Constructing Regular Expressions from Real-Life Event Logs

Author(s):  
Polina D. Tarantsova ◽  
Anna A. Kalenkova
Author(s):  
Stephan A. Fahrenkrog-Petersen ◽  
Niek Tax ◽  
Irene Teinemaa ◽  
Marlon Dumas ◽  
Massimiliano de Leoni ◽  
...  

AbstractPredictive process monitoring is a family of techniques to analyze events produced during the execution of a business process in order to predict the future state or the final outcome of running process instances. Existing techniques in this field are able to predict, at each step of a process instance, the likelihood that it will lead to an undesired outcome. These techniques, however, focus on generating predictions and do not prescribe when and how process workers should intervene to decrease the cost of undesired outcomes. This paper proposes a framework for prescriptive process monitoring, which extends predictive monitoring with the ability to generate alarms that trigger interventions to prevent an undesired outcome or mitigate its effect. The framework incorporates a parameterized cost model to assess the cost–benefit trade-off of generating alarms. We show how to optimize the generation of alarms given an event log of past process executions and a set of cost model parameters. The proposed approaches are empirically evaluated using a range of real-life event logs. The experimental results show that the net cost of undesired outcomes can be minimized by changing the threshold for generating alarms, as the process instance progresses. Moreover, introducing delays for triggering alarms, instead of triggering them as soon as the probability of an undesired outcome exceeds a threshold, leads to lower net costs.


2012 ◽  
Vol 37 (7) ◽  
pp. 654-676 ◽  
Author(s):  
Jochen De Weerdt ◽  
Manu De Backer ◽  
Jan Vanthienen ◽  
Bart Baesens

2019 ◽  
Vol 19 (6) ◽  
pp. 1307-1343
Author(s):  
Ario Santoso ◽  
Michael Felderer

Abstract Predictive analysis in business process monitoring aims at forecasting the future information of a running business process. The prediction is typically made based on the model extracted from historical process execution logs (event logs). In practice, different business domains might require different kinds of predictions. Hence, it is important to have a means for properly specifying the desired prediction tasks, and a mechanism to deal with these various prediction tasks. Although there have been many studies in this area, they mostly focus on a specific prediction task. This work introduces a language for specifying the desired prediction tasks, and this language allows us to express various kinds of prediction tasks. This work also presents a mechanism for automatically creating the corresponding prediction model based on the given specification. Differently from previous studies, instead of focusing on a particular prediction task, we present an approach to deal with various prediction tasks based on the given specification of the desired prediction tasks. We also provide an implementation of the approach which is used to conduct experiments using real-life event logs.


2019 ◽  
Vol 9 (11) ◽  
pp. 2368 ◽  
Author(s):  
Hyun Ahn ◽  
Dinh-Lam Pham ◽  
Kwanghoon Pio Kim

Work transference network is a type of enterprise social network centered on the interactions among performers participating in the workflow processes. It is thought that the work transference networks hidden in workflow enactment histories are able to denote not only the structure of the enterprise social network among performers but also imply the degrees of relevancy and intensity between them. The purpose of this paper is to devise a framework that can discover and analyze work transference networks from workflow enactment event logs. The framework includes a series of conceptual definitions to formally describe the overall procedure of the network discovery. To support this conceptual framework, we implement a system that provides functionalities for the discovery, analysis and visualization steps. As a sanity check for the framework, we carry out a mining experiment on a dataset of real-life event logs by using the implemented system. The experiment results show that the framework is valid in discovering transference networks correctly and providing primitive knowledge pertaining to the discovered networks. Finally, we expect that the analytics of the work transference network facilitates assessing the workflow fidelity in human resource planning and its observed performance, and eventually enhances the workflow process from the organizational aspect.


2019 ◽  
Vol 25 (5) ◽  
pp. 995-1019 ◽  
Author(s):  
Anna Kalenkova ◽  
Andrea Burattin ◽  
Massimiliano de Leoni ◽  
Wil van der Aalst ◽  
Alessandro Sperduti

Purpose The purpose of this paper is to demonstrate that process mining techniques can help to discover process models from event logs, using conventional high-level process modeling languages, such as Business Process Model and Notation (BPMN), leveraging their representational bias. Design/methodology/approach The integrated discovery approach presented in this work is aimed to mine: control, data and resource perspectives within one process diagram, and, if possible, construct a hierarchy of subprocesses improving the model readability. The proposed approach is defined as a sequence of steps, performed to discover a model, containing various perspectives and presenting a holistic view of a process. This approach was implemented within an open-source process mining framework called ProM and proved its applicability for the analysis of real-life event logs. Findings This paper shows that the proposed integrated approach can be applied to real-life event logs of information systems from different domains. The multi-perspective process diagrams obtained within the approach are of good quality and better than models discovered using a technique that does not consider hierarchy. Moreover, due to the decomposition methods applied, the proposed approach can deal with large event logs, which cannot be handled by methods that do not use decomposition. Originality/value The paper consolidates various process mining techniques, which were never integrated before and presents a novel approach for the discovery of multi-perspective hierarchical BPMN models. This approach bridges the gap between well-known process mining techniques and a wide range of BPMN-complaint tools.


