1,223 Hits in 5.0 sec

Event Log Preprocessing for Process Mining: A Review

Heidy M. Marin-Castro, Edgar Tello-Leal
2021 Applied Sciences  
Process Mining allows organizations to obtain actual business process models from event logs (discovery), to compare the event log or the resulting process model in the discovery task with the existing  ...  reference model of the same process (conformance), and to detect issues in the executed process to improve (enhancement).  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app112210556 fatcat:lls2qf6llnddxbdnego2okk2ya

Automated discovery of business process simulation models from event logs

Manuel Camargo, Marlon Dumas, Oscar González-Rojas
2020 Decision Support Systems  
However, the discovery, validation, and tuning of business process simulation models is cumbersome and error-prone.  ...  observed in the log.  ...  Replay Event Log. Once a BPMN process model is obtained, the next step is to replay each trace in the repaired event log against the process model.  ... 
doi:10.1016/j.dss.2020.113284 fatcat:7fdqv5nstvg3nbxxgpgngeo2vq

Improving Documentation by Repairing Event Logs [chapter]

Andreas Rogge-Solti, Ronny S. Mans, Wil M. P. van der Aalst, Mathias Weske
2013 Lecture Notes in Business Information Processing  
In this paper, we make use of process knowledge captured in process models, and provide a method to repair missing entries in the logs.  ...  In enterprises, business process models are used for capturing as-is business processes.  ...  We call the documentation of activities in a business process event logs.  ... 
doi:10.1007/978-3-642-41641-5_10 fatcat:oisb5kwy2ba6zoqtptokeng4he

Automated Discovery of Business Process Simulation Models from Event Logs [article]

Manuel Camargo, Marlon Dumas, Oscar González-Rojas
2020 arXiv   pre-print
in the log.  ...  This, in turn, allows analysts to compare alternative options to improve a business process.  ...  The proposed method takes as input an event log, automatically discovers a process model, aligns the log to the model (and repairs it accordingly), and applies a range of replay and organizational mining  ... 
arXiv:1910.05404v3 fatcat:uis6v5ugw5endjccrqs5zmplau

Learning Accurate Business Process Simulation Models from Event Logs via Automated Process Discovery and Deep Learning [article]

Manuel Camargo, Marlon Dumas, Oscar González-Rojas
2022 arXiv   pre-print
timestamped event sequences.  ...  Data-Driven Simulation (DDS) methods leverage process mining techniques to learn process simulation models from event logs.  ...  This task differs in two 2 We used LSTM networks as the core of our predictive models since they are a well-known and proven technology to handle sequences, as the nature of a business process event log  ... 
arXiv:2103.11944v2 fatcat:njyz6ymapjdopldcxnquvwqwui

Discovering generative models from event logs: data-driven simulation vs deep learning

Manuel Camargo, Marlon Dumas, Oscar González-Rojas
2021 PeerJ Computer Science  
In the context of business processes, a generative model creates new execution traces from a set of historical traces, also known as an event log.  ...  Two types of generative business process models have been developed in previous work: data-driven simulation models and deep learning models.  ...  Reproducibility package for "Discovering Generative Models from Event Logs: Data-driven Simulation vs Deep Learning" (Version 0.1.0). Zenodo. DOI 10.5281/zenodo.4699983.  ... 
doi:10.7717/peerj-cs.577 fatcat:r6szwnrdsfgjfgjdeilxcnlg7q

Blockchain support for execution, monitoring and discovery of inter-organizational business processes

Miguel Morales-Sandoval, José A. Molina, Heidy M. Marin-Castro, Jose Luis Gonzalez-Compean
2021 PeerJ Computer Science  
IOBP executes, and (iii) produces useful event log in XES and CSV format for the discovery and conformance checking tasks in process mining.  ...  We present a method that (i) ensures the business rules for the correct execution and monitoring of the IOBP by collaborators, (ii) creates the event log, with data cleaning integrated, at the time the  ...  The behavior observed in the business process is revealed from models automatically constructed from the event logs.  ... 
doi:10.7717/peerj-cs.731 pmid:34712800 pmcid:PMC8507485 fatcat:733a2ckoybdexhhokttytqwfzu

Discovering Generative Models from Event Logs: Data-driven Simulation vs Deep Learning [article]

Manuel Camargo, Marlon Dumas, Oscar Gonzalez-Rojas
2020 arXiv   pre-print
In the context of business processes, a generative model creates new execution traces from a set of historical traces, also known as an event log.  ...  Two families of generative process simulation models have been developed in previous work: data-driven simulation models and deep learning models.  ...  Introduction An event log is a collection of execution traces of a business process.  ... 
arXiv:2009.03567v1 fatcat:qxtzywl2kve4jjfqbg4o65o7va

