计算机科学 ›› 2018, Vol. 45 ›› Issue (8): 310-314.doi: 10.11896/j.issn.1002-137X.2018.08.056

• 交叉与前沿 • 上一篇    

基于通讯行为轮廓挖掘条件非频繁行为的方法

曹蕊, 方贤文, 王丽丽   

  1. 安徽理工大学数学与大数据学院 安徽 淮南232001
  • 收稿日期:2017-07-24 出版日期:2018-08-29 发布日期:2018-08-29
  • 作者简介:曹 蕊(1990-),女,硕士生,主要研究领域为Petri网,E-mail:734526382@qq.com; 方贤文(1975-),男,博士,教授,主要研究领域为Petri网和可信软件,E-mail:280060673@qq.com(通信作者); 王丽丽(1982-),女,副教授,主要研究领域为业务流程分析和软件认证。
  • 基金资助:
    本文受国家自然科学基金项目(61572035,61402011),安徽省自然科学基金(1508085MF111,1608085QF149),安徽省高校自然科学基金重点项目(KJ2016A208),安徽省学术和技术带头人资助项目(DG119),安徽省优秀青年人才项目(ZY290)资助。

Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile

CAO Rui, FANG Xian-wen, WANG Li-li   

  1. College of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Anhui 232001,China
  • Received:2017-07-24 Online:2018-08-29 Published:2018-08-29

摘要: 条件非频繁行为是指带有属性值的频数较低事件轨迹所记录的行为。从记录的事件日志中挖掘条件非频繁行为是业务过程优化的主要内容之一。已有的方法删除低频次行为,较少考虑模块网间数据流角度下的条件非频繁行为。基于此,文中提出了基于通讯行为轮廓挖掘条件非频繁行为的方法。以模块网间的通讯行为轮廓理论为基础,首先,通过给定的业务过程源模型查找其可执行事件日志,并且找出频数较低的事件轨迹,添加相关属性及属性值,即可得到条件非频繁轨迹;其次,通过计算不同模块网间通讯特征的条件依赖数值,确定条件不频繁轨迹是否删除或保留,从而得到优化事件日志,进而挖掘出优化通讯模型;最后,通过仿真实验验证了该方法的可行性。

关键词: Petri网, 非频繁行为, 模块网, 通讯行为轮廓, 业务过程模型, 噪音

Abstract: Conditional infrequent behavior refers to the behavior recorded by infrequent event traces with attribute va-lues.Mining the conditional infrequent behavior from the event log is one of the main contents of business process optimization.The existing methods remove low frequency behavior,but take less consideration of the conditional infrequent behavior under the perspective of data-flow between different module nets.Based on this,the paper presented a method of mining conditional infrequent behavior based on communication behavior profile.Based on the communication beha-vior profile theory between module nets,firstly,through a given business process source model,its executable event log is searched and the infrequent event traces are found,adding the relevant attributes and attribute values to the infrequent event traces to get the conditional infrequent traces.Secondly,by calculating condition dependent values of the communication features of different module nets,whether the conditional infrequent traces are deleted or retained can be determined.The optimized event log is given,and the business process optimization communication model is mined.Finally,the feasibility of the method is verified by a simulation.

Key words: Business process model, Communication behavioral profile, Infrequent behavior, Module net, Noise, Petri net

中图分类号: 

