Advertisement

Process Modeling Leveraged by Workflow Structure and Running Logs Analysis

  • Fei Yu
  • Lipeng Guo
  • Liang ZhangEmail author
Conference paper
  • 377 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 602)

Abstract

The reality of big data opens up a new world for business process modeling. Omnipresent cases and workflow logs are getting accessible, which implies the chance to exploit important patterns hidden in them so as to cut down the modeling cost or to improve the quality of process models. To take the full advantage of big data in process-aware systems (PASs), we propose a novel business process modeling technique that leverages the modeling by cases and workflow logs analysis. It uses the average perceptron to analyze both of existing process structure of cases and co-occurrence relation of activities in workflow logs. In contrast to traditional manual efforts, it improves the performance significantly by recommending proved working patterns. Comparing to recent process mining strategies, it serves the modeling online with meaningful process segments. We evaluate our approach against a synthesis dataset (100 processes and 10,000 log items generated by the plugin PLG in ProM) and real data from public business processes (77 processes in the package Paul Fisher workflows for benchmarks PR and CA2 from the website myExperiment). The study reveals that 9.46 % improvement in precision can be gained by considering both case structure and log items in contrast to the structure only, or 5.94 % gaining in contrast to mere logs. Our evaluation validates the effectiveness of the proposed technique and efficiency when we applying it on real modeling scenarios.

Keywords

Business process modeling Workflow logs Average perceptron 

Notes

Acknowledgments

The work is partially supported by NSFC (No. 60873115), Shanghai Science and Technology Development Funds (No. 13dz2260200 & No. 13511504300), and National Hi-Tech. Project (2012AA02A602).

References

  1. 1.
    Roy Chowdhury, S., Daniel, F., Casati, F.: Recommendation and weaving of reusable mashup model patterns for assisted development. ACM Trans. Internet Technol. 14(2–3), 21:1–21:23 (2014)Google Scholar
  2. 2.
    Van der Aalst, W., Weijters, T., et al.: Workflow mining: discovering process models from event logs. IEEE Trans. Knowl. Data Eng. 16(9), 1128–1142 (2004)CrossRefGoogle Scholar
  3. 3.
    Crammer, K., Dekel, O., Keshet, J., et al.: Online passive-aggressive algorithms. J. Mach. Learn. Res. 7, 551–585 (2006)MathSciNetzbMATHGoogle Scholar
  4. 4.
    Yang, L.Q., Kang, G.S., Guo, L.P., Zhang, L., Zhang, X.N., Gao, X.: Process mining approach for diverse application environments. J. Softw. 26(3), 550–561 (2015). (in Chinese)MathSciNetGoogle Scholar
  5. 5.
    van der Aalst, W.M., Song, M.S.: Mining social networks: uncovering interaction patterns in business processes. In: Desel, J., Pernici, B., Weske, M. (eds.) BPM 2004. LNCS, vol. 3080, pp. 244–260. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  6. 6.
    Lv, Y., Lei, J.-K., Yang, L.-Q., Zhang, L.: BPDetector: a extensible business pattern detector framework. SOARingLab TR #20150802, Fudan Univesity, China (2015, inpress in Chinese)Google Scholar
  7. 7.
    Nguyen, N.C., et. al.: Service recommendation for individual and process use. Institut National des Télécommunications (2012)Google Scholar
  8. 8.
    Zhang, J., Liu, Q., Xu, K.: FlowRecommender: a workflow recommendation technique for process provenance. In: Proceedings of the 8th Australasian Data Mining Conference, vol. 101, pp. 55–61. Australian Computer Society, Inc. (2009)Google Scholar
  9. 9.
    Chan, N.N., Gaaloul, W., Tata, S.: Context-based service recommendation for assisting business process design. In: Huemer, C., Setzer, T. (eds.) EC-Web 2011. LNBIP, vol. 85, pp. 39–51. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  10. 10.
    Burattin, A., Sperduti, A.: PLG: a framework for the generation of business process models and their execution logs. In: Muehlen, Mz, Su, J. (eds.) BPM 2010 Workshops. LNBIP, vol. 66, pp. 214–219. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  11. 11.
    Yan, Z., Dijkman, R., Grefen, P.: Fast business process similarity search with feature-based similarity estimation. In: Meersman, R., Dillon, T.S., Herrero, P. (eds.) OTM 2010. LNCS, vol. 6426, pp. 60–77. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  12. 12.
    Zha, H., Wang, J., Wen, L., et al.: A workflow net similarity measure based on transition adjacency relations. Comput. Ind. 61(5), 463–471 (2010)CrossRefGoogle Scholar
  13. 13.
    Wen, L., Wang, J., Sun, J.: Detecting implicit dependencies between tasks from event logs. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 591–603. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Jin, T., Wang, J., Wen, L.: Efficient retrieval of similar business process models based on structure. In: Meersman, R., et al. (eds.) OTM 2011, Part I. LNCS, vol. 7044, pp. 56–63. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  15. 15.
    Cao, B., Yin, J., Deng, S., et al.: A near neighbour and maximal subgraverage perceptron first based business process recommendation technique. Chin. J. Comput. 36(2), 263–274 (2013)CrossRefGoogle Scholar
  16. 16.
    Weidlich, M., Dijkman, R., Mendling, J.: The ICoP framework: identification of correspondences between process models. In: Pernici, B. (ed.) CAiSE 2010. LNCS, vol. 6051, pp. 483–498. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  17. 17.
    Dijkman, R., Dumas, M., Van Dongen, B., et al.: Similarity of business process models: metrics and evaluation. Inf. Syst. 36(2), 498–516 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media Singapore 2016

Authors and Affiliations

  1. 1.School of Computer ScienceFudan UniversityShanghaiChina
  2. 2.Shanghai Key Laboratory of Data ScienceFudan UniversityShanghaiChina

Personalised recommendations