Method for mining invisible tasks in business processes on basis of behavior profiles
The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a s...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | FANG XINJIAN FANG XIANWEN WANG XIAOYUE CAO RUIHAO LIU XIANGWEI |
description | The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN105045706A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN105045706A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN105045706A3</originalsourceid><addsrcrecordid>eNqNjDsOwjAQRNNQIOAOywGQjCBQowhEAxXUkR3WZIWxrYzJ-dmCA1C9-Wmm1f3CpU8P8mmgt0SJT5I4CsQFpmLxgnpyH0hkgPKQOiWDkqYWosKT496Oog9aewmMeTXxNoAXP86q5el4a84rzqllZNtx5NI217Wpzbbem91h88_mC-93OVs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><source>esp@cenet</source><creator>FANG XINJIAN ; FANG XIANWEN ; WANG XIAOYUE ; CAO RUIHAO ; LIU XIANGWEI</creator><creatorcontrib>FANG XINJIAN ; FANG XIANWEN ; WANG XIAOYUE ; CAO RUIHAO ; LIU XIANGWEI</creatorcontrib><description>The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20151111&DB=EPODOC&CC=CN&NR=105045706A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25555,76308</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20151111&DB=EPODOC&CC=CN&NR=105045706A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>FANG XINJIAN</creatorcontrib><creatorcontrib>FANG XIANWEN</creatorcontrib><creatorcontrib>WANG XIAOYUE</creatorcontrib><creatorcontrib>CAO RUIHAO</creatorcontrib><creatorcontrib>LIU XIANGWEI</creatorcontrib><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><description>The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDsOwjAQRNNQIOAOywGQjCBQowhEAxXUkR3WZIWxrYzJ-dmCA1C9-Wmm1f3CpU8P8mmgt0SJT5I4CsQFpmLxgnpyH0hkgPKQOiWDkqYWosKT496Oog9aewmMeTXxNoAXP86q5el4a84rzqllZNtx5NI217Wpzbbem91h88_mC-93OVs</recordid><startdate>20151111</startdate><enddate>20151111</enddate><creator>FANG XINJIAN</creator><creator>FANG XIANWEN</creator><creator>WANG XIAOYUE</creator><creator>CAO RUIHAO</creator><creator>LIU XIANGWEI</creator><scope>EVB</scope></search><sort><creationdate>20151111</creationdate><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><author>FANG XINJIAN ; FANG XIANWEN ; WANG XIAOYUE ; CAO RUIHAO ; LIU XIANGWEI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN105045706A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>FANG XINJIAN</creatorcontrib><creatorcontrib>FANG XIANWEN</creatorcontrib><creatorcontrib>WANG XIAOYUE</creatorcontrib><creatorcontrib>CAO RUIHAO</creatorcontrib><creatorcontrib>LIU XIANGWEI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>FANG XINJIAN</au><au>FANG XIANWEN</au><au>WANG XIAOYUE</au><au>CAO RUIHAO</au><au>LIU XIANGWEI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><date>2015-11-11</date><risdate>2015</risdate><abstract>The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_CN105045706A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | Method for mining invisible tasks in business processes on basis of behavior profiles |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T01%3A25%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=FANG%20XINJIAN&rft.date=2015-11-11&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN105045706A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |