Filters








24,933 Hits in 2.1 sec

Online Conformance Checking Using Behavioural Patterns [chapter]

Andrea Burattin, Sebastiaan J. van Zelst, Abel Armas-Cervantes, Boudewijn F. van Dongen, Josep Carmona
2018 Lecture Notes in Computer Science  
In this paper, we present a generic framework for online conformance checking, in which the underlying process is represented in terms of behavioural patterns and no assumption on the starting point of  ...  The field of conformance checking aims to quantify the extent to which the execution of a process, captured within recorded corresponding event data, conforms to a given reference process model.  ...  Online Conformance Checking using behavioural Patterns In this section we present conformance checking in terms of behavioural patterns.  ... 
doi:10.1007/978-3-319-98648-7_15 fatcat:ldaxhuu6ifh5bj55kasx55txdq

Conformance Checking of a Longwall Shearer Operation Based on Low-Level Events

Marcin Szpyrka, Edyta Brzychczy, Aneta Napieraj, Jacek Korski, Grzegorz J. Nalepa
2020 Energies  
This paper deals with the conformance checking of a longwall shearer process. The approach uses place-transition Petri nets with inhibitor arcs for modeling purposes.  ...  Conformance checking is a process mining technique that compares a process model with an event log of the same process to check whether the current execution stored in the log conforms to the model and  ...  One of the proposals for online conformance checking is a framework that relies on the notion of behavioural patterns in the process [26] .  ... 
doi:10.3390/en13246630 fatcat:umq4ta5fnfbffb7a6g4liarpay

Conformance Checking of the Activity Network with the Social Relationships Structure in the Context of Social Commerce

Leila Esmaeili, Alireza Hashemi Golpayegani
2020 Journal of Theoretical and Applied Electronic Commerce Research  
Such a combination in the conformance checking field is an original contribution of this study, not yet explored.  ...  But multi-layered network modeling and social theories, such as triadic closure, have not been used yet. We use them in this research.  ...  But of course, behavioural conformance checking requires evaluation step.  ... 
doi:10.4067/s0718-18762020000200107 fatcat:eo3xawxtufhljemszilub4446m

Analysing Structured Learning Behaviour in Massive Open Online Courses (MOOCs): An Approach Based on Process Mining and Clustering

Antoine Van den Beemt, Joos Buijs, Wil Van der Aalst
2018 International Review of Research in Open and Distance Learning  
The increasing use of digital systems to support learning leads to a growth in data regarding both learning processes and related contexts.  ...  Process mining techniques show that successful students exhibit a more steady learning behaviour.  ...  Analysing Structured Learning Behaviour in Massive Open Online Courses (MOOCs): An Approach Based on Process Mining and Clustering van den Beemt, Buys, and van der Aalst  ... 
doi:10.19173/irrodl.v19i5.3748 fatcat:ath7bntj3rejro6lzyi22lhpyy

Conformance Checking Techniques of Process Mining: A Survey [chapter]

Ashok Kumar Saini, Ruchi Kamra, Utpal Shrivastava
2021 Advances in Parallel Computing  
Conformance Checking (CC) techniques enable us to gives the deviation between modelled behavior and actual execution behavior.  ...  The key intention of Process Mining is to extracting facts from the event log and used them for analysis, ratification, improvement, and redesigning of a process.  ...  Online CC framework [9] proposed quantifying the observed behaviour in real-time and controlling the complexity to the constant time of each event.  ... 
doi:10.3233/apc210213 fatcat:6kakp6cvvrc6jnyfljo7kyog34

Identification of Influencing Factors for Enhancing Online Learning Usage Model: Evidence from an Indian University

Sachin Ahuja, Puninder Kaur, S N Panda
2019 International Journal of Education and Management Engineering  
Data Structure course was taught using online platform and the data was collected using the log files. The data collected was further analysed using data mining techniques using Rapid miner tool.  ...  online assignments along with checking of online contents and posting of messages played an important role in terms of enhancing the academic performance.  ...  By applying data mining techniques students' online behaviour can be assessed. To make online teaching better we need to study the pattern of their online usage.  ... 
doi:10.5815/ijeme.2019.02.02 fatcat:2ado74asyvdbfn6ewmw6msoksq

Automated Runtime Verification for Web Services

Tien-Dung Cao, Trung-Tien Phan-Quang, Patrick Felix, Richard Castanet
2010 2010 IEEE International Conference on Web Services  
The proposed methodology can be used either to check a trace (offline checking) or to runtime verification (online checking) with timing constraints, including future and past time.  ...  This paper presents a methodology to perform passive testing of behavioural conformance for the web services based on the security rule.  ...  This paper presents an approach for passive testing of behavioural conformance for a web service.  ... 
doi:10.1109/icws.2010.19 dblp:conf/icws/CaoPFC10 fatcat:3as5fkjfxzcunj2sl6o56bjm64

Identifying Artificial Actors in E-Dating: A Probabilistic Segmentation Based on Interactional Pattern Analysis [chapter]

