Method for mining invisible tasks in business processes on basis of behavior profiles

The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a s...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: FANG XINJIAN, FANG XIANWEN, WANG XIAOYUE, CAO RUIHAO, LIU XIANGWEI
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator FANG XINJIAN
FANG XIANWEN
WANG XIAOYUE
CAO RUIHAO
LIU XIANGWEI
description The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_CN105045706A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>CN105045706A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_CN105045706A3</originalsourceid><addsrcrecordid>eNqNjDsOwjAQRNNQIOAOywGQjCBQowhEAxXUkR3WZIWxrYzJ-dmCA1C9-Wmm1f3CpU8P8mmgt0SJT5I4CsQFpmLxgnpyH0hkgPKQOiWDkqYWosKT496Oog9aewmMeTXxNoAXP86q5el4a84rzqllZNtx5NI217Wpzbbem91h88_mC-93OVs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><source>esp@cenet</source><creator>FANG XINJIAN ; FANG XIANWEN ; WANG XIAOYUE ; CAO RUIHAO ; LIU XIANGWEI</creator><creatorcontrib>FANG XINJIAN ; FANG XIANWEN ; WANG XIAOYUE ; CAO RUIHAO ; LIU XIANGWEI</creatorcontrib><description>The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2015</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20151111&amp;DB=EPODOC&amp;CC=CN&amp;NR=105045706A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25555,76308</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20151111&amp;DB=EPODOC&amp;CC=CN&amp;NR=105045706A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>FANG XINJIAN</creatorcontrib><creatorcontrib>FANG XIANWEN</creatorcontrib><creatorcontrib>WANG XIAOYUE</creatorcontrib><creatorcontrib>CAO RUIHAO</creatorcontrib><creatorcontrib>LIU XIANGWEI</creatorcontrib><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><description>The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2015</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjDsOwjAQRNNQIOAOywGQjCBQowhEAxXUkR3WZIWxrYzJ-dmCA1C9-Wmm1f3CpU8P8mmgt0SJT5I4CsQFpmLxgnpyH0hkgPKQOiWDkqYWosKT496Oog9aewmMeTXxNoAXP86q5el4a84rzqllZNtx5NI217Wpzbbem91h88_mC-93OVs</recordid><startdate>20151111</startdate><enddate>20151111</enddate><creator>FANG XINJIAN</creator><creator>FANG XIANWEN</creator><creator>WANG XIAOYUE</creator><creator>CAO RUIHAO</creator><creator>LIU XIANGWEI</creator><scope>EVB</scope></search><sort><creationdate>20151111</creationdate><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><author>FANG XINJIAN ; FANG XIANWEN ; WANG XIAOYUE ; CAO RUIHAO ; LIU XIANGWEI</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_CN105045706A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2015</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>FANG XINJIAN</creatorcontrib><creatorcontrib>FANG XIANWEN</creatorcontrib><creatorcontrib>WANG XIAOYUE</creatorcontrib><creatorcontrib>CAO RUIHAO</creatorcontrib><creatorcontrib>LIU XIANGWEI</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>FANG XINJIAN</au><au>FANG XIANWEN</au><au>WANG XIAOYUE</au><au>CAO RUIHAO</au><au>LIU XIANGWEI</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Method for mining invisible tasks in business processes on basis of behavior profiles</title><date>2015-11-11</date><risdate>2015</risdate><abstract>The invention discloses a novel method for mining invisible tasks in business processes o basis of Petri network behavior profiles. The method comprises the following steps: firstly analyzing the behavior relationship of the longest log sequences with highest frequencies of occurrence; obtaining a source model according to the behavior relationship and the definition of a weak behavior profile; optimizing the source model step by step according to the sequences with default activities in the residual logs so as to find models with invisible tasks; and finally comparing the models with the source model to obtain the rationality and appropriateness of the models with invisible tasks. At present, some solutions are used for mining the invisible tasks in allusion to free-choice nets, but certain boundedness exists for the complicated process models. According to the method provided by the invention, the invisible tasks in the complicated process models can be mined and the rationality f and behavior appropriateness aB between the logs and the models. The method has relatively good promotion in the event log analysis of the business processes.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_CN105045706A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Method for mining invisible tasks in business processes on basis of behavior profiles
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-15T01%3A25%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=FANG%20XINJIAN&rft.date=2015-11-11&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3ECN105045706A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true