计算机科学 ›› 2019, Vol. 46 ›› Issue (2): 321-326.doi: 10.11896/j.issn.1002-137X.2019.02.049
郝惠晶, 方贤文, 王丽丽, 刘祥伟
HAO Hui-jing, FANG Xian-wen, WANG Li-li, LIU Xiang-wei
摘要: 低频行为模式分析是流程管理的重要内容之一,有效区分低频日志和噪音日志在业务流程过程挖掘中显得尤为重要。目前已有的研究大部分是将流程模型中的低频行为当作噪音直接过滤,但有些低频行为对模型是有效的。文中提出了基于Petri网行为紧密度的有效低频模式分析方法。首先,根据给定的事件日志建立合理的流程模型;然后,通过迭代扩展初始模式来发现流程模型中的所有低频日志序列,并在此基础上计算日志与模型的行为距离向量,利用日志与模型的行为紧密度找出有效的低频行为模式;最后,通过实例分析验证了所提方法的可行性。
中图分类号:
[1]VZQUEZ-BARREIROS B,MUCIENTES M,LAMA M.ProDiGen:Mining complete,precise and minimal structure process models with a genetic algorithm[J].Information Sciences,2015,294:315-333. [2]LEEMANS S J J,FAHLAND D,AALST W M P V D.Discovering Block-Structured Process Models from Event Logs-A Constructive Approach[M]∥Application and Theory of Petri Nets and Concurrency.Springer Berlin Heidelberg,2013:311-329. [3]TAX N,SIDOROVA N,HAAKMA R,et al.Mining local pro- cess models[J].Journal of Innovation in Digital Ecosystems,2016,3(2):183-196. [4]SURIADI S,MANS R S,WYNN M T,et al.Measuring Patient Flow Variations:A Cross-Organisational Process Mining Approach[M]∥Asia Pacific Business Process Management.Springer International Publishing,2014:43-58. [5]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314. [6]MANNHARDT F,LEONI M D,REIJERS H A,et al.Data- Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]∥International Conference on Advanced Information Systems Engineering.Springer,Cham,2017:545-560. [7]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient Process Model Discovery Using Maximal Pattern Mining[C]∥International Conference on Business Process Management.Springer,Cham,2015:441-456. [8]LU X,FAHLAND D,BIGGELAAR F J H M V D,et al.Detecting Deviating Behaviors Without Models[C]∥International Conference on Business Process Management.Springer,Cham,2015:126-139. [9]LEEMANS S J J,FAHLAND D,AALST W M P V D.Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour[C]∥International Conference on Business Process Management.Springer,Cham,2013:66-78. [10]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discovering Infrequent Behavioral Patterns in Process Models[C]∥International Conference on Business Process Management.Springer,Cham,2017:324-340. [11]JENSEN M T.Improving robustness and flexibility of tardiness and total flow-time job shops using robustness measures[J].Applied Soft Computing,2001,1(1):35-52. [12]WU Z H.Petri nets theory [M].Beijing:Mechanical Industry Press,2006:6-22.(in Chinese) 吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22. [13]GAO Y N,FANG X W,WANG L L.Optimized analysis of business process configuration based on Petri net behavior closeness[J].Computer Science,2017,44(S1):539-542.(in Chinese) 高雅楠,方贤文,王丽丽.基于Petri网行为紧密度的业务流程配置优化分析[J].计算机科学,2017,44(S1):539-542. [14]CHEN L N,FANG X W,LIU X W.Optimized analysis of business process model query of Petri net behavior inclusion[J].Computer Engineering and Design,2017,38(2):409-413.(in Chinese) 陈丽娜,方贤文,刘祥伟.Petri网行为包含的业务流程模型查询优化分析[J].计算机工程与设计,2017,38(2):409-413. [15]AALST W M P V D,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3-4):459-482. |
