scholarly journals Understanding Contrail Business Processes through Hierarchical Clustering: A Multi-Stage Framework

Algorithms ◽  
2020 ◽  
Vol 13 (10) ◽  
pp. 244
Author(s):  
Zeeshan Tariq ◽  
Naveed Khan ◽  
Darryl Charles ◽  
Sally McClean ◽  
Ian McChesney ◽  
...  

Real-world business processes are dynamic, with event logs that are generally unstructured and contain heterogeneous business classes. Process mining techniques derive useful knowledge from such logs but translating them into simplified and logical segments is crucial. Complexity is increased when dealing with business processes with a large number of events with no outcome labels. Techniques such as trace clustering and event clustering, tend to simplify the complex business logs but the resulting clusters are generally not understandable to the business users as the business aspects of the process are not considered while clustering the process log. In this paper, we provided a multi-stage hierarchical framework for business-logic driven clustering of highly variable process logs with extensively large number of events. Firstly, we introduced a term contrail processes for describing the characteristics of such complex real-world business processes and their logs presenting contrail-like models. Secondly, we proposed an algorithm Novel Hierarchical Clustering (NoHiC) to discover business-logic driven clusters from these contrail processes. For clustering, the raw event log is initially decomposed into high-level business classes, and later feature engineering is performed exclusively based on the business-context features, to support the discovery of meaningful business clusters. We used a hybrid approach which combines rule-based mining technique with a novel form of agglomerative hierarchical clustering for the experiments. A case-study of a CRM process of the UK’s renowned telecommunication firm is presented and the quality of the proposed framework is verified through several measures, such as cluster segregation, classification accuracy, and fitness of the log. We compared NoHiC technique with two trace clustering techniques using two real world process logs. The discovered clusters through NoHiC are found to have improved fitness as compared to the other techniques, and they also hold valuable information about the business context of the process log.

2020 ◽  
Vol 16 (3) ◽  
pp. 127-147
Author(s):  
Kingsley Okoye

Semantics has been a major challenge when applying the process mining (PM) technique to real-time business processes. The several theoretical and practical efforts to bridge the semantic gap has spanned the advanced notion of the semantic-based process mining (SPM). Fundamentally, the SPM devotes its methods to the idea of making use of existing (semantic) technologies to support the analysis of PM techniques. In principle, the semantic-based process mining method is applied through the acquisition and representation of abstract knowledge about the domain processes in question. To this effect, this paper demonstrates how the semantic concepts and process modelling (reasoning) methods are used to improve the outcomes of PM techniques from the syntactic to a more conceptual level. To do this, the study proposes an SPM-based framework that shows to be intelligent with a high level of semantic reasoning aptitudes. Technically, this paper introduces a process mining approach that uses information (semantics) about different activities that can be found in any given process to make inferences and generate rules or patterns through the method for annotation, semantic reasoning, and conceptual assertions. In turn, the method is theoretically applied to enrich the informative values of the resultant models. Also, the study conducts and systematically reviews the current tools and methods that are used to support the outcomes of the process mining as well as evaluates the results of the different methods to determine the levels of impact and its implications for process mining.


2021 ◽  
pp. 73-82
Author(s):  
Dorina Bano ◽  
Tom Lichtenstein ◽  
Finn Klessascheck ◽  
Mathias Weske

Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. The feasibility of the proposed approach is evaluated on two synthetic redo logs.


2021 ◽  
pp. 117-126
Author(s):  
Finn Klessascheck ◽  
Tom Lichtenstein ◽  
Martin Meier ◽  
Simon Remy ◽  
Jan Philipp Sachs ◽  
...  

Process mining aims at deriving process knowledge from event logs, which contain data recorded during process executions. Typically, event logs need to be generated from process execution data, stored in different kinds of information systems. In complex domains like healthcare, data is available only at different levels of granularity. Event abstraction techniques allow the transformation of events to a common level of granularity, which enables effective process mining. Existing event abstraction techniques do not sufficiently take into account domain knowledge and, as a result, fail to deliver suitable event logs in complex application domains.This paper presents an event abstraction method based on domain ontologies. We show that the method introduced generates semantically meaningful high-level events, suitable for process mining; it is evaluated on real-world patient treatment data of a large U.S. health system.


2001 ◽  
Vol 16 (4) ◽  
pp. 295-329 ◽  
Author(s):  
ANTHONY HUNTER

Numerous argumentation systems have been proposed in the literature. Yet there often appears to be a shortfall between proposed systems and possible applications. In other words, there seems to be a need for further development of proposals for argumentation systems before they can be used widely in decision-support or knowledge management. I believe that this shortfall can be bridged by taking a hybrid approach. Whilst formal foundations are vital, systems that incorporate some of the practical ideas found in some of the informal approaches may make the resulting hybrid systems more useful. In informal approaches, there is often an emphasis on using graphical notation with symbols that relate more closely to the real-world concepts to be modelled. There may also be the incorporation of an argument ontology oriented to the user domain. Furthermore, in informal approaches there can be greater consideration of how users interact with the models, such as allowing users to edit arguments and to weight influences on graphs representing arguments. In this paper, I discuss some of the features of argumentation, review some key formal argumentation systems, identify some of the strengths and weaknesses of these formal proposals and finally consider some ways to develop formal proposals to give hybrid argumentation systems. To focus my discussions, I will consider some applications, in particular an application in analysing structured news reports.


Author(s):  
Yizhou Fan ◽  
Wannisa Matcha ◽  
Nora’ayu Ahmad Uzir ◽  
Qiong Wang ◽  
Dragan Gašević

AbstractThe importance of learning design in education is widely acknowledged in the literature. Should learners make effective use of opportunities provided in a learning design, especially in online environments, previous studies have shown that they need to have strong skills for self-regulated learning (SRL). The literature, which reports the use of learning analytics (LA), shows that SRL skills are best exhibited in choices of learning tactics that are reflective of metacognitive control and monitoring. However, in spite of high significance for evaluation of learning experience, the link between learning design and learning tactics has been under-explored. In order to fill this gap, this paper proposes a novel learning analytic method that combines three data analytic techniques, including a cluster analysis, a process mining technique, and an epistemic network analysis. The proposed method was applied to a dataset collected in a massive open online course (MOOC) on teaching in flipped classrooms which was offered on a Chinese MOOC platform to pre- and in-service teachers. The results showed that the application of the approach detected four learning tactics (Search oriented, Content and assessment oriented, Content oriented and Assessment oriented) which were used by MOOC learners. The analysis of tactics’ usage across learning sessions revealed that learners from different performance groups had different priorities. The study also showed that learning tactics shaped by instructional cues were embedded in different units of study in MOOC. The learners from a high-performance group showed a high level of regulation through strong alignment of the choices of learning tactics with tasks provided in the learning design. The paper also provides a discussion about implications of research and practice.


2018 ◽  
Vol 11 (3) ◽  
pp. 12 ◽  
Author(s):  
Kanokrat Jirasatjanukul ◽  
Namon Jeerungsuwan

The objectives of the research were to (1) design an instructional model based on Connectivism and Constructivism to create innovation in real world experience, (2) assess the model designed–the designed instructional model. The research involved 2 stages: (1) the instructional model design and (2) the instructional model rating. The sample consisted of 7 experts, and the Purposive Sampling Technique was used. The research instruments were the instructional model and the instructional model evaluation form. The statistics used in the research were means and standard division. The research results were (1) the Instructional Model based on Connectivism and Constructivism to Create innovation in Real World Experience consisted of 3 components. These were Connectivism, Constructivism and Innovation in Real World Experience and (2) the instructional model rating was at a high level (=4.37, S.D.=0.41). The research results revealed that the Instructional Model Based on Connectivism and Constructivism to Create Innovation in Real World Experience was a model that can be used in learning, in that it promoted the creation of real world experience innovation.


2017 ◽  
Vol 37 (2) ◽  
pp. 111-119
Author(s):  
VICTOR EDWIN COLLAZOS ◽  
HELGA DUARTE AMAYA

Enterprise Architecture (EA) has gained importance in recent years, mainly for its concept of “alignment” between the strategic and operational levels of organizations. Such alignment occurs when Information Technology (IT) is applied correctly and timely, working in synergy and harmony with strategy and the operation to achieve mutually their own goals and satisfy the organizational needs.Both the strategic and operational levels have standards that help model elements necessary to obtain desired results. In this sense, BMM and BPMN were selected because both have the support of OMG and they are fairly well known for modelling the strategic level and operational level, respectively. In addition, i* modeling goal can be used for reducing the gap between these two standards. This proposal may help both the high-level design of the information system and to the appropriate identification of the business processes that will support it.This paper presents a methodology for aligning strategy and the operation based on standards and heuristics. We have made a classification for elements of the models and, for some specific cases, an extension of the heuristics associated between them. This allows us to propose methodology, which uses above-mentioned standards and combines mappings, transformations and actions to be considered in the alignment process.


Author(s):  
Jamila Oukharijane ◽  
Mohamed Amine Chaâbane ◽  
Imen Ben Said ◽  
Eric Andonoff ◽  
Rafik Bouaziz

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Shabnam Shahzadi ◽  
Xianwen Fang ◽  
David Anekeya Alilah

For exploitation and extraction of an event’s data that has vital information which is related to the process from the event log, process mining is used. There are three main basic types of process mining as explained in relation to input and output. These are process discovery, conformance checking, and enhancement. Process discovery is one of the most challenging process mining activities based on the event log. Business processes or system performance plays a vital role in modelling, analysis, and prediction. Recently, a memoryless model such as exponential distribution of the stochastic Petri net SPN has gained much attention in research and industry. This paper uses time perspective for modelling and analysis and uses stochastic Petri net to check the performance, evolution, stability, and reliability of the model. To assess the effect of time delay in firing the transition, stochastic reward net SRN model is used. The model can also be used in checking the reliability of the model, whereas the generalized stochastic Petri net GSPN is used for evaluation and checking the performance of the model. SPN is used to analyze the probability of state transition and the stability from one state to another. However, in process mining, logs are used by linking log sequence with the state and, by this, modelling can be done, and its relation with stability of the model can be established.


Sign in / Sign up

Export Citation Format

Share Document