Mining algorithm with time constraint workflow

A workflow mining and time-constrained technology, applied in computing, instrumentation, electrical digital data processing, etc., can solve problems such as the inability to guarantee the mining process model, achieve good completeness and reliability, and have a wide range of applications

Active Publication Date: 2018-10-12
NANJING UNIV OF SCI & TECH
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Most of the existing process mining technologies are based on event logs that only contain point events or only interval events. However, most event logs in reality are of mixed type. The application of existing process mining technologies to mixed event logs requires log mining. Preprocessing, expanding the point event to an interval event, or deleting the start event or end event of the interval event, cannot guarantee the correct process model to be mined

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mining algorithm with time constraint workflow
  • Mining algorithm with time constraint workflow
  • Mining algorithm with time constraint workflow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] The invention is a mining algorithm with time constraint workflow. By mining event logs with timestamps, the corresponding time-constrained workflow model is generated. The specific mining process is as follows: figure 1 shown. First, analyze the event log to obtain the event sequence set, then mine the event relationship based on the event sequence, deduce the event relationship based on the entire log level according to the sequence-level event relationship, and then calculate the event corresponding to the log layer event according to the obtained log layer event relationship. Constraints, and call the model generation algorithm based on the log layer event relationship in the α algorithm to generate a workflow model without time constraints. Finally, add the time constraints of the events to the events corresponding to the workflow model to generate the final time constraint workflow Model.

[0037] Combined with an example, the specific steps of the method are: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mining algorithm with a time constraint workflow. The method comprises the following steps of: taking an event log with a time stamp as an input, and taking a mined correct workflow model with time constraints as an output; mining a relationship between the events from the log; deducing and calculating time constraints of the events according to the mined relationship; and finally calling an event relationship model in an alpha algorithm to generate a workflow model without time constraints, and adding the time constraints onto corresponding events to obtain a time constraint workflow model. The mined time constraint workflow model has better completeness, correctness and reliability, is closer to practical workflow process, and is universally suitable for point event logs, interval event logs and mixed type event logs.

Description

technical field [0001] The invention belongs to the field of data mining, in particular to a mining algorithm with time-constrained workflow. Background technique [0002] With the continuous development of Internet technology and cloud computing, workflow-related technologies are playing an increasingly important role in today's information systems. From traditional automated office systems, organizational business management systems to recent service combinations and big data applications in the cloud environment, a large number of workflows are generated, and how to mine high-quality workflow models has become an issue. important technology. [0003] The event log is an important part of the computer information system. It records the events that occur during the execution of the system, as well as relevant information such as the time, operator, and life cycle corresponding to the events. value. The event log is composed of multiple event sequences, each event sequenc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 宋巍尚庆民常震戴汪洋
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products