Computer Science ›› 2019, Vol. 46 ›› Issue (7): 315-321.doi: 10.11896/j.issn.1002-137X.2019.07.048

• Interdiscipline & Frontier • Previous Articles     Next Articles

Process Model Mining Method Based on Process Cut

SONG Jian,FANG Xian-wen,WANG Li-li   

  1. (College of Mechanics and Optoelectronics Physics,Anhui University of Science and Technology,Huainan,Anhui 232001,China)
  • Received:2018-06-01 Online:2019-07-15 Published:2019-07-15

Abstract: The purpose of process mining is to mine the model that meets people’s needs from the event log in the mi-ning process of business process,so as to improve and optimize the process model.In previous studies,models were mined from frequent log,and low-frequency log was deleted directly,which makes the mined model incomplete and may cause a deadlock or other abnormalities.This paper proposed a process model mining method based on process cutting.The method mines the process model from the event log and segments the event log in the form of a process cutting,not only taking into account the frequent behaviors,but also the behaviors in the low-frequency mode.In particular,aiming at the proplem that the abnormal circular structure will cause abnormality for edge structure of the flow chart,the process cutting can handle it well.The model obtained by proposed method is more comprehensive and perfect,and the validity and accuracy of the model can be improved.The evaluation index was used to optimize the constructed model and the optimal model was obtained.Finally,the effectiveness of the method was verified by concrete examples.

Key words: Event log, Low frequency mode, Petri net, Process cut, Process mining

CLC Number: 

