计算机科学 ›› 2020, Vol. 47 ›› Issue (7): 78-83.doi: 10.11896/jsjkx.190600140

• 数据库&大数据&数据科学 • 上一篇    下一篇

基于成本对齐的业务流程变化挖掘方法

刘静, 方贤文   

  1. 安徽理工大学数学与大数据学院 安徽 淮南232001
  • 收稿日期:2019-06-26 出版日期:2020-07-15 发布日期:2020-07-16
  • 通讯作者: 方贤文(280060673@qq.com)
  • 作者简介:1825852939@qq.com
  • 基金资助:
    国家自然科学基金(61272153,61402011);安徽省自然科学基金(1508085MF111,1608085QF149);安徽省高校自然科学基金重点项目(KJ2016A208)

Mining Method of Business Process Change Based on Cost Alignment

LIU Jing, FANG Xian-wen   

  1. College of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Auhui 232001,China
  • Received:2019-06-26 Online:2020-07-15 Published:2020-07-16
  • About author:LIU Jing,born in 1995,postgraduate.Her main research interests include Petri net and change mining.
    FANG Xian-wen,born in 1975,Ph.D,professor.His main research interests include Petri net and trusted software.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China(61272153,61402011),Natural Science Foundation of Anhui Pro-vince(1508085MF111,1608085QF149),and Natural Science Foundation of Colleges and Universities in Anhui Province(KJ2016A208)

摘要: 变化挖掘是业务流程管理的核心,从事件日志中挖掘出业务流程的变化尤为重要。已有对变化挖掘的分析方法大多集中在源模型或目标模型已知的基础上。文中从系统日志的角度提出了一种基于成本最优对齐的业务流程变化挖掘方法。首先,根据事件日志提取出有效的高频形态学发生片段,计算出各迹对齐时的最高成本函数值,并在此基础上发现最优迹对齐;然后,通过度量最优对齐时变化日志与源日志间的相似性度,快速且高效地挖掘出变化集。最后通过实例分析显示了该方法的有效性。

关键词: 变化挖掘, 成本函数, 高频片段, 相似性度, 最优对齐

Abstract: Change mining is the core of business process management,and it is particularly important to mine the changes of business processes from the event log.Most of the existing analysis methods of change mining focus on the source model or target model.From the point of view of system log,this paper proposes a business process change mining method based on cost optimal alignment.Firstly,according to the event log,the effective high frequency morphological occurrence segment is extracted,the highest cost function value of each trace alignment is calculated,and on this basis,the optimal trace alignment is found,and then the similarity between the change log and the source log is measured to mine the change set quickly and efficiently.Finally,an example is given to show the effectiveness of the method.

Key words: Change mining, Cost function, High frequency segment, Optimal alignment, Similarity degree

中图分类号: 

