Filters








9,997 Hits in 2.6 sec

Mining Invisible Tasks from Event Logs [chapter]

Lijie Wen, Jianmin Wang, Jiaguang Sun
Advances in Data and Web Management  
In this paper, a new process mining algorithm named α # is proposed, which extends the mining capacity of the classical α algorithm by supporting the detection of invisible tasks from event logs.  ...  Most existing process mining algorithms have problems in dealing with invisible tasks.  ...  Here, we will investigate how to mine invisible tasks from event logs. Invisible tasks are difficult to mine because they do not appear in any event trace.  ... 
doi:10.1007/978-3-540-72524-4_38 dblp:conf/waim/WenWS07 fatcat:l5k5yrbapbf45ez7z6jlqr4uru

Detecting Complex Control-Flow Constructs for Choosing Process Discovery Techniques

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
In this work, we propose a framework responsible of detecting from event logs the complex constructs existing in the data.  ...  To achieve this, in the field of process mining, algorithms have been proposed to build process models using the information recorded in the event logs.  ...  Invisible Tasks An invisible task is a task that appears in a process model. However, it is not available in the corresponding event data.  ... 
doi:10.35940/ijitee.l3914.119119 fatcat:ervxqsknbzdppbkwv25s6pvc4i

Genetic Process Mining: A Basic Approach and Its Challenges [chapter]

A. K. Alves de Medeiros, A. J. M. M. Weijters, W. M. P. van der Aalst
2006 Lecture Notes in Computer Science  
One of the aims of process mining is to retrieve a process model from a given event log.  ...  Experiments show that the fitness measure leads to the mining of process models that can reproduce all the behavior in the log, but these mined models may also allow for extra behavior.  ...  In other words, the mined model should have the fitness F = 1. During the experiments, the genetic algorithm mined event logs from nets that contain 5, 7, 8, 12 and 22 tasks.  ... 
doi:10.1007/11678564_18 fatcat:eb5kjmywhnfxtlro3yi25z4kci

Workflow Mining: Current Status and Future Directions [chapter]

A. K. A. de Medeiros, W. M. P. van der Aalst, A. J. M. M. Weijters
2003 Lecture Notes in Computer Science  
Considerable work has been done to develop heuristics to mine event-data logs to produce a process model that can support the workflow design process.  ...  However, all the existing heuristic-based mining algorithms have their limitations.  ...  The focus of most research in the domain of process mining is on mining heuristics based on ordering relations of the events in the process log (cf. Section 5).  ... 
doi:10.1007/978-3-540-39964-3_25 fatcat:dcd3fflfc5es3nzbwh5ooqhq5i

Process Mining a Comparative Study
IJARCCE - Computer and Communication Engineering

ESMITA .P. GUPTA
2014 IJARCCE  
Its primary objective is the discovery of process models based on available event log data.  ...  The systems that support today"s globally distributed and agile businesses are steadily growing in size and generating numerous events.  ...  As we know, Process mining techniques are able to extract knowledge from event logs.  ... 
doi:10.17148/ijarcce.2014.31154 fatcat:wo7ah4vr45ghhaf67xvpue23oy

Graph-Based Algorithms for Discovering a Process Model Containing Invisible Tasks

Riyanarto Sarno, Kelly Sungkono, Reynaldo Johanes, Dwi Sunaryono
2019 International Journal of Intelligent Engineering and Systems  
This research proposes a graph-based algorithm to mine the data from an event log.  ...  From the data, the graph-based algorithm establishes an additional-invisible-task process model by converting all of the processes in the event log into a link list and adding invisible tasks and operators  ...  Invisible tasks Invisible tasks are unrecorded activities in an event log that show up in a business process model.  ... 
doi:10.22266/ijies2019.0430.09 fatcat:s3jwk3f2frh3thnkjrgsdn6xlu

Current Trends in Workflow Mining

L K Ajayi, A A Azeta, I T Owolabi, O O Damilola, F Chidozie, A E Azeta, O Amosu
2019 Journal of Physics, Conference Series  
The challenging issues that arise as a result of inaccurately applying the right algorithm to construct a work model from workflow logs are also highlighted.  ...  It is essential to have a comprehensive characterization study of workflow mining algorithms.  ...  They include the following [9] : Mining Hidden Tasks: Hidden task are also called invisible task.  ... 
doi:10.1088/1742-6596/1299/1/012036 fatcat:bordy7pjsvfofbxzqimg6eedky

Conformance checking of processes based on monitoring real behavior

A. Rozinat, W.M.P. van der Aalst
2008 Information Systems  
On the one hand these systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions.  ...  This paper proposes an incremental approach to check the conformance of a process model and an event log.  ...  Furthermore, the authors would like to thank all ProM developers for their on-going work on process mining techniques.  ... 
doi:10.1016/j.is.2007.07.001 fatcat:wwqqeqsj75fftlbg3idfhew334

