Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 211000001-6.doi: 10.11896/jsjkx.211000001

• Big Data & Data Science • Previous Articles     Next Articles

Effective Low-frequency Path Mining Method for Information Flow of Networking Information-centric System of Systems

LIN Wen-xiang, LIU De-sheng   

  1. Space Engineering University Science and Technology on Complex Electronic System Simulation Laboratory,Beijing 101416,China
  • Online:2022-11-10 Published:2022-11-21
  • About author:LIN Wen-xiang,born in 1996,postgra-duate.His main research interests include system modelling and simulation,process mining.
    LIU De-sheng,born in 1976,associate professor.His main research interests include system modelling and simulation and so on.
  • Supported by:
    Basic Research Project of National Defense Science and Technology Key Laboratory(DXZT-JC-ZZ-2018-002,DXZT-JC-ZZ-2017-001).

Abstract: With the rapid development of information technology and network technology and their widespread use in military field,networking information-centric system of systems comes into being.The networking information-centric system of systems is dominated by information,its main manifestation is the information activity process.The rationality and efficiency of the information activity process directly affect the operational effectiveness of information in the combat system.The use of process mi-ning technology to discover information activity process models from information activity event logs can provide effective support for modelling,testing and enhancement of information activity processes.Simply filtering noise in logs through event frequency analysis can easily lead to the loss of valid low-frequency paths and reduce the accuracy of the mined information activity processes.Combining the special characteristics of military information activities and the effectiveness characteristics of information transfer,a structure aggregation degree based effective low frequency path mining algorithm is proposed.Simulation analysis shows that the method can successfully separate log noise and effective low frequency paths,which is important for mining real and effective information processes.

Key words: Process mining, Networking information-centric system of systems, Information process, Effective low frequency, Structure aggregation degree

CLC Number: 

  • TP391
[1]VAN DER AALST W M P,WEIJTERS T,MARUSTER L.Workflow mining:discovering process models from event logs [J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1128-1142.
[2]SURIADI S,ANDREWS R,TER HOFSTEDE A,et al.Event log imperfection patterns for process mining:Towards a systematic approach to cleaning event logs[J].Information Systems,2017(64):132-150.
[3]FMANNHARDT,MD LEONI,REIJERS H A,et al.Data-Driven Process Discovery-Revealing Conditional Infrequent Behavior from Event Logs[C]//International Conference on Advanced Information Systems Engineering.Cham:Springer,2017.
[4]CHEN Q,LU Y,POONS K.An Algorithm to Preserve Infre-quent Relations in Process Mining[C]//Application to Lab Tests Ordering Process.2020.
[5]WANG L L,FANG X W,ASARE E,et al.An Optimization Approach for Mining of Process Models with Infrequent Behaviors Integrating Data Flow and Control Flow[J].Scientific Programming,2021(1):1-17.
[6]CHAPELA-CAMPA D,MUCIENTES M,LAMAM.Discove-ring infrequent behavioral patterns in process models[C]//International Conference on Business Process Management.Cham:Springer,2017:324-340.
[7]LEEMANS S J J,FAHLAND D,VAN DER AALST W M P.Discovering block-structured process models from event logs-a constructive approach[C]//International conference on applications and theory of Petri nets and concurrency.Cham:Springer,2013:311-329.
[8]VAN ZELST S J,VAN DONGEN B F,VAN DER AALST W M P,et al.Discovering Relaxed Sound workflow nets using integer linear programming[J].Computing,2018,100(5):529-556.
[9]GAO Y N,FANG X W,WANG L L.Business process configuration optimization analysis based on behavioral tightness of Petri nets[J].Computer Science,2017,44(S1):539-542.
[10]CHAPELA-CAMPA D,MUCIENTES M,LAMA M.Simplifi-cation of complex process models by abstracting infrequent behaviour[C]//International Conference on Service-Oriented Computing.Cham:Springer,2019:415-430.
[11]GOEDERTIER S,MARTENS D,VANTHIENENJ,et al.Robust process discovery with artificial negative events[J].Journal of Machine Learning Research,2009,10:1305-1340.
[12]PONCE-DE-LEÓN H,CARMONA J,VANDEN BROUCKESK L M.Incorporating negative information in process discovery[C]//International Conference on Business Process Management.Cham:Springer,2016:126-143.
[13]ZHANG Y,LIU Y D,JI Z.Vector similarity measurementmethod[J].Acoustics Technology,2009,28(4):532-536.
[1] PAN Xiao-qin, LU Tian-liang, DU Yan-hui, TONG Xin. Overview of Speech Synthesis and Voice Conversion Technology Based on Deep Learning [J]. Computer Science, 2021, 48(8): 200-208.
[2] SHU Yun-feng and WANG Zhong-qing. Research on Chinese Patent Summarization Based on Patented Structure [J]. Computer Science, 2020, 47(6A): 45-48.
[3] WU Xiao-kun, ZHAO Tian-fang. Application of Natural Language Processing in Social Communication:A Review and Future Perspectives [J]. Computer Science, 2020, 47(6): 184-193.
[4] SONG Jian,FANG Xian-wen,WANG Li-li. Process Model Mining Method Based on Process Cut [J]. Computer Science, 2019, 46(7): 315-321.
[5] ZENG Jian-rong, ZHANG Yang-sen, ZHENG Jia, HUANG Gai-juan, CHEN Ruo-yu. Implementation Technology and Application of Web Crawler for Multi-data Sources [J]. Computer Science, 2019, 46(5): 304-309.
[6] Munina YUSUFU and Gulina YUSUFU. Repetitive Pattern Recognition Algorithms and Applications in Web Information Extraction and Clustering Analysis [J]. Computer Science, 2017, 44(Z11): 39-45.
[7] JI Cai-ying, DAI Fei, LI Tong and JIANG Xu-dong. Activity Pattern Mining in Software Development [J]. Computer Science, 2016, 43(6): 167-172.
[8] BAI Xue-cong and ZHU Yan. Process Mining Approach Based on Tabu Search Algorithm [J]. Computer Science, 2016, 43(4): 214-218.
[9] HUA Pei, FANG Xian-wen and LIU Xiang-wei. Method of Process Models Mining Based on Quasi Indirect Dependence [J]. Computer Science, 2016, 43(11): 94-97.
[10] FENG Yun-tian ZHANG Hong-jun HAO Wen-ning. Named Entity Recognition for Military Text [J]. Computer Science, 2015, 42(7): 15-18.
[11] JING Bo,LIU Ying and CHEN Geng. Research on Database Log Based on Petri Nets [J]. Computer Science, 2014, 41(6): 250-253.
[12] QIU Quan-qing,MIAO Duo-qian and ZHANG Zhi-fei. Named Entity Recognition on Chinese Microblog [J]. Computer Science, 2013, 40(6): 196-198.
[13] . Method to Identi行the Future Stocl} Investor Sentiment Orientation on Chinese Micro-blog [J]. Computer Science, 2012, 39(Z6): 249-252.
[14] YE Xiao-hu,LIU Fang-yu, XUE Gang. Mining Complex Structure Based on the Repetitive Task [J]. Computer Science, 2011, 38(Z10): 209-211.
[15] ZHAO Zhi-jun,SHEN Qiang,TANG Hui, FANG Xu-ming. Theory and Key Technologies of Architecture and Intelligent Information Processing for Internet of Things [J]. Computer Science, 2011, 38(8): 1-8.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!