[1] | 张翕然, 刘万平, 龙华. 物联网僵尸网络病毒的传播动力学模型与分析 Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things 计算机科学, 2022, 49(6A): 738-743. https://doi.org/10.11896/jsjkx.210300212 |
[2] | 徐汝利, 黄樟灿, 谢秦秦, 李华峰, 湛航. 基于金字塔演化策略的彩色图像多阈值分割 Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy 计算机科学, 2022, 49(6): 231-237. https://doi.org/10.11896/jsjkx.210300096 |
[3] | 周俊, 王帅, 刘凡漪. 基于小波包分析的虹膜识别研究 Research on Iris Recognition Algorithm Based on Wavelet Packet Decomposition 计算机科学, 2021, 48(6A): 57-62. https://doi.org/10.11896/jsjkx.200900218 |
[4] | 刘峰, 王一帆, 杨杰, 周爱民, 齐佳音. 一种基于区块链的融合DKG与BLS的高阈值签名协议 Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS 计算机科学, 2021, 48(11): 46-53. https://doi.org/10.11896/jsjkx.210200129 |
[5] | 王静宇, 刘思睿. 大数据风险访问控制研究进展 Research Progress on Risk Access Control 计算机科学, 2020, 47(7): 56-65. https://doi.org/10.11896/jsjkx.190700157 |
[6] | 彭浩, 和丽芳. 基于改进树种算法的彩色图像多阈值分割 Multi-threshold Segmentation for Color Image Based on Improved Tree-seed Algorithm 计算机科学, 2020, 47(6A): 220-225. https://doi.org/10.11896/JsJkx.191000180 |
[7] | 曹义亲, 段也钰, 武丹. 基于WFSOA的2D-Otsu钢轨缺陷图像分割方法 2D-Otsu Rail Defect Image Segmentation Method Based on WFSOA 计算机科学, 2020, 47(5): 154-160. https://doi.org/10.11896/jsjkx.190200295 |
[8] | 程煜, 刘伟, 孙童心, 魏志刚, 杜薇. 近阈值电压下可容错的一级缓存结构设计 Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage 计算机科学, 2020, 47(4): 42-49. https://doi.org/10.11896/jsjkx.190300088 |
[9] | 刘云,尹传环,胡迪,赵田,梁宇. 基于循环神经网络的通信卫星故障检测 Communication Satellite Fault Detection Based on Recurrent Neural Network 计算机科学, 2020, 47(2): 227-232. https://doi.org/10.11896/jsjkx.190600147 |
[10] | 宋健,方贤文,王丽丽. 基于流程切的过程模型挖掘方法 Process Model Mining Method Based on Process Cut 计算机科学, 2019, 46(7): 315-321. https://doi.org/10.11896/j.issn.1002-137X.2019.07.048 |
[11] | 宋鑫,朱宗良,高银萍,苌道方. 动态阈值结合全局优化的船舶AIS轨迹在线压缩算法 Vessel AIS Trajectory Online Compression Algorithm Combining Dynamic Thresholding and Global Optimization 计算机科学, 2019, 46(7): 333-338. https://doi.org/10.11896/j.issn.1002-137X.2019.07.051 |
[12] | 刘长齐, 邵堃, 霍星, 范冬阳, 檀结庆. 基于加权质量评价函数的K-means图像分割算法 K-means Image Segmentation Algorithm Based on Weighted Quality Evaluation Function 计算机科学, 2019, 46(6A): 158-160. |
[13] | 刘晓东, 魏海平, 曹宇. 考虑网络拓扑结构变化的SIRS模型的建立与稳定性分析 Modeling and Stability Analysis for SIRS Model with Network Topology Changes 计算机科学, 2019, 46(6A): 375-379. |
[14] | 张阳峰, 韦仕鸿, 邓娜娜, 王文瑞. 基于小波降噪的振动传感器数据分析 Vibration Sensor Data Analysis Based on Wavelet Denoising 计算机科学, 2019, 46(6A): 537-539. |
[15] | 程珍, 林飞, 赵慧婷, 章益铭. 基于用户间干扰的分子通信模型的信道容量分析 Analysis of Channel Capacity of Molecular Communication Model Based on Inter-user Interference 计算机科学, 2019, 46(4): 112-117. https://doi.org/10.11896/j.issn.1002-137X.2019.04.018 |
|