2018 ◽  
Vol 9 (8) ◽  
pp. 660-665
Author(s):  
Chi Sheh ◽  
◽  
Peng Chan ◽  
Wen Jun Sim ◽  
◽  
...  

Fast fashion is becoming more and more popular nowadays and this industry is growing rapidly. In order to supply to the big demand of fast fashion clothing, company will need to increase the production of the clothing in shorter time frame. Besides that, to out beat the competitor, company will provide more choices of clothing in cheaper price to the customers. By practicing these actions to increase the business profits, company is behaving unethical to the manufacturer of the cloth. Most consumers are not aware of these ethical issues. This paper is will used and tested the conceptual model of fast fashion business ethics based on literature reviews. The finding from this paper will manifest the “real cost” of a cheap and branded fast fashion clothing and will be supported by real life event that happened. However, after realizing the problems, some company did make some changes and the solutions are stated in the paper as well.


2018 ◽  
Vol 19 (6) ◽  
pp. 803-806 ◽  
Author(s):  
Any’e Carson ◽  
Heidi L. Hancher-Rauch ◽  
Yordanos Gebru

The purpose of this article is to provide public health organizations and practitioners a guide for organizing an advocacy summit to develop and practice advocacy skills. Further development of advocacy skills in current and prospective public health practitioners is vital in improving health outcomes among communities creating sustainable change. Though many approaches are available to help students and professionals acquire advocacy skills, an engaging real-life event such as the advocacy summit described within this commentary can be highly beneficial for both novice and seasoned advocates. The feedback obtained from summit participants showed that participants are interested in similar opportunities and believe that such events help further hone their advocacy skills. The essential steps to plan a successful advocacy summit are provided in the article, as well as a sample planning timeline, making it easier for public health advocates in other states to successfully plan similar events.


2020 ◽  
Vol 23 (6) ◽  
pp. 879-897
Author(s):  
Ashvin Immanuel Devasundaram ◽  
Ravinder Barn

The power and influence of film and documentaries in public discourse and in formal pedagogical practices is recognized as critical. The content and message of a documentary are likely to be regarded as the ‘truth’. This is generally located in the belief that since a documentary is focused on a real-life event, it seeks to objectively expose key issues and concerns to reveal the veracity of the phenomenon under scrutiny. This article explores the portrayal of fact and fiction through film and documentary as exemplified by Deepa Mehta’s film Anatomy of Violence and Leslee Udwin’s film India’s Daughter (2016 and 2015 respectively), selected for their focus on the rape and murder of a Delhi student dubbed by the media as ‘Nirbhaya’ in 2012. The article investigates how these two media forms make use of fact or fiction to enhance understanding of a key social quandary, examining notions of temporality, spatiality, determinism and patriarchy.


2019 ◽  
Author(s):  
Felix Suessenbach ◽  
Adam Moore

Since 2016 terms such as “post-truth” or “alternative facts” have been symbolic for the spread of evidence-absent political discourse. As decision-making absent actual facts is dangerous, it is important to determine why people believe in conspiracies such as “large scale voter fraud” (Trump, 2016a). In this study we showed that desires to dominate/fears of being dominated (i.e., dominance motive) predicted conspiracy beliefs as voters faced challenges to election-relevant cognitions (e.g., “we will win”; “we are superior”). We explained this by dominance motives giving value to challenged election cognitions which would increase individuals’ desires to alleviate this challenge (i.e., by adopting conspiracy beliefs). In line with this we found Trump voters facing defeat pre-election believed more in election conspiracies as a function of their dominance motive. This effect disappeared post-election, as by Trump’s victory such challenges were arguably attenuated. Moreover, Clinton voters’ dominance motive positively, though weakly, predicted believing in election conspiracies after the election. Exploratory analyses showed mediating effects of conspiracy belief on the relationship between dominance motives and preferring Trump over Clinton. This research complements previous findings showing personality characteristics predicting conspiracy beliefs and, by using actual conspiracy beliefs in a real-life event, add to their ecological validity.


Sign in / Sign up

Export Citation Format

Share Document