Filters








20,458 Hits in 8.2 sec

Evaluating Conformance Measures in Process Mining using Conformance Propositions (Extended version) [article]

Anja F. Syring and Niek Tax and Wil M.P. van der Aalst
2019 arXiv   pre-print
To address these problems, we formulate 21 conformance propositions and we use these propositions to evaluate current and existing conformance measures.  ...  Additionally, this paper serves as an overview of the conformance checking measures that are available in the process mining area.  ...  Furthermore, we used the propositions to evaluate currently existing conformance measures.  ... 
arXiv:1909.02393v1 fatcat:nf4n4er76nccnm2vh4me4kbnpq

Process Mining for Quality Improvement

Sara Dahlin, Henrik Eriksson, Hendry Raharjo
2019 Quality Management in Health Care  
Process mining offers ways to discover patient flow, check how actual processes conform to a standard, and use data to enhance or improve processes.  ...  Process mining has been used in healthcare for about a decade, however, with limited focus on quality improvement.  ...  [35] Overall, we propose that research is needed on how the HIS in general, and process mining in particular can be used for developing measurement systems that can be used for quality improvement.  ... 
doi:10.1097/qmh.0000000000000197 fatcat:f74drgy4trefpne4pcgoxggtzy

A Five-Level Framework for Research on Process Mining

Jan vom Brocke, Mieke Jans, Jan Mendling, Hajo A. Reijers
2021 Business & Information Systems Engineering  
Conformance checking techniques identify and measure the discrepancies between model and log.  ...  In this way, measures can be identified to speed up the process, save costs, improve quality, and extend flexibility.  ... 
doi:10.1007/s12599-021-00718-8 fatcat:5d2wokmkgjdmfoi2hwnjr6t2um

All That Glitters Is Not Gold: Towards Process Discovery Techniques with Guarantees [article]

Jan Martijn E. M. van der Werf, Artem Polyvyanyy, Bart R. van Wensveen, Matthieu Brinkhuis, Hajo A. Reijers
2020 arXiv   pre-print
However, existing process discovery algorithms do not guarantee this relationship. We demonstrate this by using a range of quality measures for both event data and discovered process models.  ...  We will also use these stages to reflect on the state of the art, which shows the need to move forward in our thinking about algorithmic process discovery.  ...  Artem Polyvyanyy was in part supported by the Australian Research Council project DP180102839.  ... 
arXiv:2012.12764v1 fatcat:yimefap5jvfrfm2rrhxypzdtaa

Conformance Checking Using Activity and Trace Embeddings [chapter]

Jari Peeperkorn, Seppe vanden Broucke, Jochen De Weerdt
2020 Lecture Notes in Business Information Processing  
Conformance checking describes process mining techniques used to compare an event log and a corresponding process model.  ...  Our novel conformance checking approach applies the Word Mover's Distance to the activity embeddings of traces in order to measure fitness and precision.  ...  Evaluating the algorithm with the recently proposed Conformance Propositions [30] , would also help to evaluate the quality of the technique.  ... 
doi:10.1007/978-3-030-58638-6_7 fatcat:wqyj3ye7rfdktc5jpqqcrotd5q

Multi-Dimensional Fraud Detection Metrics in Business Processes and their Application

Badr Omair, Ahmad Alturki
2020 International Journal of Advanced Computer Science and Applications  
It is expected that the stakeholders involved in PBF detection will use the metrics established in this work in their practice to increase the effectiveness of the PBF detection process.  ...  To evaluate their utility, the application of the metrics was undertaken using illustrative scenarios, and a real example of the implementation of the metrics was provided.  ...  In addition, in order to evaluate the utility of every developed metric, an illustrative scenario was used [16] .  ... 
doi:10.14569/ijacsa.2020.0110968 fatcat:yohdtb7rjba7por2erjhcp2nqy

Finding low-tension communities [chapter]

Esther Galbrun, Behzad Golshan, Aristides Gionis, Evimaria Terzi
2017 Proceedings of the 2017 SIAM International Conference on Data Mining  
Our experimental evaluation in a number of social networks reveals the efficacy and efficiency of our methods.  ...  We adopt a model where each individual starts with a latent profile and arrives to a conformed profile through a dynamic conformation process, which takes into account the individual's social interaction  ...  Evaluation measures.  ... 
doi:10.1137/1.9781611974973.38 dblp:conf/sdm/GalbrunGGT17 fatcat:ud2fk3qxb5hk5oegjemcwxuaz4

The Dicode Data Mining Services [chapter]

