://doi.org/10.11896/jsjkx.190800056
[7] 杨皓然, 方贤文.
基于概率和时间因素的Petri网业务流程一致性分析
Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor
计算机科学, 2020, 47(5): 59-63. https://doi.org/10.11896/jsjkx.190500119
[8] 李娟,方贤文,王丽丽,刘祥伟.
基于日志自动机的业务流程混沌活动过滤方法
Chaotic Activity Filter Method for Business Process Based on Log Automaton
计算机科学, 2020, 47(1): 66-71. https://doi.org/10.11896/jsjkx.181102110
[9] 孙书亚, 方欢, 方贤文.
日志诱导下的形态学片段流程聚类方法
Log-induced Morphological Fragments Process Clustering Method
计算机科学, 2019, 46(8): 71-77. https://doi.org/10.11896/j.issn.1002-137X.2019.08.011
[10] 宋健,方贤文,王丽丽.
基于流程切的过程模型挖掘方法
Process Model Mining Method Based on Process Cut
计算机科学, 2019, 46(7): 315-321. https://doi.org/10.11896/j.issn.1002-137X.2019.07.048
[11] 苏庆,林昊,黄剑锋,何凡,林志毅.
基于Petri网编码的动态图水印技术研究
Study on Dynamic-graph Watermarking Based on Petri Net Coding
计算机科学, 2019, 46(7): 120-125. https://doi.org/10.11896/j.issn.1002-137X.2019.07.019
[12] 应丽, 方贤文, 王丽丽, 刘祥伟.
基于业务能力的可配置业务流程模型变化域分析
Change Region Analysis of Configurable Business Process Model Based on Business Capability
计算机科学, 2019, 46(10): 322-328. https://doi.org/10.11896/jsjkx.180901692
[13] 曹蕊, 方贤文, 王丽丽.
基于通讯行为轮廓挖掘条件非频繁行为的方法
Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile
计算机科学, 2018, 45(8): 310-314. https://doi.org/10.11896/j.issn.1002-137X.2018.08.056
[14] 何路路, 方欢.
带数据流的面向服务的业务流程模型变化传播Petri网方法
Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net
计算机科学, 2018, 45(6A): 545-548.
[15] 赵培海, 王咪咪.
基于三维行为关系图的模型一致性检测方法
Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph
计算机科学, 2018, 45(6): 156-160. https://doi.org/10.11896/j.issn.1002-137X.2018.06.027
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!