  • TP391.9
[1]WEIDLICH M,WESKE M,MENDLING J.Change propagation in process models using behavioural profiles[C]//2009 IEEE International Conference on Services Computing.IEEE,2009:33-40.
[2]HONG Y K,ZHAO W,YAO Q.Model of BPMS for supporting variability of business process based on dependence[J].Application Research of Computers,2009,26(9):3348-3353,3357.
[3]FANG X W,ZHAO F,FANG H,et al.The fusion analysis
method about the change region of the business process model based on behavior inclusion in petri net[J].Chinese Journal of Computers,2018,41(3):695-708.
[4]GROSSMANN G,MAFAZI S,MAYER W,et al.Change propagation and conflict resolution for the Co-evolution of business processes[J].International Journal of Cooperative Information Systems,2015,24(1):1540002.
[5]FDHILA W,RINDERLE-MA S,REICHERT M.Change propagation in collaborative processes scenarios[C]//Proceedings of the 8th IEEE International Conference on Collaborative Computing:Networking,Applications and Worksharing.IEEE,2012:452-461.
[6]ZHANG H,LI J,ZHU L M,et al.Investigating dependencies in software requirements for change propagation analysis[J].Information and Software Technology,2014,56(1):40-53.
[7]FANG X W,PENG K,WANG L L,et al.Analysis of business process change propagation based on configuration and cancellation state[J].Computer Integrated Manufacturing Systems,2018,24(7):1621-1630.
[8]DAHMAN K,CHAROY F,GODART C.Alignment and change propagation between business processes and service-oriented architectures[C]//2013 IEEE International Conference on Ser-vices Computing.IEEE,2013:168-175.
[9]DAM H K,LE L S,GHOSE A.Supporting change propagation in the evolution of enterprise architectures[C]//2010 14th IEEE International Enterprise Distributed Object Computing Confe-rence.IEEE,2010:24-33.
[10]FANG H,ZHANG Y,WU Q L.A log induced change mining method for fault diagnosis using structure causality in BPMSs[J].Control Theory and Technology,2018,35(8):1167-1176.
[11]GÜNTHER C W,RINDERLE S,REICHERT M,et al.Change mining in adaptive process management systems[M]//On the Move to Meaningful Internet Systems 2006:CoopIS,DOA,GADA,and ODBASE.Berlin:Springer,2006:309-326.
[12]LI C,REICHERT M,WOMBACHER A.Mining business
process variants:Challenges,scenarios,algorithms[J].Data & Knowledge Engineering,2011,70(5):409-434.
[13]LI C,REICHERT M,WOMBACHER A.Discovering reference models by mining process variants using a heuristic approach[M]//Lecture Notes in Computer Science.Berlin:Springer,2009:344-362.
[14]SONG M,GÜNTHER C W,VAN DER AALST W M P.Trace clustering in process mining[M]//Business Process Management Workshops.Berlin:Springer,2009:109-120.
[15]HALLERBACH A,BAUER T,REICHERT M.Configuration
and management of process variants[M]//Handbook on Business Process Management 1.Berlin:Springer,2010:237-255.
[16]FANG H,SUN S Y,FANG X W.Behavior change mining
methods based on incomplete logs conjoint occurrence relation[J].Computer Integrated Manufacturing Systems.
[17]JAGADEESH C B R P,VAN DER AALST W M P.Process dia-
gnostics using trace alignment:Opportunities,issues,and challenges[J].Information Systems,2012,37(2):117-141.
[18]HUANG D M,XU Q Q,HE Q,et al.Workflow model based on TC-Net[J].Computer Engineering and Applications,2016,52(15):260-265.
[19]VAN DE AALST W.Process discovery:capturing the invisible[J].IEEE Computational Intelligence Magazine,2010,5(1):28-41.
[20]POURMASOUMI A,KAHANI M,BAGHERI E.Mining variable fragments from process event logs[J].Information Systems Frontiers,2017,19(6):1423-1443.
[1] 张岩金, 白亮.
一种基于符号关系图的快速符号数据聚类算法
Fast Symbolic Data Clustering Algorithm Based on Symbolic Relation Graph
计算机科学, 2021, 48(4): 111-116. https://doi.org/10.11896/jsjkx.200800011
[2] 邵阳雪, 孟伟, 孔德珍, 韩林轩, 刘扬.
基于深度学习的特种车辆跨模态检索方法
Cross-modal Retrieval Method for Special Vehicles Based on Deep Learning
计算机科学, 2020, 47(12): 205-209. https://doi.org/10.11896/jsjkx.191000132
[3] 丁武, 马媛, 杜诗蕾, 李海辰, 丁公博, 王超.
基于XGBoost算法的多元水文时间序列趋势相似性挖掘
Mining Trend Similarity of Multivariate Hydrological Time Series Based on XGBoost Algorithm
计算机科学, 2020, 47(11A): 459-463. https://doi.org/10.11896/jsjkx.200500128
[4] 王永, 王永东, 邓江洲, 张璞.
融合Jensen-Shannon散度的推荐算法
Recommendation Algorithm Based on Jensen-Shannon Divergence
计算机科学, 2019, 46(2): 210-214. https://doi.org/10.11896/j.issn.1002-137X.2019.02.032
[5] 刘奕志,程汝峰,梁永全.
一种基于共享近邻的密度峰值聚类算法
Clustering Algorithm Based on Shared Nearest Neighbors and Density Peaks
计算机科学, 2018, 45(2): 125-129. https://doi.org/10.11896/j.issn.1002-137X.2018.02.022
[6] 刘爽,白亮,于天元,贾玉华.
基于双向学习排序的跨媒体语义相似性度量方法
Cross-media Semantic Similarity Measurement Using Bi-directional Learning Ranking
计算机科学, 2017, 44(Z6): 84-87. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.017
[7] 池云仙,赵书良,罗燕,赵骏鹏,高琳,李超.
基于特征隶属度的文本分类相似性度量方法
Similarity Measure for Text Classification Based on Feature Subjection Degree
计算机科学, 2017, 44(11): 289-296. https://doi.org/10.11896/j.issn.1002-137X.2017.11.044
[8] 钟林辉,李俊杰,夏鲸,薛良波.
基于多维属性的构件化软件演化相似性度量方法研究
Research on Evolution Similarity Measurement of Component-based Software Based on Multi-dimensional Evolution Properties
计算机科学, 2016, 43(Z11): 499-505. https://doi.org/10.11896/j.issn.1002-137X.2016.11A.112
[9] 李志华,陈超群,李村,胡振宇,张华伟.
基于关键词重提取的密文文本相似性度量方法研究
Similarity Measure Algorithm of Cipher-text Based on Re-extracted Keywords
计算机科学, 2016, 43(8): 95-99. https://doi.org/10.11896/j.issn.1002-137X.2016.08.020
[10] 薛占熬,司小朦,朱泰隆,王楠.
覆盖粗糙直觉模糊集模型的研究
Study on Model of Covering-based Rough Intuitionistic Fuzzy Sets
计算机科学, 2016, 43(1): 44-48. https://doi.org/10.11896/j.issn.1002-137X.2016.01.010
[11] 杜京义,刘文恵.
基于颜色和纹理特征提取的接地网腐蚀等级分析
Analysis of Grounding Grid Corrosion Grade Based on Extraction of Color and Texture
计算机科学, 2015, 42(Z11): 169-172.
[12] 刘文英,王拥军,杨义川.
基于HSV和纹理特征的相容near度量方法
Tolerance Nearness Measure Based on HSV and Texture Feature
计算机科学, 2015, 42(Z11): 109-112.
[13] 李红梅,郝文宁,陈刚.
基于改进LSH的协同过滤推荐算法
Collaborative Filtering Recommendation Algorithm Based on Improved Locality-sensitive Hashing
计算机科学, 2015, 42(10): 256-261.
[14] 刘欣悦,刘广钟.
加权抽样对相似性学习算法的改进效果研究
Study on Similarity Learning with Weighted Sampling
计算机科学, 2014, 41(Z6): 387-390.
[15] 杨高明,李敬兆,杨静,朱广丽.
(k,l)-多样性数据发布研究
Achieving(k,l)-Diversity in Privacy Preserving Data Publishing
计算机科学, 2013, 40(8): 140-145.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!