Natalja Friesen, Max Jakob, Jörg Kindermann, Doris Maassen, Axel Poigné, Stefan Rüping, Daniel Trabold
2014 Studies in Big Data  
Rserve is used by Taverna (see 3.4) for evaluation of R blocks.  ...  Data pre-processing As described in D.3.1.1 "The Dicode Data Mining Framework", data pre-processing features several operations which will be part of more complex components.  ...  Conformance classes Interface NotificationConsumer notify A NotificationProducer may produce a notify message containing one or more notifications.  ... 
doi:10.1007/978-3-319-02612-1_5 fatcat:wgf7zird6bbqten34ekgau4fm4

Process Mining for Six Sigma

Teun Graafmans, Oktay Turetken, Hans Poppelaars, Dirk Fahland
2020 Business & Information Systems Engineering  
To address this gap, the Process Mining for Six Sigma (PMSS) guideline has been developed to support organizations in systematically using process mining techniques aligned with the DMAIC (Define-Measure-Analyze-Improve-Control  ...  The literature acknowledges the potential benefits of using process mining techniques in Six Sigmabased process improvement initiatives.  ...  If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly  ... 
doi:10.1007/s12599-020-00649-w fatcat:ldbzbmomyne4lnd7ms7e6qf5om

Finding low-tension communities [article]

Esther Galbrun and Behzad Golshan and Aristides Gionis and Evimaria Terzi
2017 arXiv   pre-print
Our experimental evaluation in a number of social networks reveals the efficacy and efficiency of our methods.  ...  We adopt a model where each individual starts with a latent profile and arrives to a conformed profile through a dynamic conformation process, which takes into account the individual's social interaction  ...  Evaluation measures.  ... 
arXiv:1701.05352v1 fatcat:kb7rh7adjjg57neassplte6zge

Ontology Based Data Analysing Approach for Actionable Knowledge Discovery

S.Antoinette Aroul Jeyanthi, Dr.S Pannirselvam
2014 IOSR Journal of Computer Engineering  
In Data Mining, the effectiveness of association rules is limited by the huge quantity of delivered rules. In this manuscript, we propose a new approach to prune and filter discovered rules.  ...  The implementation of proposed work shows the dynamic results in terms of rules found and their effectiveness in the real world scenario.  ...  Evaluation metrics The proposed OntoDB mapping algorithm uses mainly two evaluation metrics, the accuracy and computation time.  ... 
doi:10.9790/0661-16643945 fatcat:4tj7ancognfnllj26mkdstjvsm

Conformance checking of processes based on monitoring real behavior

A. Rozinat, W.M.P. van der Aalst
2008 Information Systems  
To operationalize the ideas presented in this paper a Conformance Checker has been implemented within the ProM framework, and it has been evaluated using artificial and real-life event logs.  ...  ., "Does the model describe the observed process in a suitable way?"). Appropriateness can be evaluated from both a structural and a behavioral perspective.  ...  Furthermore, the authors would like to thank all ProM developers for their on-going work on process mining techniques.  ... 
doi:10.1016/j.is.2007.07.001 fatcat:wwqqeqsj75fftlbg3idfhew334

On the Use of Process Mining and Machine Learning to Support Decision Making in Systems Design [chapter]

Widad Es-Soufi, Esma Yahia, Lionel Roucoules
2016 IFIP Advances in Information and Communication Technology  
Process mining techniques allow organizations to achieve this objective through process discovery.  ...  It identifies a ranking of the process patterns that satisfy the discovered decision rules and which are the most likely to be executed by a given user in a given context.  ...  Three types of applications in process mining are distinguished: discovery, conformance, and enhancement [7] .  ... 
doi:10.1007/978-3-319-54660-5_6 fatcat:kf52cx65arbgbghv356oqhqa7a

A Linear Temporal Logic Model Checking Method over Finite Words with Correlated Transition Attributes [chapter]

Jean-Michel Couvreur, Joaquín Ezpeleta
2019 JIMD Reports  
The specific nature of such traces helps in adapting traditional techniques in order to extend their analysis capabilities.  ...  The introduced approach allows the use of general relations between event attributes by means of freeze quantifiers as well as future and past temporal operators.  ...  In the domain of process mining many works have dealt with conformance checking using LTL as the way of specifying behavioral properties.  ... 
doi:10.1007/978-3-030-11638-5_5 fatcat:m7w7uocaebeezmwlyo62aldvsq

Finding interesting patterns using user expectations

Bing Liu, Wynne Hsu, Lai-Fun Mun, Hing-Yan Lee
1999 IEEE Transactions on Knowledge and Data Engineering  
AbstractÐOne of the major problems in the field of knowledge discovery (or data mining) is the interestingness problem.  ...  Past research and applications have found that, in practice, it is all too easy to discover a huge number of patterns in a database.  ...  data, for testing our system, and for giving us feedback.  ... 
doi:10.1109/69.824588 fatcat:jeseklqnobebpgqeyqdsk6fqce
« Previous Showing results 1 — 15 out of 20,458 results