计算机科学 ›› 2019, Vol. 46 ›› Issue (2): 321-326.doi: 10.11896/j.issn.1002-137X.2019.02.049

• 交叉与前沿 • 上一篇    下一篇

基于Petri网行为紧密度的有效低频行为模式分析

郝惠晶, 方贤文, 王丽丽, 刘祥伟   

  1. 安徽理工大学数学与大数据学院 安徽 淮南232001
  • 收稿日期:2018-01-17 出版日期:2019-02-25 发布日期:2019-02-25
  • 通讯作者: 方贤文(1975-),男,博士,教授,主要研究方向为Petri网和可信软件,E-mail:280060673@qq.com
  • 作者简介:郝惠晶(1993-),女,硕士生,主要研究方向为Petri网,E-mail:609795483@qq.com;王丽丽(1982-),女,硕士,副教授,主要研究方向为业务流程分析和软件认证;刘祥伟(1977-),女,硕士,教授,主要研究方向为业务流程管理。
  • 基金资助:
    本文受国家自然科学基金项目(61572035,61402011),安徽省自然科学基金(1508085MF111,1608085QF149),安徽省高校自然科学基金重点项目(KJ2016A208),安徽理工大学研究生创新基金项目(2017CX2113)资助。

Analysis of Effective Low-frequency Behavioral Patterns Based on Petri Net Behavior Closeness

HAO Hui-jing, FANG Xian-wen, WANG Li-li, LIU Xiang-wei   

  1. College of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Anhui 232001,China
  • Received:2018-01-17 Online:2019-02-25 Published:2019-02-25

摘要: 低频行为模式分析是流程管理的重要内容之一,有效区分低频日志和噪音日志在业务流程过程挖掘中显得尤为重要。目前已有的研究大部分是将流程模型中的低频行为当作噪音直接过滤,但有些低频行为对模型是有效的。文中提出了基于Petri网行为紧密度的有效低频模式分析方法。首先,根据给定的事件日志建立合理的流程模型;然后,通过迭代扩展初始模式来发现流程模型中的所有低频日志序列,并在此基础上计算日志与模型的行为距离向量,利用日志与模型的行为紧密度找出有效的低频行为模式;最后,通过实例分析验证了所提方法的可行性。

关键词: 低频模式, 事件日志, 行为紧密度, 阈值

Abstract: Low-frequency behavior pattern analysis is one of the important contents of process management.It is very important to distinguish low-frequency logs and noise logs effectively in business process mining.At present,most of the researches have dealt with the direct filtering of low-frequency behavior in the process model as noise,but some low frequency behavior are valid for the model.This paper presented an effective low-frequency pattern analysis method based on Petri nets’ behavioral closeness.Firstly,a reasonable process model is established according to the given event log.Then,all low-frequency log sequences in the process model are found by iteratively expanding the initial patterns.Based on this,the behavioral distance vectors of the log and the model are calculated,and thebehavior closenessof log and model is used to find the effective low-frequency behavioral pattern.Finally,an example is given to verify the feasibility of this method.

Key words: Behavior closeness, Event log, Low frequency patterns, Threshold

中图分类号: 

