scholarly journals Real-time probing of control-flow and data-flow in event logs

2022 ◽  
Vol 197 ◽  
pp. 751-758
Author(s):  
Paolo Ceravolo ◽  
Ernesto Damiani ◽  
Emilio Francesco Schepis ◽  
Gabriel Marques Tavares
Keyword(s):  
2013 ◽  
Author(s):  
Abdulrahman A. Al-Amer ◽  
Muhammad Al-Gosayir ◽  
Naser Al-Naser ◽  
Hussain Al-Towaileb

2019 ◽  
Vol 1 ◽  
pp. 1-1
Author(s):  
Rex G. Cammack ◽  
Paul Hunt

<p><strong>Abstract.</strong> In many modern sports, athlete tracking for athlete performance analysis is a common practice. Most of the time this athlete tracking is done during training sessions. At some World Tour cycling races the broadcasting company and race organizers use athlete tracking data during race events for various graphical for fans of the sport. This research attempt to use the race real time broadcast of data to produce a web mapping application that will show detailed cycling race tactics and other mapping forms in near real time. This research focuses on data flow and processing for dynamic mapping of complex point data patterns.</p>


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Yadi Wang ◽  
Wangyang Yu ◽  
Peng Teng ◽  
Guanjun Liu ◽  
Dongming Xiang

With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects of life. Abnormal transaction detection is important in e-commerce since abnormal transactions can result in large losses. Additionally, integrating data flow and control flow is important in the research of process modeling and data analysis since it plays an important role in the correctness and security of business processes. This paper proposes a novel method of detecting abnormal transactions via an integration model of data and control flows. Our model, called Extended Data Petri net (DPNE), integrates the data interaction and behavior of the whole process from the user logging into the e-commerce platform to the end of the payment, which also covers the mobile transaction process. We analyse the structure of the model, design the anomaly detection algorithm of relevant data, and illustrate the rationality and effectiveness of the whole system model. Through a case study, it is proved that each part of the system can respond well, and the system can judge each activity of every mobile transaction. Finally, the anomaly detection results are obtained by some comprehensive analysis.


Sign in / Sign up

Export Citation Format

Share Document