Inferring Unobserved Events in Systems With Shared Resources and Queues [article]

Dirk Fahland, Vadim Denisov, Wil. M.P. van der Aalst
2021 arXiv   pre-print
To understand and analyze the behavior and performance of processes with shared resources, we aim to reconstruct bounds for timestamps of events in a case that must have happened but were not recorded  ...  We formulate and solve the problem by systematically introducing multi-entity concepts in event logs and process models.  ...  Acknowledgements The research leading to these results has received funding from Vanderlande Industries in the project "Process Mining in Logistics".  ... 
arXiv:2103.00167v3 fatcat:bx3ihvuzirbvzajuextgupk4sa

Automated simulation and verification of process models discovered by process mining

Ivona Zakarija, Frano Škopljanac-Mačina, Bruno Blašković
2020 Automatika  
Our proposed Inductive machine learning method was used to build business process models based on actual event log data obtained from a hotel's Property Management System (PMS).  ...  Process mining explores underlying processes hidden in the event data generated by various devices.  ...  Acknowledgements We would like to thank Romualdo Miljak who prepared the event log CSV file used in this paper and provided domain expertise.  ... 
doi:10.1080/00051144.2020.1734716 fatcat:rtzcwcc2wbfqrbzuzdkrozxyu4

Process Mining-Driven Analysis of the COVID19 Impact on the Vaccinations of Victorian Patients [article]

Adriano Augusto, Timothy Deitz, Noel Faux, Jo-Anne Manski-Nankervis, Daniel Capurro
2021 arXiv   pre-print
In this paper, we report the analysis of an event log recording more than 30 million events capturing the general practice healthcare processes of more than one million patients in Victoria--Australia-  ...  Although process mining was originally conceived to facilitate business process management activities, research studies have shown the benefit of leveraging process mining tools in different contexts,  ...  (and the need) for additional research addressing the problem of automated repairing and the cleaning of event log data errors -especially timestamps.  ... 
arXiv:2112.04634v2 fatcat:q4n2wtsrsffvpbhzoqkhewuoei

Enhancing Event Log Quality: Detecting and Quantifying Timestamp Imperfections [chapter]

Dominik Andreas Fischer, Kanika Goel, Robert Andrews, Christopher Gerhard Johannes van Dun, Moe Thandar Wynn, Maximilian Röglinger
2020 Lecture Notes in Computer Science  
Timestamp information recorded in event logs plays a crucial role in uncovering meaningful insights into business process performance and behaviour via Process Mining techniques.  ...  Thus, the quality of timestamps in an event log should be evaluated thoroughly before the log is used as input for any Process Mining activity.  ...  We would like to thank Queensland's Motor Accident Insurance Commission and the Queensland University of Technology for allowing us access to their datasets.  ... 
doi:10.1007/978-3-030-58666-9_18 fatcat:xl2zuxxftjh4nl66i7jgkmqgam

Handling Instance Spanning Constraints in Compliance Management

Ruhul Amin
2019 ABC Journal of Advanced Research  
ISC can also occur from process execution logs. Business execution store execution information for the process instance and, consequently, the characteristics of the execution logs.  ...  Take, for instance, the bundling and unbundling of cargo from various logistics processes or the dependence of various examinations in medical treatment systems.  ...  The aim of the third type of process mining is to either extend or repair the existent model through data coming from the event log.  ... 
doi:10.18034/abcjar.v8i2.522 fatcat:pfmvjoqwazaw5nvhwrvzddh6ke

Deducing Case IDs for Unlabeled Event Logs [chapter]

Dina Bayomie, Iman M. A. Helal, Ahmed Awad, Ehab Ezat, Ali ElBastawissi
2016 Lecture Notes in Business Information Processing  
Event logs are invaluable sources of knowledge about the actual execution of processes.  ...  This requires a manual preprocessing of the log to assign case ID to events in the log.  ...  The generation process avoids any unnecessary event logs, to prevent both redundant cases and duplicated timestamps in the same labeled event log.  ... 
doi:10.1007/978-3-319-42887-1_20 fatcat:vgv6rvi6eff6ddtulmekvaffai

Wanna improve process mining results?

R.P. Jagadeesh Chandra Bose, Ronny S. Mans, Wil M.P. van der Aalst
2013 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)  
of event log quality issues (e.g., problems related to timestamps in event logs, imprecise activity names, and missing events).  ...  of process characteristics in event logs).  ...  Acknowledgements This research is supported by the Dutch Technology Foundation STW, applied science division of NWO and the Technology Program of the Ministry of Economic Affairs.  ... 
doi:10.1109/cidm.2013.6597227 dblp:conf/cidm/BoseMA13 fatcat:i2pwdqwzhreanc2xepflqxokyy
« Previous Showing results 1 — 15 out of 1,223 results