计算机科学 ›› 2019, Vol. 46 ›› Issue (12): 334-340.doi: 10.11896/jsjkx.180901654
• 交叉与前沿 • 上一篇
宋健, 方贤文, 王丽丽, 刘祥伟
SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei
摘要: 在业务流程优化过程中,从非频繁行为中挖掘隐变迁是重要任务之一。从非频繁行为中挖掘隐变迁,能够更好地还原流程模型,提高流程的运行效率。文中依据行为轮廓的理论,在频率较高的日志中进行挖掘以获得初始模型。首先利用合理性阈值对事件日志进行过滤,得到有效的低频序列日志;其次利用低频序列日志优化初始模型,通过对各活动间行为轮廓关系与源模型的对比,来找到变化的区域,将可能存在的隐变迁挖掘出来;然后通过优化指标对挖掘到的隐变迁进行进一步验证,从而得到完整的含隐变迁的过程模型;最后通过具体的事例以及仿真对所构建的模型进行分析,并验证该方法的有效性。
中图分类号:
[1]WEIJTERS A J M M,VAN DER AALST W M P,DE MEDEIROS A K A.Process mining with the heuristics miner-algorithm[R].Technische Universiteit Eindhoven,Technical report WP 166,2006:1-34.[2]CONFORTI R,ROSA M L,HOFSTEDE A H M.Filtering out infrequent behavior from business process event logs[J].IEEE Transactions on Knowledge and Data Engineering,2016,29:300-314.[3]VAN DER AALST W M P.Process Mining Discovery,Con- formance and Enhancement of Business Processes[M].Berlin:Springer-Verlag,2011:191-211.[4]BUIJS J C A M,VAN DONGEN B F,VAN DER AALST W M P.A genetic algorithm for discovering process trees[C]//Proceedings of the 2012 IEEE Congress on Evolutionary Computation (CEC),IEEE,2012:1-8.[5] LEEMANS S J J,FAHLAND D,AALST W M P V D.Using Life Cycle Information in Process Discovery[M]//Business Process Management Workshops.2016:1-12.[6] AALST W M P V D,KALENKOVA A,RUBIN V,et al. Process Discovery Using Localized Events [M].Application and Theory of Petri Nets and Concurrency.Springer International Publishing,2015:287-308.[7]NIEK T,BENJAMIN D,NATALIA S,et al.Interest-Driven Discovery of Local Process Models[J].Information Systems,2018:1-16.arXiv:1703.07116.[8]ROZINAT A,W M PVAN DER AALST.Conformance Tes- ting:Measuring the Fit and Appropriateness of Event Logs and Process Models[J].Computer Science,2005,3812 LNCS:163-176.[9]吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.[10]FANG X W,WU J Z,LIU X W.An Optimized Method of Business Process Mining Based on the Behavior Profile of Petri Net[J].Information Technology Journal,2014,13(1):86-93.[11]WEIDLICH M,WESKE M,MENDLING J.Change propagation in process models using behavioural profiles[C]//2009 IEEE International Conference on Services Computing.Bangalore,India,2009:32-40.[12]VAN DER AALST W,WEIJTERS T,MARUSTER L.Workflow mining:Discovering process models from event logs[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1128-1142.[13]CHENG H J,KUMARA.Process Mining on Noisy Logs-Can log sanitization help to improve performance?[J].Decision Support Systems,2015,79(C):138-149.[14]KUNZE M,WEIDLICH M,WESKE M.Querying process models by behavior inclusion[J].Software & Systems Modeling,2015,14(3),1105-1125.[15]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discove- ring Infrequent Behavioral Patterns in Process Models[C]//International Conference on Business Process Management.Springer,Cham,2017:324-340. |
