期刊文献+

基于扩展足迹矩阵的一致性检测 被引量:3

Conformance Checking Based on Extended Footprint Matrix
下载PDF
导出
摘要 一致性检测是过程挖掘研究的重要内容,现有的一致性检测方法不足以找到准确的偏差位置。本文以Petri网作为描述过程模型的形式化方法,根据基于日志的次序关系重新定义了一种基于日志的扩展次序关系,并以此定义了基于日志的扩展足迹矩阵和基于模型的扩展足迹矩阵。通过对比两个扩展足迹矩阵得到日志和模型之间精准的偏差位置。最后,通过索赔申请处理的实例验证了方法的有效性。 The methods of existing conformance checking as an important part of process mining research are not sufficient to find the correct deviation location.Based on Petri net as the formalization ways of describing process model,this paper redefined the log-based extended ordering relations via log-based ordering relations and defined the logbased extended footprint matrix and the model-based extended footprint matrix.The precise deviation locations between the log and the model are obtained by comparing two extended footprint matrices.Finally,the validity of the method was verified by an example of the handling of compensation requests.
出处 《山东科技大学学报(自然科学版)》 CAS 北大核心 2018年第2期9-15,共7页 Journal of Shandong University of Science and Technology(Natural Science)
基金 国家自然科学基金项目(61170078 61472228) 山东省泰山学者建设工程专项 山东省自然科学基金项目(ZR2014FM009) 山东省优秀中青年科学家科研奖励基金项目(BS2015DX010) 山东科技大学科技创新项目(SDKDYC170224)
关键词 一致性检测 过程挖掘 扩展次序关系 扩展足迹矩阵 偏差位置 conformance checking process mining extended ordering relations extended footprint matrix deviation location
  • 相关文献

参考文献3

二级参考文献23

  • 1W M P van der Aalst, B F van Dongen, J Herbst, L Maruster, G Shimmy, AJ M M Weijters. Workflow Mining: a Survey of Issues and Approaches [J]. Data and Knowledge Engineering(S0169-023X), 2003, 47(2): 237-267.
  • 2W M P van der Aalst. The Application of Petri Nets to Workflow Management [J]. Journal of Circuits, Systems and Computers(S0218-1266), 1998, 8(1): 21-66.
  • 3S Hinz, K Schmidt, C Stahl. Transforming BPEL to Petri Nets [C]// BPM 2005, 2005, LNCS 3649: 220-235.
  • 4H Zha, J Wang, L Wen. Transforming XPDL to Petri Nets [R]. BETA Working Paper, Tsinghua University, 2007.
  • 5W M Pvander Aalst,Kvan Hee.工作流管理—模型、方法和系统[M].王建民,闻立杰等译.北京:清华大学出版社,2004.
  • 6W M P van der Aalst, A J M M Weijters, L Maruster. Workflow Mining: Discovering Process Models from Event Logs [J], IEEE Transactions on Knowledge and Data Engineering(S1041-4347), 2004, 16(9): 1128-1142.
  • 7A K A de Medeiros, B F van Dongen, W M P van der Aalst, A J M M Weijters. Process Mining: Extending the a-Algorithm to Mine Short Loops [R]. BETA Working Paper Series, Eindhoven University of Technology, 2004.
  • 8L Wen, W M P van der Aalst, J Wang, J Sun. Mining Process Models with Non-Free-Choice Constructs [J]. Data Mining and Knowledge Discovery(S 1384-5810), 2007.
  • 9van der Aalst W M P. Process mining: Discovery, conformance and enhancement of business processes[M]. Berlin Heidel- berg .. Springer, 2011 : 1-10.
  • 10Rodriguez A, Ferndndez-Medina E, Piattini M. A BPMN extension for the modeling of security requirements in business processes[J]. IEICE transactions on information and systems, 2007,90(4) : 745-752.

共引文献11

同被引文献10

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部