Computer Science ›› 2018, Vol. 45 ›› Issue (8): 310-314.doi: 10.11896/j.issn.1002-137X.2018.08.056

• Interdiscipline & Frontier • Previous Articles    

Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile

CAO Rui, FANG Xian-wen, WANG Li-li   

  1. College of Mathematics and Big Data,Anhui University of Science and Technology,Huainan,Anhui 232001,China
  • Received:2017-07-24 Online:2018-08-29 Published:2018-08-29

Abstract: Conditional infrequent behavior refers to the behavior recorded by infrequent event traces with attribute va-lues.Mining the conditional infrequent behavior from the event log is one of the main contents of business process optimization.The existing methods remove low frequency behavior,but take less consideration of the conditional infrequent behavior under the perspective of data-flow between different module nets.Based on this,the paper presented a method of mining conditional infrequent behavior based on communication behavior profile.Based on the communication beha-vior profile theory between module nets,firstly,through a given business process source model,its executable event log is searched and the infrequent event traces are found,adding the relevant attributes and attribute values to the infrequent event traces to get the conditional infrequent traces.Secondly,by calculating condition dependent values of the communication features of different module nets,whether the conditional infrequent traces are deleted or retained can be determined.The optimized event log is given,and the business process optimization communication model is mined.Finally,the feasibility of the method is verified by a simulation.

Key words: Business process model, Communication behavioral profile, Infrequent behavior, Module net, Noise, Petri net

CLC Number: 

  • TP391.9
[1]VAN DER AALST W M P.Process miningdata science in action(Second Edition)[M].Springer,2016.
[2]WEERDT J D,BACKER M D,VANTHIENEN J,et al.Amulti-dimensional quality assessment of state-of-the-art process discovery algorithms using real-life event logs[J].Information Systems,2012,37(7):654-676.
[3]SURIADI S,ANDREWS R,TER HOFSTEDE A H M,et al.Event log imperfection patterns for process mining:Towards a systematic approach to cleaning event logs[J].Information Systems,2017,64(C):132-150.
[4]LIESAPUTRA V,YONGCHAREON S,CHAISIRI S.Efficient process model discovery using maximal pattern mining[C]∥International Conference on Business Process Management.Springer,Cham,2015:441-456.
[5]PONCE-DE-LEÓN H,CARMONA J,VANDEN BROUCKE S K L M.Incorporating negative information in process discovery[C]∥International Conference on Business Process Management.Springer,2015:126-143.
[6]BELLODI E,RIGUZZI F,LAMMA E.Statistical relational lea-rning for workflow mining[J].Intelligent Data Analysis,2016,20(3):515-541.
[7]CONFORTI R,ROSA M L,HOFSTEDE T,et al.Filtering out infrequent behavior from business process event logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2),300-314.
[8]ZELST S J V,DONGEN B F V,AALST W M P V D,et al.Discovering relaxed sound workflow nets using integer linear programming[J].Computing,2017(4).
[9]LEEMANS S J J,FAHLAND D,VAN DER AALST W M P.Discovering block-structured process models from event logs containing infrequent behaviour[C]∥International Conference on Business Process Management.Springer,Cham,2013:66-78.
[10]VAN DER WERF J M,KAATS E.Discovery of functional architectures from event logs[C]∥PNSE@ Petri Nets.2015:227-243.
[11]MANNHARDT F,DE LEONI M,REIJERS H A,et al.Data-driven process discovery-revealing conditional infrequent beha-vior from event logs[C]∥International Conference on Advanced Information Systems Engineering.Springer,Cham,2017:545-560.
[12]VAN DER AALST W M P,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs[J].IEEE Transactions on Knowledge Data Engineering,2004,16(9):1128-1142.
[1] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[2] YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192.
[3] TANG Chao-chen, QIU Hong-bing, LIU Xin, TANG Qing-hua. Angle Estimation of Coherent MIMO Radar Under the Condition of Non-uniform Noise [J]. Computer Science, 2022, 49(5): 262-265.
[4] LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301.
[5] ZHENG Jian-wei, HUANG Juan-juan, QIN Meng-jie, XU Hong-hui, LIU Zhi. Hyperspectral Image Denoising Based on Non-local Similarity and Weighted-truncated NuclearNorm [J]. Computer Science, 2021, 48(9): 160-167.
[6] TAO Xing-peng, XU Hong-hui, ZHENG Jian-wei, CHEN Wan-jun. Hyperspectral Image Denoising Based on Nonconvex Low Rank Matrix Approximation and TotalVariation Regularization [J]. Computer Science, 2021, 48(8): 125-133.
[7] TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104.
[8] ZHAO Min, LIU Jing-lei. Semi-supervised Clustering Based on Gaussian Fields and Adaptive Graph Regularization [J]. Computer Science, 2021, 48(7): 137-144.
[9] HUANG Xue-bing, WEI Jia-yi, SHEN Wen-yu, LING Li. MR Image Enhancement Based on Adaptive Weighted Duplicate Filtering and Homomorphic Filtering [J]. Computer Science, 2021, 48(6A): 21-27.
[10] LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602.
[11] NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618.
[12] LIN Yun, HUANG Zhen-hang, GAO Fan. Diffusion Variable Tap-length Maximum Correntropy Criterion Algorithm [J]. Computer Science, 2021, 48(5): 263-269.
[13] TENG Jun-yuan, GAO Meng, ZHENG Xiao-meng, JIANG Yun-song. Noise Tolerable Feature Selection Method for Software Defect Prediction [J]. Computer Science, 2021, 48(12): 131-139.
[14] WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180.
[15] ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!