[1] | 李清, 刘伟, 管梦真, 杜玉越, 孙红伟. 基于逻辑博弈决策Petri网的应急决策建模与分析 Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net 计算机科学, 2022, 49(4): 294-301. https://doi.org/10.11896/jsjkx.210300224 |
[2] | 陶小燕, 闫春钢, 刘关俊. 基于WFT-net验证合理性的动态数据精炼策略 Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net 计算机科学, 2021, 48(7): 99-104. https://doi.org/10.11896/jsjkx.200700125 |
[3] | 赖祥威, 郑万波, 吴燕清, 夏云霓, 冉啟华, 董银环. 矿山事故应急救援数字预案的任务协同流程网络模型及时效分析 Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan 计算机科学, 2021, 48(6A): 596-602. https://doi.org/10.11896/jsjkx.200500041 |
[4] | 宁玉辉, 姚喜. 一种应急指挥系统的设计与实现 Design and Implementation of Emergency Command System 计算机科学, 2021, 48(6A): 613-618. https://doi.org/10.11896/jsjkx.201000136 |
[5] | 王吴松, 方欢, 郑雪文. 基于分组公平控制流结构的流程变体合并方法 Process Variants Merging Method Based on Group-fair Control Flow Structure 计算机科学, 2021, 48(12): 170-180. https://doi.org/10.11896/jsjkx.201100157 |
[6] | 冯安然, 王旭仁, 汪秋云, 熊梦博. 基于PCA和随机树的数据库异常访问检测 Database Anomaly Access Detection Based on Principal Component Analysis and Random Tree 计算机科学, 2020, 47(9): 94-98. https://doi.org/10.11896/jsjkx.190800056 |
[7] | 杨皓然, 方贤文. 基于概率和时间因素的Petri网业务流程一致性分析 Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor 计算机科学, 2020, 47(5): 59-63. https://doi.org/10.11896/jsjkx.190500119 |
[8] | 李娟,方贤文,王丽丽,刘祥伟. 基于日志自动机的业务流程混沌活动过滤方法 Chaotic Activity Filter Method for Business Process Based on Log Automaton 计算机科学, 2020, 47(1): 66-71. https://doi.org/10.11896/jsjkx.181102110 |
[9] | 孙书亚, 方欢, 方贤文. 日志诱导下的形态学片段流程聚类方法 Log-induced Morphological Fragments Process Clustering Method 计算机科学, 2019, 46(8): 71-77. https://doi.org/10.11896/j.issn.1002-137X.2019.08.011 |
[10] | 宋健,方贤文,王丽丽. 基于流程切的过程模型挖掘方法 Process Model Mining Method Based on Process Cut 计算机科学, 2019, 46(7): 315-321. https://doi.org/10.11896/j.issn.1002-137X.2019.07.048 |
[11] | 苏庆,林昊,黄剑锋,何凡,林志毅. 基于Petri网编码的动态图水印技术研究 Study on Dynamic-graph Watermarking Based on Petri Net Coding 计算机科学, 2019, 46(7): 120-125. https://doi.org/10.11896/j.issn.1002-137X.2019.07.019 |
[12] | 应丽, 方贤文, 王丽丽, 刘祥伟. 基于业务能力的可配置业务流程模型变化域分析 Change Region Analysis of Configurable Business Process Model Based on Business Capability 计算机科学, 2019, 46(10): 322-328. https://doi.org/10.11896/jsjkx.180901692 |
[13] | 曹蕊, 方贤文, 王丽丽. 基于通讯行为轮廓挖掘条件非频繁行为的方法 Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile 计算机科学, 2018, 45(8): 310-314. https://doi.org/10.11896/j.issn.1002-137X.2018.08.056 |
[14] | 何路路, 方欢. 带数据流的面向服务的业务流程模型变化传播Petri网方法 Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net 计算机科学, 2018, 45(6A): 545-548. |
[15] | 赵培海, 王咪咪. 基于三维行为关系图的模型一致性检测方法 Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph 计算机科学, 2018, 45(6): 156-160. https://doi.org/10.11896/j.issn.1002-137X.2018.06.027 |
|