Volume 44 Issue 5
May  2018
Turn off MathJax
Article Contents
YU Jianbo, DONG Chenyang, LI Chuanfeng, et al. Process mining based on statistical α-algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics, 2018, 44(5): 895-906. doi: 10.13700/j.bh.1001-5965.2017.0320(in Chinese)
Citation: YU Jianbo, DONG Chenyang, LI Chuanfeng, et al. Process mining based on statistical α-algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics, 2018, 44(5): 895-906. doi: 10.13700/j.bh.1001-5965.2017.0320(in Chinese)

Process mining based on statistical α-algorithm

doi: 10.13700/j.bh.1001-5965.2017.0320
Funds:

National Natural Science Foundation of China 51375290

National Natural Science Foundation of China 71777173

Shanghai Aerospace Science and Technology Innovation Fund SAST2015054

the Fundamental Research Funds for the Central Universities 22120180068

More Information
  • Corresponding author: YU Jianbo, E-mail: jbyu@tongji.edu.cn
  • Received Date: 15 May 2017
  • Accepted Date: 15 Sep 2017
  • Publish Date: 20 May 2018
  • Workflow technology is widely used in business process management. However, there are still many problems during the execution of business process because of the imperfect workflow model. Process mining is the most useful tool of workflow modeling, which can obtain objective and valuable information from event logs and build process model. Nevertheless, the existing process mining algorithms still have some problems, such as low accuracy, long operation time and overfitting, which will decreace the accuracy of the workflow model. This paper proposed a new process mining algorithm based on statistical α-algorithm, which can not only ensure the accuracy and suitable fitness, but also decrease the operation time. First, cognominal activity identification rules were proposed to be the pre-treated process of process mining, which could improve the accuracy of algorithm. Second, statistical α-algorithm was proposed as the core algorithm of process mining to eliminate the influence of noise in event logs. Moreover, a new algorithm was proposed to identify non-free-choice constructs, which improved the robustness and accuracy of the algorithm. The accuracy and efficiency of the algorithm are verified by simulation and real case.

     

  • loading
  • [1]
    闻立杰. 基于工作流网的过程挖掘算法研究[D]. 北京: 清华大学, 2007. http://cdmd.cnki.com.cn/Article/CDMD-10003-2008088148.htm

    WEN L J. Studies on algorithms for process mining based on WF-net[D]. Beijing: Tsinghua University, 2007(in Chinese). http://cdmd.cnki.com.cn/Article/CDMD-10003-2008088148.htm
    [2]
    曾庆田.过程挖掘的研究现状与问题综述[J].系统仿真学报, 2007, 19(增刊1):275-280. http://www.cqvip.com/QK/96569X/2007A01/25333075.html

