An Approach for Mining Multiple Types of Silent Transitions in Business Process

被引:2
作者
Wang, Li-Li [1 ]
Fang, Xian-Wen [1 ]
Shao, Chi-Feng [2 ]
Asare, Esther [1 ]
机构
[1] Anhui Univ Sci & Technol, Coll Math & Big Data, Huainan 232000, Peoples R China
[2] Anhui Sci & Technol Univ, Coll Informat & Network Engn, Bengbu 233100, Peoples R China
关键词
Task analysis; Petri nets; Markov processes; Data mining; Semantics; Process control; Routing; Behavior distance; labeled Petri net; process discovery; silent transition; NON-FREE CHOICE; PROCESS MODELS; DISCOVERY;
D O I
10.1109/ACCESS.2021.3128571
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The purpose of process discovery is to construct a process model based on business process execution data recorded in an event log. Many situations may lead to silent transitions that appeared in the process model, while the execution of silent transitions is not recorded in event logs. Therefore, mining silent transitions has been one of the difficult problems in process mining. Existing approaches have some limitations on discovering the silent transition in concurrent structures and may produce many redundant silent transitions which make discovered process model complicated. A novel approach to discover multiple types of silent transitions from an event log is presented in the paper. The basic behavior relationship between activity pairs based on the event log is used to construct the process model with silent transitions of and-gateway type and loop type. Meanwhile, the technique of behavior distance is proposed to discover silent transitions of skip type. Finally, the process model with multiple types of silent transitions is obtained. Experimental results show that the proposed approach can find multiple types of silent transitions correctly, and the number of redundant silent transitions is much less than the existing methods. Meanwhile, it significantly improves the F-measure of the model.
引用
收藏
页码:160317 / 160331
页数:15
相关论文
共 26 条
[1]   Split miner: automated discovery of accurate and simple business process models from event logs [J].
Augusto, Adriano ;
Conforti, Raffaele ;
Dumas, Marlon ;
La Rosa, Marcello ;
Polyvyanyy, Artem .
KNOWLEDGE AND INFORMATION SYSTEMS, 2019, 59 (02) :251-284
[2]  
De Weerdt J., 2011, Proceedings 2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM 2011), P148, DOI 10.1109/CIDM.2011.5949428
[3]   Mining Invisible Tasks in Non-free-choice Constructs [J].
Guo, Qinlong ;
Wen, Lijie ;
Wang, Jianmin ;
Yan, Zhiqiang ;
Yu, Philip S. .
BUSINESS PROCESS MANAGEMENT, BPM 2015, 2015, 9253 :109-125
[4]   A workflow process mining algorithm based on synchro-net [J].
Huang, XQ ;
Wang, LF ;
Zhao, W ;
Zhang, SK .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2006, 21 (01) :66-71
[5]  
Leemans Sander J. J., 2013, Application and Theory of Petri Nets and Concurrency. 34th International Conference, PETRI NETS 2013. Proceedings: LNCS 7927, P311, DOI 10.1007/978-3-642-38697-8_17
[6]   Towards Comprehensive Support for Privacy Preservation Cross-Organization Business Process Mining [J].
Liu, Cong ;
Duan, Hua ;
Zeng, QingTian ;
Zhou, MengChu ;
Lu, Faming ;
Cheng, Jiujun .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (04) :639-653
[7]   Privacy-Preserving Behavioral Correctness Verification of Cross-Organizational Workflow With Task Synchronization Patterns [J].
Liu, Cong ;
Zeng, Qingtian ;
Cheng, Long ;
Duan, Hua ;
Zhou, Mengchu ;
Cheng, Jiujun .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2021, 18 (03) :1037-1048
[8]   Sampling business process event logs using graph-based ranking model [J].
Liu, Cong ;
Pei, Yulong ;
Cheng, Long ;
Zeng, Qingtian ;
Duan, Hua .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2021, 33 (05)
[9]   PETRI NETS - PROPERTIES, ANALYSIS AND APPLICATIONS [J].
MURATA, T .
PROCEEDINGS OF THE IEEE, 1989, 77 (04) :541-580
[10]   Impact-Driven Process Model Repair [J].
Polyvyanyy, Artem ;
Van der Aalst, Wil M. P. ;
Ter Hofstede, Arthur H. M. ;
Wynn, Moe T. .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2017, 25 (04)