• No results found

18 results with keyword: 'workflow mining discovering process models from event logs'

Workflow mining: Discovering process models from event logs

To conclude we summarize the rediscovery problem : “Find a mining algorithm able to rediscover a large class of sound WF-nets on the basis of complete workflow logs.” This problem

Protected

N/A

38
0
0
2021
Discovering Data-Aware Declarative Process Models from Event Logs

Given a set of Declare constraints extracted from an event log, a key step of the proposed technique is to generate a set of data-aware constraints, meaning constraints that

Protected

N/A

16
0
0
2021
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining

For example, in the case of a travel application, every artifact (emails, documents, webpage forms) involved may include the name(s) of the applicant(s), the destination(s), and

Protected

N/A

11
0
0
2021
Mining Configurable Process Models from Collections of Event Logs

Step 1b: Process Mining Step 1a: Merge Event Logs Merged event log Process model 1 Process model 2 Process model n Step 1d: Process Model Merging Step 2: Process

Protected

N/A

16
0
0
2021
A new approach for discovering business process models from event logs

The activity precondition learning approach suggested in this paper also allows to take into account (time-varying) case data properties for predicting the conditions under which a

Protected

N/A

20
0
0
2021
Discovering Declarative Process Models from Event Logs through Temporal Logic Query Checking

The answer to RQ1 (Can Temporal Logic Query Checking improve the discovery of declarative process models from event logs?) is yes, improvement in speed was made respect to [13]

Protected

N/A

52
0
0
2021
Process Mining Using BPMN: Relating Event Logs and Process Models

Besides that the resource and the data flow perspectives can be discovered as well: data Petri nets obtained using the data-aware process mining algorithm [27] can be used to

Protected

N/A

25
0
0
2021
Mining workflow processes from distributed workflow enactment event logs Kwanghoon Pio Kim*

Based upon the concept of the structured workflow process model (Liu & Kumar, 2005), we propose a series of distributed workflow process mining approaches that play a theoretical

Protected

N/A

26
0
0
2022
Discovering Process Model from Event Logs by Considering Overlapping Rules

Before we discover the overlapping rules, we need to mine the process model in Petri Net using modified time-based heuristics miner algorithm [9].. After process model is

Protected

N/A

6
0
0
2021
Discovering Petri Nets From Event Logs

Most mining algorithms have an implicit notion of state, i.e., activities are glued together in some process modeling language based on an analysis of the log and the resulting

Protected

N/A

53
0
0
2021
Using Process Mining to Bridge the Gap between BI and BPM

There are three basic types of process mining: (a) process discovery techniques automatically learn models from event logs, (b) conformance checking techniques diagnose

Protected

N/A

6
0
0
2021
Discovering Social Networks from Event Logs

In this paper, we will focus on four types of metrics that can be derived from event logs: (1) metrics based on (possible) causality, (2) metrics based on joint cases, (3) metrics

Protected

N/A

45
0
0
2021
Process-oriented feedback perspectives based on feedback-enabled simulation and learning process data analytics.

Event logs of students’ group works have been analyzed using process mining techniques. 4) Hierarchical: an investigation of top-level models discovered from the

Protected

N/A

230
0
0
2021
Mining Program Workflow from Interleaved Logs

During the validation procedure, we add the shortcut transitions, loop structure, and fork/join states into the workflow model to make sure that all event traces

Protected

N/A

12
0
0
2021
Process Mining Of Invabyte And Event Logs

subject of a standard internal audit before we applied process mining to data drawn from the same time period covered by the audit. This provides our benchmark for the value added by

Protected

N/A

27
0
0
2021
Process Mining Manifesto

Cross-Organizational Process Mining : the application of process mining techniques to event logs originating from different organizations. Data Mining : the analysis of (often

Protected

N/A

15
0
0
2021
Impact of varying service recovery attributes on outcomes in process-based and outcome-based service failure : an empirical examination

H4.2 The three-way interaction effects of services recovery actions (compensations, empowerment, apology and response speed) on: a) repurchase intent; b) expectation update;

Protected

N/A

336
0
0
2020
A Cloud Theory-based Simulated Annealing for Discovering Process Model from Event Logs

In this paper, a cloud theory-based simulated annealing is presented in which a casual matrix and a new function are used to display and evaluate the answer.. In this paper,

Protected

N/A

7
0
0
2021

Upload more documents and download any material studies right away!