  • TP391.9
[1]VAN DER AALST W M P.Process miningdata science in action(Second Edition)[M].Springer,2016.
[2]WEERDT J D,BACKER M D,VANTHIENEN J,et al.Amulti-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs[J].Information Systems,2012,37(7):654-676.
[3]SURIADI S,ANDREWS R,TER HOFSTEDE A H M,et al.Event log imperfection patterns for process mining:Towards a systematic approach to cleaning event logs[J].Information Systems,2017,64(C):132-150.
[4]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient process model discovery using maximal pattern mining[C]∥International Conference on Business Process Management.Springer,Cham,2015:441-456.
[5]PONCE-DE-LEÓN H,CARMONA J,VANDEN BROUCKE S K L M.Incorporating negative information in process discovery[C]∥International Conference on Business Process Management.Springer,2015:126-143.
[6]BELLODI E,RIGUZZI F,LAMMA E.Statistical relational lea-rning for workflow mining[J].Intelligent Data Analysis,2016,20(3):515-541.
[7]CONFORTI R,ROSA M L,HOFSTEDE T,et al.Filtering out infrequent behavior from business process event logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2),300-314.
[8]ZELST S J V,DONGEN B F V,AALST W M P V D,et al.Discovering relaxed sound workflow nets using integer linear programming[J].Computing,2017(4).
[9]LEEMANS S J J,FAHLAND D,VAN DER AALST W M P.Discovering block-structured process models from event logs containing infrequent behaviour[C]∥International Conference on Business Process Management.Springer,Cham,2013:66-78.
[10]VAN DER WERF J M,KAATS E.Discovery of functional architectures from event logs[C]∥PNSE@ Petri Nets.2015:227-243.
[11]MANNHARDT F,DE LEONI M,REIJERS H A,et al.Data-driven process discovery-revealing conditional infrequent beha-vior from event logs[C]∥International Conference on Advanced Information Systems Engineering.Springer,Cham,2017:545-560.
[12]VAN DER AALST W M P,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs[J].IEEE Transactions on Knowledge Data Engineering,2004,16(9):1128-1142.
[1] 李清, 刘伟, 管梦真, 杜玉越, 孙红伟.
基于逻辑博弈决策Petri网的应急决策建模与分析
Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net
计算机科学, 2022, 49(4): 294-301. https://doi.org/10.11896/jsjkx.210300224
[2] 陶小燕, 闫春钢, 刘关俊.
基于WFT-net验证合理性的动态数据精炼策略
Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net
计算机科学, 2021, 48(7): 99-104. https://doi.org/10.11896/jsjkx.200700125
[3] 赖祥威, 郑万波, 吴燕清, 夏云霓, 冉啟华, 董银环.
矿山事故应急救援数字预案的任务协同流程网络模型及时效分析
Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan
计算机科学, 2021, 48(6A): 596-602. https://doi.org/10.11896/jsjkx.200500041
[4] 宁玉辉, 姚喜.
一种应急指挥系统的设计与实现
Design and Implementation of Emergency Command System
计算机科学, 2021, 48(6A): 613-618. https://doi.org/10.11896/jsjkx.201000136
[5] 王吴松, 方欢, 郑雪文.
基于分组公平控制流结构的流程变体合并方法
Process Variants Merging Method Based on Group-fair Control Flow Structure
计算机科学, 2021, 48(12): 170-180. https://doi.org/10.11896/jsjkx.201100157
[6] 杨皓然, 方贤文.
基于概率和时间因素的Petri网业务流程一致性分析
Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor
计算机科学, 2020, 47(5): 59-63. https://doi.org/10.11896/jsjkx.190500119
[7] 李娟,方贤文,王丽丽,刘祥伟.
基于日志自动机的业务流程混沌活动过滤方法
Chaotic Activity Filter Method for Business Process Based on Log Automaton
计算机科学, 2020, 47(1): 66-71. https://doi.org/10.11896/jsjkx.181102110
[8] 李兰, 杨晨, 王安福.
差分隐私模型中隐私参数ε的选取研究
Study on Selection of Privacy Parameters ε in Differential Privacy Model
计算机科学, 2019, 46(8): 201-205. https://doi.org/10.11896/j.issn.1002-137X.2019.08.033
[9] 孙书亚, 方欢, 方贤文.
日志诱导下的形态学片段流程聚类方法
Log-induced Morphological Fragments Process Clustering Method
计算机科学, 2019, 46(8): 71-77. https://doi.org/10.11896/j.issn.1002-137X.2019.08.011
[10] 宋健,方贤文,王丽丽.
基于流程切的过程模型挖掘方法
Process Model Mining Method Based on Process Cut
计算机科学, 2019, 46(7): 315-321. https://doi.org/10.11896/j.issn.1002-137X.2019.07.048
[11] 苏庆,林昊,黄剑锋,何凡,林志毅.
基于Petri网编码的动态图水印技术研究
Study on Dynamic-graph Watermarking Based on Petri Net Coding
计算机科学, 2019, 46(7): 120-125. https://doi.org/10.11896/j.issn.1002-137X.2019.07.019
[12] 宋健, 方贤文, 王丽丽, 刘祥伟.
基于行为轮廓的业务流程隐变迁挖掘方法
Method of Mining Hidden Transition of Business Process Based on Behavior Profiles
计算机科学, 2019, 46(12): 334-340. https://doi.org/10.11896/jsjkx.180901654
[13] 王世丽, 金英花, 吴晨.
基于通信时滞和噪音的群集运动
Flocking Based on Communication Delay and Noise
计算机科学, 2019, 46(10): 311-315. https://doi.org/10.11896/jsjkx.180901706
[14] 杨, 虎, 付宇, 范, 丹.
噪音特征对聚类内部有效性的影响
Influence of Noisy Features on Internal Validation of Clustering
计算机科学, 2018, 45(7): 22-30. https://doi.org/10.11896/j.issn.1002-137X.2018.07.004
[15] 何路路, 方欢.
带数据流的面向服务的业务流程模型变化传播Petri网方法
Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net
计算机科学, 2018, 45(6A): 545-548.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!