Andreas Schmitz, Olga Yanenko, Marcel Hebing
2012 Studies in Classification, Data Analysis, and Knowledge Organization  
A finite mixture classification model is applied on the different behavioural and interactional information to classify users into bot vs. non-botcategories.  ...  We propose different behaviour and interaction related indicators of artificial actors (bots) and show how they can be separated from natural users in a virtual dating market.  ...  The model identified a group that conformed to our theoretic conditions. A group of 3.72% of the actors showed a pattern where all variables indicated bot behaviour.  ... 
doi:10.1007/978-3-642-24466-7_33 fatcat:5pmf7zm75vcajgdpzmogild72y

Cyber Security Behaviour among Higher Education Students in Malaysia

Lalitha Muniandy, Balakrishnan Muniandy, Zarina Samsudin
2017 Journal of Information Assurance & Cybersecurity  
The respondents' cyber security behaviour was assessed in the following aspects: password usage, phishing, social engineering, online scam and malware.  ...  This study explores the current state of cyber security behaviour among higher education students in Malaysia.  ...  The research findings conformed with previous studies conducted on numerous cyber security behaviour.  ... 
doi:10.5171/2017.800299 fatcat:dd645ddfa5hbzm23ixfsdkl4vm

An observational approach to practical process non-conformance detection

Sean Thompson, Torab Torabi
2009 2009 Second International Conference on the Applications of Digital Information and Web Technologies  
The rules specified are used to check for conformance of process enactment data.  ...  We evaluate this approach using a case study.  ...  The consistent nature of resource usage in processes also lends itself well to this idea, and our existing research on resource based non-conformance detection [13] is a good candidate for exploring  ... 
doi:10.1109/icadiwt.2009.5273925 fatcat:pms6rrdfgjdbpiq2lxf2xvcz5m

Muslim surfers on the internet: using the theory of planned behaviour to examine the factors influencing engagement in online religious activities

Shirley S. Ho, Waipeng Lee, Shahiraa Sahul Hameed
2008 New Media & Society  
This study seeks to describe the types of religious activities Muslim surfers in Singapore engage in on the internet, and uses the theory of planned behaviour as a theoretical framework to examine how  ...  internet perception, subjective norms, perceived behavioural control, internet self-efficacy, religiosity and other key demographic variables affect the use of the internet for religious purposes among  ...  Conformity to family members, on the other hand, does not have any significant association with online religious use.  ... 
doi:10.1177/1461444807085323 fatcat:vsygcd3z6bb3reucdgmx7vqucq

Online conformance checking: relating event streams to process models using prefix-alignments

Sebastiaan J. van Zelst, Alfredo Bolt, Marwan Hassani, Boudewijn F. van Dongen, Wil M. P. van der Aalst
2017 International Journal of Data Science and Analytics  
Hence, we need techniques that enable us to perform conformance checking in an online setting.  ...  In recent years, alignments have proven extremely useful for calculating conformance checking statistics.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecomm ons.org/licenses/by/4.0/), which permits unrestricted use, distribution  ... 
doi:10.1007/s41060-017-0078-6 dblp:journals/ijdsa/ZelstBHDA19 fatcat:23xvabwzmfheddmiwnxh3mjr5e

Food as a way to convey masculinities: How conformity to hegemonic masculinity norms influences men's and women's food consumption

Lúcia Campos, Sónia Bernardes, Cristina Godinho
2018 Journal of Health Psychology  
Therefore, this study showed that gender is an explaining factor of food consumption patterns of men and women, both through conformity to gender norms, and through contexts were gender is salient.  ...  were partially mediated by the conformity to masculinity norms.  ...  Procedure A questionnaire was built online, using Qualtrics platform. Two non-probabilistic sampling strategies were used to collect the data.  ... 
doi:10.1177/1359105318772643 pmid:29734857 fatcat:jognuekxqrbhdb7uvpdghxnlem

Community Usage of the Online Conference Service [chapter]

Tiziana Margaria, Martin Karusseit
2003 IFIP Advances in Information and Communication Technology  
Here we document and discuss the service usage patterns of the three communities, we describe the observed phenomena for weekly, daily, and feature-specific usage, and discuss the results and lessons learned  ...  In this paper we report on a field experience in the usage and support of an advanced Online Conference Service (OCS) as a virtual Program Committee organization tool.  ...  They all conform to the structure of the example above.  ... 
doi:10.1007/978-0-387-35617-4_32 fatcat:q5jevpioufbrlkkx7fmxl7utgi

Anomaly Detection and Structural Analysis in Industrial Production Environments [chapter]

Martin Atzmueller, David Arnu, Andreas Schmidt
2017 Data Science – Analytics and Applications  
Navigational patterns, as sequential (link) patterns in online systems, have been analysed and modelled, e. g., in [25, 29] .  ...  One task of process mining is conformance checking [24, 27] which has been introduced to check the matching of an existing business process model with the a segmentation of the log entries.  ... 
doi:10.1007/978-3-658-19287-7_13 fatcat:qdm44g5ewjd73ojmvbyirakple
« Previous Showing results 1 — 15 out of 24,933 results