  • TP391.9
[1]VZQUEZ-BARREIROS B,MUCIENTES M,LAMA M.ProDiGen:Mining complete,precise and minimal structure process models with a genetic algorithm[J].Information Sciences,2015,294:315-333.
[2]LEEMANS S J J,FAHLAND D,AALST W M P V D.Discovering Block-Structured Process Models from Event Logs-A Constructive Approach[M]∥Application and Theory of Petri Nets and Concurrency.Springer Berlin Heidelberg,2013:311-329.
[3]TAX N,SIDOROVA N,HAAKMA R,et al.Mining local pro- cess models[J].Journal of Innovation in Digital Ecosystems,2016,3(2):183-196.
[4]SURIADI S,MANS R S,WYNN M T,et al.Measuring Patient Flow Variations:A Cross-Organisational Process Mining Approach[M]∥Asia Pacific Business Process Management.Springer International Publishing,2014:43-58.
[5]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314.
[6]MANNHARDT F,LEONI M D,REIJERS H A,et al.Data- Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]∥International Conference on Advanced Information Systems Engineering.Springer,Cham,2017:545-560.
[7]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient Process Model Discovery Using Maximal Pattern Mining[C]∥International Conference on Business Process Management.Springer,Cham,2015:441-456.
[8]LU X,FAHLAND D,BIGGELAAR F J H M V D,et al.Detecting Deviating Behaviors Without Models[C]∥International Conference on Business Process Management.Springer,Cham,2015:126-139.
[9]LEEMANS S J J,FAHLAND D,AALST W M P V D.Discovering Block-Structured Process Models from Event Logs Containing Infrequent Behaviour[C]∥International Conference on Business Process Management.Springer,Cham,2013:66-78.
[10]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discovering Infrequent Behavioral Patterns in Process Models[C]∥International Conference on Business Process Management.Springer,Cham,2017:324-340.
[11]JENSEN M T.Improving robustness and flexibility of tardiness and total flow-time job shops using robustness measures[J].Applied Soft Computing,2001,1(1):35-52.
[12]WU Z H.Petri nets theory [M].Beijing:Mechanical Industry Press,2006:6-22.(in Chinese)
吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.
[13]GAO Y N,FANG X W,WANG L L.Optimized analysis of business process configuration based on Petri net behavior closeness[J].Computer Science,2017,44(S1):539-542.(in Chinese)
高雅楠,方贤文,王丽丽.基于Petri网行为紧密度的业务流程配置优化分析[J].计算机科学,2017,44(S1):539-542.
[14]CHEN L N,FANG X W,LIU X W.Optimized analysis of business process model query of Petri net behavior inclusion[J].Computer Engineering and Design,2017,38(2):409-413.(in Chinese)
陈丽娜,方贤文,刘祥伟.Petri网行为包含的业务流程模型查询优化分析[J].计算机工程与设计,2017,38(2):409-413.
[15]AALST W M P V D,DUMAS M,GOTTSCHALK F,et al.Preserving correctness during business process model configuration[J].Formal Aspects of Computing,2010,22(3-4):459-482.
[1] 张翕然, 刘万平, 龙华.
物联网僵尸网络病毒的传播动力学模型与分析
Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things
计算机科学, 2022, 49(6A): 738-743. https://doi.org/10.11896/jsjkx.210300212
[2] 徐汝利, 黄樟灿, 谢秦秦, 李华峰, 湛航.
基于金字塔演化策略的彩色图像多阈值分割
Multi-threshold Segmentation for Color Image Based on Pyramid Evolution Strategy
计算机科学, 2022, 49(6): 231-237. https://doi.org/10.11896/jsjkx.210300096
[3] 周俊, 王帅, 刘凡漪.
基于小波包分析的虹膜识别研究
Research on Iris Recognition Algorithm Based on Wavelet Packet Decomposition
计算机科学, 2021, 48(6A): 57-62. https://doi.org/10.11896/jsjkx.200900218
[4] 刘峰, 王一帆, 杨杰, 周爱民, 齐佳音.
一种基于区块链的融合DKG与BLS的高阈值签名协议
Blockchain-based High-threshold Signature Protocol Integrating DKG and BLS
计算机科学, 2021, 48(11): 46-53. https://doi.org/10.11896/jsjkx.210200129
[5] 王静宇, 刘思睿.
大数据风险访问控制研究进展
Research Progress on Risk Access Control
计算机科学, 2020, 47(7): 56-65. https://doi.org/10.11896/jsjkx.190700157
[6] 彭浩, 和丽芳.
基于改进树种算法的彩色图像多阈值分割
Multi-threshold Segmentation for Color Image Based on Improved Tree-seed Algorithm
计算机科学, 2020, 47(6A): 220-225. https://doi.org/10.11896/JsJkx.191000180
[7] 曹义亲, 段也钰, 武丹.
基于WFSOA的2D-Otsu钢轨缺陷图像分割方法
2D-Otsu Rail Defect Image Segmentation Method Based on WFSOA
计算机科学, 2020, 47(5): 154-160. https://doi.org/10.11896/jsjkx.190200295
[8] 程煜, 刘伟, 孙童心, 魏志刚, 杜薇.
近阈值电压下可容错的一级缓存结构设计
Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage
计算机科学, 2020, 47(4): 42-49. https://doi.org/10.11896/jsjkx.190300088
[9] 刘云,尹传环,胡迪,赵田,梁宇.
基于循环神经网络的通信卫星故障检测
Communication Satellite Fault Detection Based on Recurrent Neural Network
计算机科学, 2020, 47(2): 227-232. https://doi.org/10.11896/jsjkx.190600147
[10] 宋健,方贤文,王丽丽.
基于流程切的过程模型挖掘方法
Process Model Mining Method Based on Process Cut
计算机科学, 2019, 46(7): 315-321. https://doi.org/10.11896/j.issn.1002-137X.2019.07.048
[11] 宋鑫,朱宗良,高银萍,苌道方.
动态阈值结合全局优化的船舶AIS轨迹在线压缩算法
Vessel AIS Trajectory Online Compression Algorithm Combining Dynamic Thresholding and Global Optimization
计算机科学, 2019, 46(7): 333-338. https://doi.org/10.11896/j.issn.1002-137X.2019.07.051
[12] 刘长齐, 邵堃, 霍星, 范冬阳, 檀结庆.
基于加权质量评价函数的K-means图像分割算法
K-means Image Segmentation Algorithm Based on Weighted Quality Evaluation Function
计算机科学, 2019, 46(6A): 158-160.
[13] 刘晓东, 魏海平, 曹宇.
考虑网络拓扑结构变化的SIRS模型的建立与稳定性分析
Modeling and Stability Analysis for SIRS Model with Network Topology Changes
计算机科学, 2019, 46(6A): 375-379.
[14] 张阳峰, 韦仕鸿, 邓娜娜, 王文瑞.
基于小波降噪的振动传感器数据分析
Vibration Sensor Data Analysis Based on Wavelet Denoising
计算机科学, 2019, 46(6A): 537-539.
[15] 程珍, 林飞, 赵慧婷, 章益铭.
基于用户间干扰的分子通信模型的信道容量分析
Analysis of Channel Capacity of Molecular Communication Model Based on Inter-user Interference
计算机科学, 2019, 46(4): 112-117. https://doi.org/10.11896/j.issn.1002-137X.2019.04.018
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!