  • TP391.9
[1]VAN DER AALST W,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs[J].IEEE Transactions on Knowledge & Data Engineering,2004,16(9):1128-1142.<br /> [2]VAN DER AALST W M P.Process Mining:Discovery,Con- formance and Enhancement of Business Processes[M].Springer Publishing Company,Incorporated,2011.<br /> [3]VAN DER AALST W M P,VAN DONGEN B F,HERBST J,et al.Workflow mining:a survey of issues and approaches[J].Data & Knowledge Engineering,2003,47(2):237-267.<br /> [4]VAN DER AALST W M P,WEIJTERS A.Process mining:a research agenda[J].Computers in Industry,2004,53(3):231-244.<br /> [5]CONFORTI R,ROSA M L,HOFSTEDE A H M T.Filtering Out Infrequent Behavior from Business Process Event Logs[J].IEEE Transactions on Knowledge & Data Engineering,2017,29(2):300-314.<br /> [6]EICHST DT S,LINK A,HARRIS P,et al.Efficient implementation of a Monte Carlo method for uncertainty evaluation in dynamic measurements[J].Metrologia,2012,49(3):401.<br /> [7]POURMASOUMI A,KAHANI M,BAGHERI E.Mining variable fragments from process event logs[J].Information Systems Frontiers,2017,19(6):1423-1443.<br /> [8]WEN L,VAN DER AALST W M P,WANG J,et al.Mining process models with non-free-choice constructs[J].Data Mining and Knowledge Discovery,2007,15(2):145-180.<br /> [9]BUSI N,PINNA G,VAN DER AALST W.An Iterative Algorithm for Applying the Theory of Regions in Process Mining[R].Department of Technology Management,Eindhoven University of Technology,2007:16-38.<br /> [10]YZQUIERDO-HERRERA R,SILVERIO-CASTRO R,LAZO- CORT S M.Sub-process discovery:opportunities for process diagnotics[M]∥Enterprise Information Systems of the Future.Berlin Heidelberg:Springer,2013:48-57.<br /> [11]BOUSHABA S,KABBAJ M I,BAKKOURY Z.Process disco- very:Automated approach for block discovery[C]∥2014 International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE).IEEE,2014:1-8.<br /> [12]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Discovering Infrequent Behavioral Patterns in Process Models[C]∥International Conference on Business Process Management.Springer,Cham,2017:324-340.<br /> [13]吴哲辉.Petri网理论[M].北京:机械工业出版社,2006:6-22.<br /> [14]WEIDLICH M,POLYVYANYY A,DESAI N,et al.Process Compliance Measurement Based On Behavioral Profiles [J].Advanced Information Systems Engineering,2010,6051:499-514.<br /> [15]KUNZE M,WEIDLICH M,WESKEM.Querying process mo- dels by behavior inclusion[J].Software & Systems Modeling,2015,14(3):1105-1125.<br /> [16]WEIDLICH M,MENDLING J,WESKE M.Efficient Consistency Measurement Based on Behavioural Profiles of Process Mo-dels[J].IEEE Transactions on Software Engineering,2011,37(3):410-429.
[1] LI Qing, LIU Wei, GUAN Meng-zhen, DU Yu-yue, SUN Hong-wei. Modeling and Analysis of Emergency Decision Making Based on Logical Probability GamePetri Net [J]. Computer Science, 2022, 49(4): 294-301.
[2] TAO Xiao-yan, YAN Chun-gang, LIU Guan-jun. Dynamic Data Refining Strategy for Soundness Verification Based on WFT-net [J]. Computer Science, 2021, 48(7): 99-104.
[3] LAI Xiang-wei, ZHENG Wan-bo, WU Yan-qing, XIA Yun-ni, RAN Qi-hua, DONG Yin-huan. Task Collaborative Process Network Model and Time Analysis of Mine Accident Emergency Rescue Digital Plan [J]. Computer Science, 2021, 48(6A): 596-602.
[4] NING Yu-hui, YAO Xi. Design and Implementation of Emergency Command System [J]. Computer Science, 2021, 48(6A): 613-618.
[5] WANG Wu-song, FANG Huan, ZHENG Xue-wen. Process Variants Merging Method Based on Group-fair Control Flow Structure [J]. Computer Science, 2021, 48(12): 170-180.
[6] YANG Hao-ran, FANG Xian-wen. Business Process Consistency Analysis of Petri Net Based on Probability and Time Factor [J]. Computer Science, 2020, 47(5): 59-63.
[7] SUN Shu-ya, FANG Huan, FANG Xian-wen. Log-induced Morphological Fragments Process Clustering Method [J]. Computer Science, 2019, 46(8): 71-77.
[8] SU Qing,LIN Hao,HUANG Jian-feng,HE Fan,LIN Zhi-yi. Study on Dynamic-graph Watermarking Based on Petri Net Coding [J]. Computer Science, 2019, 46(7): 120-125.
[9] HAO Hui-jing, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Analysis of Effective Low-frequency Behavioral Patterns Based on Petri Net Behavior Closeness [J]. Computer Science, 2019, 46(2): 321-326.
[10] SONG Jian, FANG Xian-wen, WANG Li-li, LIU Xiang-wei. Method of Mining Hidden Transition of Business Process Based on Behavior Profiles [J]. Computer Science, 2019, 46(12): 334-340.
[11] CAO Rui, FANG Xian-wen, WANG Li-li. Method of Mining Conditional Infrequent Behavior Based on Communication Behavior Profile [J]. Computer Science, 2018, 45(8): 310-314.
[12] HE Lu-lu, FANG Huan. Change Propagation Method of Service-oriented Business Process Model with Data Flows Based on Petri Net [J]. Computer Science, 2018, 45(6A): 545-548.
[13] ZHAO Pei-hai, WANG Mi-mi. Consistency Detction Method of Models Based on Three-dimensional Behavior Relation Graph [J]. Computer Science, 2018, 45(6): 156-160.
[14] GAO Ya-nan, FANG Xian-wen and WANG Li-li. Optimized Analysis of Business Process Configuration Based on Petri Net Behavior Closeness [J]. Computer Science, 2017, 44(Z6): 539-542.
[15] ZHOU Jie and LI Wen-jing. Research on Parallel Algorithm of Petri Net Based on Three-layer Mixed Programming Model [J]. Computer Science, 2017, 44(Z11): 586-591.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!