Citation: | YU Jianbo, DONG Chenyang, LI Chuanfeng, et al. Process mining based on statistical α-algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics, 2018, 44(5): 895-906. doi: 10.13700/j.bh.1001-5965.2017.0320(in Chinese) |
Workflow technology is widely used in business process management. However, there are still many problems during the execution of business process because of the imperfect workflow model. Process mining is the most useful tool of workflow modeling, which can obtain objective and valuable information from event logs and build process model. Nevertheless, the existing process mining algorithms still have some problems, such as low accuracy, long operation time and overfitting, which will decreace the accuracy of the workflow model. This paper proposed a new process mining algorithm based on statistical
[1] |
闻立杰. 基于工作流网的过程挖掘算法研究[D]. 北京: 清华大学, 2007. http://cdmd.cnki.com.cn/Article/CDMD-10003-2008088148.htm
WEN L J. Studies on algorithms for process mining based on WF-net[D]. Beijing: Tsinghua University, 2007(in Chinese). http://cdmd.cnki.com.cn/Article/CDMD-10003-2008088148.htm
|
[2] |
曾庆田.过程挖掘的研究现状与问题综述[J].系统仿真学报, 2007, 19(增刊1):275-280. http://www.cqvip.com/QK/96569X/2007A01/25333075.html
ZENG Q T.A survey of research issues and approaches on process mining[J].Journal of System Simulation, 2007, 19(s1):275-280(in Chinese). http://www.cqvip.com/QK/96569X/2007A01/25333075.html
|
[3] |
COOK J E, WOLF A L. Automating process discovery through event-data analysis[C]//Proceedings of the 17th International Conference on Software Engineering. New York: ACM, 1995: 73-82.
|
[4] |
AGRAWAL R, GUNOPULOS D, LEYMANN F. Mining process models from workflow logs[C]//International Conference on Extending Database Technology. Berlin: Springer, 1998: 467-483.
|
[5] |
PINTER S S, GOLANI M.Discovering workflow models from activities' lifespans[J].Computers in Industry, 2004, 53(3):283-296. doi: 10.1016/j.compind.2003.10.004
|
[6] |
HERBST J, KARAGIANNIS D.Workflow mining with InWoLvE[J].Computers in Industry, 2004, 53(3):245-264. doi: 10.1016/j.compind.2003.10.002
|
[7] |
SCHIMM G.Mining exact models of concurrent workflows[J].Computers in Industry, 2004, 53(3):265-281. doi: 10.1016/j.compind.2003.10.003
|
[8] |
GRECO G, GUZZO A, PONTIERI L, et al.Discovering expre-ssive process models by clustering log traces[J].IEEE Transactions on Knowledge and Data Engineering, 2006, 18(8):1010-1027. doi: 10.1109/TKDE.2006.123
|
[9] |
VAN DER AALST W M P, WEIJTERS T, MARUSTER L.Workflow mining:Discovering process models from event logs[J].IEEE Transactions on Knowledge and Data Engineering, 2004, 16(9):1128-1142. doi: 10.1109/TKDE.2004.47
|
[10] |
DEMEDEIROS A K A, DONGEN B F, VAN DER AALST W M P, et al. Process mining for ubiquitous mobile systems: An overview and a concrete algorithm[C]//International Workshop on Ubiquitous Mobile Information and Collaboration Systems. Berlin: Springer, 2004: 151-165.
|
[11] |
WEN L, WANG J, VAN DER AALST W M P, et al.A novel approach for process mining based on event types[J].Journal of Intelligent Information Systems, 2009, 32(2):163-190. doi: 10.1007/s10844-007-0052-1
|
[12] |
WEN L, VAN DER AALST W M P, WANG J, et al.Mining process models with non-free-choice constructs[J].Data Mi-ning and Knowledge Discovery, 2007, 15(2):145-180. doi: 10.1007/s10618-007-0065-y
|
[13] |
WEN L, WANG J, SUN J. Mining invisible tasks from event logs[M]//LI Q, FENG L, PEI J, et al. Advances in data and web management. Berlin: Springer, 2007: 358-365.
|
[14] |
LI J, LIU D, YANG B. Process mining: Extending α-algorithm to mine duplicate tasks in process logs[M]//SUI Q, YANG D, WANG T. Advances in web and network technologies, and information management. Berlin: Springer, 2007: 396-407.
|
[15] |
DEMEDEIROS A K A, WEIJTERS A J M M, VAN DER AALST W M P. Using genetic algorithms to mine process models: Representation, operators and results[R]. Eindhoven: Eindhoven University of Technology, 2005.
|
[16] |
李莉, 李洪奇, 谢绍龙.基于变异粒子群算法的过程挖掘[J].计算机集成制造系统, 2012, 18(3):634-638. http://www.cims-journal.cn/CN/abstract/abstract3342.shtml
LI L, LI H Q, XIE S L.Process mining based on mutation-particle swarm optimization[J].Computer Integrated Manufacturing System, 2012, 18(3):634-638(in Chinese). http://www.cims-journal.cn/CN/abstract/abstract3342.shtml
|
[17] |
宋炜, 刘强.基于模拟退火算法的过程挖掘研究[J].电子学报, 2009, 37(增刊1):135-139. http://www.cnki.com.cn/Article/CJFDTOTAL-DZXU2009S1026.htm
SONG W, LIU Q.Business process mining based on simulated annealing[J].Acta Electronica Sinica, 2009, 37(s1):135-139(in Chinese). http://www.cnki.com.cn/Article/CJFDTOTAL-DZXU2009S1026.htm
|
[18] |
黄黎, 谭文安, 许小媛.一种基于时序行为的流过程协同重构算法[J].计算机工程与科学, 2017, 39(5):897-903. http://www.xueshu.com/jsjgcykx/201705/29184488.html
HUANG L, TAN W A, XU X Y.Cooperative streaming process reengineering based on sequential behaviors[J].Computer Engineering & Science, 2017, 39(5):897-903(in Chinese). http://www.xueshu.com/jsjgcykx/201705/29184488.html
|
[19] |
DEMEDEIROS A K A, DONGEN B F, VAN DER AALST W M P, et al. Process mining: Extending the α-algorithm to mine short loops[R]. Eindhoven: Eindhoven University of Technology, 2004.
|
[20] |
VAN DER AALST W M P, DONGEN B F, HERBST J, et al.Workflow mining:A survey of issues and approaches[J].Data & Knowledge Engineering, 2003, 47(2):237-267. https://wenku.baidu.com/view/5012e6d86f1aff00bed51e06.html
|