    ZENG Q T.A survey of research issues and approaches on process mining[J].Journal of System Simulation, 2007, 19(s1):275-280(in Chinese). http://www.cqvip.com/QK/96569X/2007A01/25333075.html
    [3]
    COOK J E, WOLF A L. Automating process discovery through event-data analysis[C]//Proceedings of the 17th International Conference on Software Engineering. New York: ACM, 1995: 73-82.
    [4]
    AGRAWAL R, GUNOPULOS D, LEYMANN F. Mining process models from workflow logs[C]//International Conference on Extending Database Technology. Berlin: Springer, 1998: 467-483.
    [5]
    PINTER S S, GOLANI M.Discovering workflow models from activities' lifespans[J].Computers in Industry, 2004, 53(3):283-296. doi: 10.1016/j.compind.2003.10.004
    [6]
    HERBST J, KARAGIANNIS D.Workflow mining with InWoLvE[J].Computers in Industry, 2004, 53(3):245-264. doi: 10.1016/j.compind.2003.10.002
    [7]
    SCHIMM G.Mining exact models of concurrent workflows[J].Computers in Industry, 2004, 53(3):265-281. doi: 10.1016/j.compind.2003.10.003
    [8]
    GRECO G, GUZZO A, PONTIERI L, et al.Discovering expre-ssive process models by clustering log traces[J].IEEE Transactions on Knowledge and Data Engineering, 2006, 18(8):1010-1027. doi: 10.1109/TKDE.2006.123
    [9]
    VAN DER AALST W M P, WEIJTERS T, MARUSTER L.Workflow mining:Discovering process models from event logs[J].IEEE Transactions on Knowledge and Data Engineering, 2004, 16(9):1128-1142. doi: 10.1109/TKDE.2004.47
    [10]
    DEMEDEIROS A K A, DONGEN B F, VAN DER AALST W M P, et al. Process mining for ubiquitous mobile systems: An overview and a concrete algorithm[C]//International Workshop on Ubiquitous Mobile Information and Collaboration Systems. Berlin: Springer, 2004: 151-165.
    [11]
    WEN L, WANG J, VAN DER AALST W M P, et al.A novel approach for process mining based on event types[J].Journal of Intelligent Information Systems, 2009, 32(2):163-190. doi: 10.1007/s10844-007-0052-1
    [12]
    WEN L, VAN DER AALST W M P, WANG J, et al.Mining process models with non-free-choice constructs[J].Data Mi-ning and Knowledge Discovery, 2007, 15(2):145-180. doi: 10.1007/s10618-007-0065-y
    [13]
    WEN L, WANG J, SUN J. Mining invisible tasks from event logs[M]//LI Q, FENG L, PEI J, et al. Advances in data and web management. Berlin: Springer, 2007: 358-365.
    [14]
    LI J, LIU D, YANG B. Process mining: Extending α-algorithm to mine duplicate tasks in process logs[M]//SUI Q, YANG D, WANG T. Advances in web and network technologies, and information management. Berlin: Springer, 2007: 396-407.
    [15]
    DEMEDEIROS A K A, WEIJTERS A J M M, VAN DER AALST W M P. Using genetic algorithms to mine process models: Representation, operators and results[R]. Eindhoven: Eindhoven University of Technology, 2005.
    [16]
    李莉, 李洪奇, 谢绍龙.基于变异粒子群算法的过程挖掘[J].计算机集成制造系统, 2012, 18(3):634-638. http://www.cims-journal.cn/CN/abstract/abstract3342.shtml

    LI L, LI H Q, XIE S L.Process mining based on mutation-particle swarm optimization[J].Computer Integrated Manufacturing System, 2012, 18(3):634-638(in Chinese). http://www.cims-journal.cn/CN/abstract/abstract3342.shtml
    [17]
    宋炜, 刘强.基于模拟退火算法的过程挖掘研究[J].电子学报, 2009, 37(增刊1):135-139. http://www.cnki.com.cn/Article/CJFDTOTAL-DZXU2009S1026.htm

    SONG W, LIU Q.Business process mining based on simulated annealing[J].Acta Electronica Sinica, 2009, 37(s1):135-139(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-DZXU2009S1026.htm
    [18]
    黄黎, 谭文安, 许小媛.一种基于时序行为的流过程协同重构算法[J].计算机工程与科学, 2017, 39(5):897-903. http://www.xueshu.com/jsjgcykx/201705/29184488.html

    HUANG L, TAN W A, XU X Y.Cooperative streaming process reengineering based on sequential behaviors[J].Computer Engineering & Science, 2017, 39(5):897-903(in Chinese). http://www.xueshu.com/jsjgcykx/201705/29184488.html
    [19]
    DEMEDEIROS A K A, DONGEN B F, VAN DER AALST W M P, et al. Process mining: Extending the α-algorithm to mine short loops[R]. Eindhoven: Eindhoven University of Technology, 2004.
    [20]
    VAN DER AALST W M P, DONGEN B F, HERBST J, et al.Workflow mining:A survey of issues and approaches[J].Data & Knowledge Engineering, 2003, 47(2):237-267. https://wenku.baidu.com/view/5012e6d86f1aff00bed51e06.html
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(10)

    Article Metrics

    Article views(1165) PDF downloads(478) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return