A Novel Approach to Discover Switch Behaviours in Process Mining [chapter]

Yang Lu, Qifan Chen, Simon Poon
2021 Lecture Notes in Business Information Processing  
However, in some processes, it is possible to switch from one branch to another.  ...  Process mining is a relatively new subject which builds a bridge between process modelling and data mining. An exclusive choice in a process model usually splits the process into different branches.  ...  More importantly, [6] provides us with a heuristic to predetermine possible invisible tasks between activities from event logs directly.  ... 
doi:10.1007/978-3-030-72693-5_5 fatcat:dj4ypi7dxvhjdjpor5e4bpdlkq

Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models [chapter]

A. Rozinat, W. M. P. van der Aalst
2006 Lecture Notes in Computer Science  
It is part of the ProM framework 3 , which offers a wide range of tools related to process mining, i.e., extracting information from event logs [5] .  ...  To tackle the problem, we distinguish two dimensions of conformance: fitness (the event log may be the result of the process modeled) and appropriateness (the model is a likely candidate from a structural  ...  Karla Alves de Medeiros, Minseok Song, Laura Maruster, Eric Verbeek, Monique Jansen-Vullers, Hajo Reijers, Michael Rosemann, Huub de Beer, Peter van den Brand, et al. for their on-going work on process mining  ... 
doi:10.1007/11678564_15 fatcat:rwxt6w4pdng7nbthyf6pel7m3e

Improving efficiency for discovering business processes containing invisible tasks in non-free choice

Riyanarto Sarno, Kelly Rossa Sungkono, Muhammad Taufiqulsa'di, Hendra Darmawan, Achmad Fahmi, Kuwat Triyana
2021 Journal of Big Data  
The event log records sequences of activities, so the rules of $$\alpha ^{\$ }$$ α $ check the combination of invisible task within non-free choice.  ...  Graph database gains highest storing computing time of batch event logs; however, this database obtains low storing computing time of streaming event logs.  ...  GIT algorithm improves Graph-based Invisible Task by combining non-free choice rules with invisible task rules from Graph-based Invisible Task.  ... 
doi:10.1186/s40537-021-00487-x fatcat:z46gs5jxwrdwnlyyuwaypjdekm

Capturing-the-Invisible (CTI): Behavior-based Attacks Recognition in IoT-oriented Industrial Control Systems

Akashdeep Bhardwaj, Fadi Al-Turjman, Manoj Kumar, Thompson Stephan, Leonardo Mostarda
2020 IEEE Access  
The proposed work presents a pattern recognition algorithm aptly named as "Capturing-the-Invisible (CTI)" to find the hidden process in industrial control device logs and detect Behavior-based attacks  ...  With the advent of networking and automation, these systems have moved from being dedicated and independent to centralized corporate infrastructure.  ...  Logs # Input Data: Device Log from ICS # Output Result: Pre-processed Event Log for Process Mining START initialize; while!  ... 
doi:10.1109/access.2020.2998983 fatcat:ygvaltmpyza6zfqhdkmrxohtrq

Modified Alpha++ Algorithm for Discovering the Hybrid of Non-Free Choice and Invisible Task of Business Processes

Lukman Hakim, Riyanarto Sarno, Kelly Sungkono
2019 International Journal of Intelligent Engineering and Systems  
log and processing the event log with the rules of Alpha++ algorithm.  ...  To modeling a hybrid of non-free choice and invisible tasks, this research proposes an algorithm of adding invisible tasks, including invisible tasks of overlapping pattern, automatically in the event  ...  The obtained event log is called an event log with additional invisible tasks.  ... 
doi:10.22266/ijies2019.0630.04 fatcat:qh7suebmlzerzdjautkwjhdq4a

Genetic process mining: an experimental evaluation

A. K. A. de Medeiros, A. J. M. M. Weijters, W. M. P. van der Aalst
2007 Data mining and knowledge discovery  
One of the aims of process mining is to retrieve a process model from an event log.  ...  allow for extra behavior that cannot be derived from the event log).  ...  Fitness Calculation As discussed in Section 1, process mining aims at discovering a process model from an event log.  ... 
doi:10.1007/s10618-006-0061-7 fatcat:whxs3wr5fzhe7kaaupsx5anecm

Genetic Process Mining [chapter]

W. M. P. van der Aalst, A. K. Alves de Medeiros, A. J. M. M. Weijters
2005 Lecture Notes in Computer Science  
Invisible Tasks Invisible tasks do not appear in any log trace.  ...  Such logs, called event logs, are the starting point for process mining. Process mining targets the automatic discovery of information from an event log.  ... 
doi:10.1007/11494744_5 fatcat:5or5zabuave2vpftpvdqfbiwvy
« Previous Showing results 1 — 15 out of 9,997 results